Language selection

Search

Patent 2635954 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2635954
(54) English Title: GENIUS ADAPTIVE DESIGN
(54) French Title: MODELE D'ADAPTATION AU GENIE
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
(72) Inventors :
  • KAYS, STEVEN (United States of America)
(73) Owners :
  • STEVEN KAYS
(71) Applicants :
  • STEVEN KAYS (United States of America)
(74) Agent: BORDEN LADNER GERVAIS LLP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2006-12-19
(87) Open to Public Inspection: 2007-07-19
Examination requested: 2011-12-12
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2006/048704
(87) International Publication Number: WO 2007081519
(85) National Entry: 2008-06-30

(30) Application Priority Data:
Application No. Country/Territory Date
60/755,291 (United States of America) 2005-12-30
60/756,607 (United States of America) 2006-01-05
60/778,313 (United States of America) 2006-03-01
60/783,018 (United States of America) 2006-03-15
60/786,906 (United States of America) 2006-03-28
60/852,794 (United States of America) 2006-10-18

Abstracts

English Abstract


Published without an Abstract


French Abstract

Publié sans précis

Claims

Note: Claims are shown in the official language in which they were submitted.


DEPENDENT CLAIMS SIMPLIFIED:
EASILY SEARCH WHAT YOU WANT IN THIS INVENTION ONLINE:
This fantastic system generates claimable features tailored to the user. A
speedy license is available. For
example enter keywords or descriptions like at our
Discover/LicenseItToday.Com. Licensable features for new
genres of inventions show up. This offers results different from common patent
pending application databases.
See Unity-Search.
SEEKING AN INVENTION TO SOLVE YOUR CIRCUMSTANCE?
Patent application adapts by providing needed solutions. It suggests unique
solutions that satisfy your stated
need put into keywords, etc. See Unity-Solutions.
SIMPLIFICATION PROCESS:
Simplified system eases navigating for what you want. See Unity-Simple.
WANT YOUR INVENTION ADAPTED TO CHANGING REQUIREMENTS?
User must handle requirements A then B to gain 'access. Access requirements
change in time, and are 'tailored
to the situation. See Unity-Access-Change.
DISCOVER INTERESTING VARIATIONS:
. Over 100,000 variations are adapted to your invention's subject matter. Can
beat Google.com. User needs to
try this before judging how it can help them. You must dig deeper than just
viewing the sample solutions
provided!
. Conceived an invention? File your patent application, better assured all its
pages arrived. System proves who
sent or did something by digging inside. Sign a delivered package; knowing
something like a diamond ring is
really inside. See 4E020 Registrar.
. Type in what you want. For example might you want your cat or dog to clean
their paws before entering the
pet door? Problem solved down below!
1 ST STEP - YOU MUST ENTER KEYWORDS.
2ND STEP: LICENSE AN ADAPTED INVENTION- QUICKLY & EASILY:
Want to be the licensee or licensor? Exclusive world license agreements are
tailored for the friendly licensee.
It's easier to license than circumvent this broad application that helps you.
See Unity-License.
FIND MANY MORE CLAIMED TREASURES INSIDE:
Kindly understand, patent attorneys clarified this patent application, filed
its novel manner, should meet patent
filing documents for inventions at this stage. It needs help interfacing with
clever searchers that will it. It might
guarantee top value, before payment.
INTRODUCTION JUST TO THE UNITY ASPECTS OF THIS APPLICATION
Dig deeply into the revolutionary disclosures. Invention variations often
begin with a short identification
number. Discover today how it can satisfy your unique needs.
LICENSE OUR ADAPTED INVENTION - QUICKLY & EASILY:
Exclusive world license agreements are tailored for the licensee. For example
the user views our license
agreement at Agreement/LicenseItToday.Com. Zero payment is needed while
licensee studies the inventive
ideas, while they have the option to extend the exclusive license for ten to
twenty years.
. Potential licensees just call California at (+1) 707.428.5000 to speak with
a live person who will kindly
interface with both the caller and adaptive designs' database of features.
This interface is designed for both
potential licensees, and authorized people with higher 'access privileges. All
agreements must be in writing
from authorized person, other interactions are brainstorming.
. Licensees seeking zero royalty payments during a trial period exceeding a
month, can be tracked to make sure
they are moving forward in bringing products from the license, onto the world
market.
1346

The above also describes the (semi) automated functions.
SEARCH HEREIN FOR WHAT YOU WANT- Unity-Search:
Links within this patent application show new ways of searching for needed
inventions. Ask the system for
what you need, and it can be made available. If you don't find a link
(schematic connection) to an applicable
feature, chances are good that you'll find it via another link structure. Like
a (human) brain, there are many
pathways to other parts of the thinking mind.
. Utilize multiple search modes to 'access all the features you 'seek in this
and subsequent patent applications if
you don't read it from top to bottom. We claim how our features are inserted
and designed, so they are often
'accessed (found through our interfaces) via: multiple links, keywords,
*subject categories, etc. Details in
patent application's introduction.
. Locate features by key word searching: Parts' [function] roles in Adaptive
Design [can be found / used /
'interacted with [for this pat application] searching that and *related terms
based on desired common
methods/results. The greater the adjacency between [the terms for the] 'nodes
the [better/faster/simpler] the
process might be.
. Thesaurus Searching: Search for related terms (in this invention database)
based on a thesaurus' key word
relevancy. This greatly increases the number of potential links. It helps
simplify matters (reducing key word
clutter).
--Thesaurus 'database has each (central word / concept / feature / invention)
rank all related/'associated terms
'scored for relevancy. This and related databases can be stored on the
system's 'computer.
. Search Engine Like Searching: The millions of criteria used to determine
relevancy by functions related to web
search engines can be used.
--eg: Google.com, Yahoo.com, AOL.com, MySpace.com, MSN.com. Surf today and in
future, their search
engines to find other search criteria for actual and theoretical models.
SIMPLIFYING & CONDENSING SYSTEM [SIZE]: Another Claim
LINKING SIMPLIFIES:
We claim the way the patent application's features interlink within itself and
to outside sources. Their benefits
include:
-Easier navigation & interface: finding the needed feature/invention. Smaller
'screens allow mobile 'nodules.
.Easier to control and monitor: the central nervous system [computerized
'brain].
.Less memory required to run the system.
.Less energy required: memory; [electrical] energy; resources [hardware and
software] requirements.
.Greater Creative 'Customization: 'customization needs less 'seeking /
scanning [key word searching for
features]. 'Customizing is easier as more features/resources are available
with the unified invention, than if the
invention were separated.
. Despite the simplification, its complexity and lack of tremendous finances
kept us from developing a working
model for the unity of the invention.
-Simplicity: increases security; reduces software's virus risks. Fewer portals
for 'access to protect. ['Analyzer]
controls how ['w5] 'customization/links are 'routed / and services are
rendered [by 'reacting].
MAKING FEATURES OPTIONAL REDUCES CLUTTER:
All features are optional, except central components in electronic features
like: 1. power source, 2. some CPU
(central processing unit), and 3. Ability to control (power switch) and offer
'adapted functions.
-Clutter by over repeating that features are optional (can be) omitted. This
un-clutters the user interface, and text
in this patent application. However we give more examples for what's optional
and not necessary.
-The mere presence of an indirect or direct link to other features, outside
the central description for the feature at
hand (usually what's found in the same section of this application like an
invention number or what's in the
feature lists) is (usually) optional.
-Pet Door Paw Cleaner claim example: Collars with RFID (wireless transmitter)
limit 'access to those with the
'designated RFID is optional. The other 100,000+ variations for wireless entry
in linked files related to 'Access
are also optional, e.g.: the central description for 'access, links to 'visual
analyzers. While 'V.A. may be
incorporated into the Pet Door if desired. It wasn't necessary to add
cumbersome descriptions for this option in
the Pet Door's central the central description; doing so doesn't invalidate
the patent applications' full optional
features when linked information isn't copied again (copied and pasted) into a
feature's central description.
-'Adaptation: Optional features are offered for 'access and or license.
1347

. Consuming unnecessary detailing the technological sides of things, known to
one skilled in the art, can or will
clog (make it harder to view the main points) in this system (patent
application/interface).
CONDENSING TEXT:
References between specific invention numbers / features. A link should
suffice. However references are
sometimes made. Lack of a specifically worded reference like "See Invention
Number AC-9110" does not
imply lack of relatedness. One of our goals is showing how this patent
application's text size reduction can
reflect in the constructed invention. Details in the introduction sections.
Expanded versions of this document
may be available at our site: ProfitableInventionAbstracts/LicenseItToday.Com.
This saves on costs for
translating the application into over 50 languages as planned, and will
hopefully make it more user friendly for
the patent examiner than the other versions.
SHRINKING / EXPANDING DESCRIPTIONS & ABBREVIATED TERMS:
. Properly worded feature descriptions can shrink text size by over 95%, but
at some potential loss of (speed in)
comprehending what's written. However, reading time is also shortened. Reader
can request an expanded
version be given tailored to their needs. For example the Guide feature
learned what the reader knows, and can
better guide them accordingly.
. Shrink: How this invention can/has had its descriptions!'interfaces
shortened:
Omitting unnecessary words like "the" helps. See our abbreviations and
features (parts) files.
- Search & Replace: Use key word searches for long or abbreviated terms, then
replace. Minimize errors doing
this that result in improper replacements ['editing] that [greatly] change the
meaning. For example: replace the
term "U", for "User" or "Licensee" by typing a space before and after "U".
Otherwise al l words with the letter
will be replaced. Our diagrams can have the lines between the parts next to
the term, eg: U='Interfaces
With='Keyboard. So consider also replacing terms that are adjoined with the
link symbol (equal sign "=")
. Using feature terms as text: serves the purpose of easing comprehensibility
(reading) and condensed language
(for wider range of readers and users). For example the word "adapt" can be
viewed as one or more of the
following: 1. A word; 2. A feature as in function; 3. An electronic part,
however worded in a manner to make it
more user friendly for technophobic (technically challenged people who have
repeatedly been told something is
more user friendly than it is in reality) users; 4. A link to thousands of
technical examples, plus direct and
indirect links to patents; 5. More. One click can highlight all terms that are
any of the above, for example
putting an apostrophe before each word as with many of our terms herein. This
patent's application rephrases
its functions to show how it can fit into a sentence, for example "it shows
Tom how to create inventions" is the
same as " it 'guides Tom to create inventions". Altering the label can also:
1. Better convey meaning where and
when needed; 2. Make material more interesting - variety is proven to often
help the user stimulate ('guide) the
user's creativity.
-Labels: To shrink this pat application we often relabeled our features,
and/or omitted the apostrophe - if such
are needed to be seen simply run a software search (and replace) feature
connected to a thesaurus that will pull
up related terms and phrases (like in web search engines).
. When usual words or terms out of context are found: 'predict it might be a
result/'reaction to faulty [key
word] replacement. Find characteristics in the unusual phrasing that suggest
an improper replacement.
Sentences with gross grammatical errors, and/or thought patterns differing
greatly from how humans [can
think], are signposts for such errors, that need not be dismissed.
. Another patent "Psuedo Random Number Generator" waas published on Nov 29,
2001 claimed to be the
longest patent at the time. Its US patent number is: 3,314,440. We are longer
and have *improved the
randomness of its nature.
COST / BENEFIT 'ANALYSIS & SIMPLIFICATION:
. Important Concern: How Much More Simple Does The Patent Examiner & Or User
Prefer This Application At
The Great Cost Of Losing The Application's Claims?
. This may not a clear cut legal and/or issue. Hence multiple variations allow
the needed 'adaptations. Dig
deeper into this application to understand.
.-All of its features can be alternatives and/or optional in furthering our
claim.
. Simplifying can reduce the inventions' claims, if one omits the necessary
parts. The greater the sum of the
parts herein, the greater can be its whole (value, novelty of our
revolutionary application).
-Traditional patent filing requirements will make it hard to keep up with
evolving technology in the new genres
we are claiming. Let's try to adapt to the needs of as many people with little
or no loss to anyone.
. Everyone has a different (emotional) value or preference (can be 'scored
[for 'adapting this interface]) for how
simplified and or complicated they want (this system) to be. Hence the system
'adapts accordingly. However
1348

placing many but not all variations in this patent application can exceed ten
million euros, just in per page fees
alone (based on current page fee requirements in certain patent offices), plus
greater costs in translating and
proofing the documents into many languages (without altering: subject matter
/'accessibility, interface design,
and/or causing other problems like technical ones, such as changes in memory
or 'programming).
Terms Used For Explaining - Unity Of Our Inventions:
SOME CODES (FUNCTIONS / PARTS) IN "ADAPTIVE DESIGN" SYSTEM
Examples for how codes are put into practice within "Adaptive Design":
ADAPTIVE DESIGN = How the unity of inventions 'adapt [by how the pat
application's aspects integrate].
CART += Any of the electronic invention numbers / functions are [also]
[un]pluggable.
Connect/unconnected/activate an invention as needed. 'Cartridges are a [type
of] 'node in the unity of
inventions' system.
CRC = Central Computer Adaptive System [unity of inventions]. Where the 'nodes
and 'function meet
DISTANCER = Events triggered when multiple 'nodules are at 'designated
distances [from each other].
EDUC *= Teaches how to use the Adaptive Design: how the different aspects
integrate to 'adapt. [Can] learn
on CRC's (work station)/N/printed information (book).
EGH * = The determination of changes in difficulty (via score, uip) and
'correlated invention for 'adapted
purpose can be at central computer/product number.
ENTERTAIN = See Below
EXERCISE =
GAME = " "
MICROPHONE
MORNING
MOUSE=""
Adaptive Design applies itself to the 'adaptive need, by using its resources.
Best [by 'score for 'designative
need] form of ['adapted / claimed] function offered [to user] is based on the
invention options [claim] available /
connected / paid for / that can be created. E.G.: User =['Adapted] Function =
'BA = CRC. 'Designated
functions can change ['egh, 'tgh] as need/situation changes, or 'adapt
switches mode into different function
[invention] [to better match situation]. Exemplified in functions/resources
include:
Specific inventions; 'access, 'artist, ' ba, 'balance, 'camera, 'communicate,
'composition, 'coordinator,
'database [what's needed / how applied], 'edit, 'egh, 'entertain, 'exercise,
'gps, [how it 'interacts (with user],
'microphone, 'morning> 'mouse, 'mp, 'mq, 'multi-user, 'notifier,
'order&timing,'osc> 'pp, 'predict, 'ps-zone,
'Q, 'R, 'react, 'sa, 'score, 'synth, 'sensor [what it seeks], 'sw, 'tel, 'tgh,
'track, 'va, 'uq.
.'Predict [functions based on what 'analyzer tied to 'predicting function
has/is giving the highest 'prediction-
'score]. Each 'prediction [from any combination of resources (of parts) as
outlined] creates their own
[potential] 'score. All 'prediction-'scores are compared with a[specially
creative for the situation] 'score chart
- and the highest 'prediction 'score [with least uncertainty / greatest
(likely) value even if there is a greater
uncertainty factor] = resulting in the adaptive design choosing the best
'prediction. Adaptive designs
function(s) 'react accordingly.
FEATURE = Function, Part or Invention.
FUNCTION = Part or invention's output. Any [software] driven function, e.g.
desired outputs.
1349

LINK:
-what ties this and previous applications' inventions and parts together.
NODE:
-invention that can be separated from central computer [with loss of
peripheral functions via tree branching].
PART = Feature. Introductions are in the Parts files. Example parts: 'access,
'sound analyzer.
Peripheral Functions:
-functions that aren't part of the main functions as described in the ~~~
[~~] ~~bly not listed in
the invention's abstract. Not related to level of function's importance
[especially from perspective of other
connected nodes].
MISCELLANEOUS - UNITY OF INVENTION POINTERS (Claims):
ADAPTING FOR FUTURE TECHNOLOGY. Fadap .TM.:
Adapt this unified invention by utilizing future technology on an as needed
basis: Use search (engine) criteria to
find / emulate /'access the functions/features/inventions to related aspects
[in this unified invention].
EACH ASPECT IS NORMALLY OPTIONAL:
Be careful, the unity of inventions unites all aspects of this patent
application, while keeping the ability to
process/function/offer one or more aspects/functions [claims / independent
claims] without jeopardizing the
entire unity [claim] of system. Don't use/quote a part of this application, at
the detriment of the application's
other descriptions when there is a conflicting overlap. Don't create an
unnecessary restriction by taking text out
of context, unless such serves the particular need at that
time/place/situation.
MANY EXAMPLES IN THIS DOCUMENT:
More invention examples in pat application, gives further clarification for
the unity of the invention: By virtue
of explaining the details of the inventions [claims], through the many links
[tree branching], each new invention
[claim) further clarifies the unity of inventions in this, past and future
patent applications of filers. Each function
in the united invention, connects with every other function listed or
inferred: otd: each part/invention/claimable
subject matter makes many references/links to every other
part/invention/claimable matter via a nearly infinite
number of methods.
CONTENT & DATE VERIFIER 4E020 REGISTRAR:
Track which inventions were used. System proves who did what electronically
trackable event, along with
when, where and how it transpired. Better than when contents were
sent/airmailed versus just evidence of
transmission. Improves upon the services of overnight couriers, registered
mail and notary publics by
combining all their benefits into one. System works via customer e-mailing or
faxing material to service
provider which stores in fairly tamper resistant computer filing system, then
transmits documents to addressee
via: fax, e-mail, and or post office's registered mail. See its huge central
description file.
MORE INFORMATION *
"ADAPTIVE DESIGN" SYSTEM (1D-010) - KINDLY READ THIS SECTION LATER
Covers All / Any Aspects Of Pat Application
Semi intro To Adaptive Design System, Also known as "Peter"
Adaptive Design 'adapts itself to needs by utilizing applicable resources
for each situation:
This Adaptive Design patent application uses needed aspects of the united
invention, to achieve the desired function. The need is determined through
1350

an 'analyzer. 'Adaptive Design 'tailors itself to needs based on available
resources.
Summary of Goal Oriented Design and Independent Claim:
User's (central computer) can 'designate the pathways [links] to
'designated functions
via which this can come about, by [only] utilizing the necessary parts from
the overall adaptive design's unlimited variations of possibilities within
the given ranges. At any one time, the (majority) of the hardware/software
(is) ignored for the particular application.
"Adaptive Design" is a large complex system capable of carrying on
thousands of diverse functions, even simultaneously when feasible.
'Adaptive design, and 'adapting (UIP) synergize each other - their
definitions/functions greatly overlap.
Summary rewritten using many parts (function) terms: 'User (has their
needs = determined by themselves or UIP) = Optional Occurrences:
1. User is 'educated and 'guided to [better] determine what [invention
or function] they want; and how to use and of benefit from it.
2. User and or 'analyzer [can] 'score which functions/inventions will
better meet the need [based on the 'behavior analyzer]. The highest
'scored function [can] be presented to the user/beneficiary.
The "Creator's" central computer is the center, which controls the
separate (portable) nodules. Product numbers (N) are the group or related
functions.
According to the *manufacture's carrying out of descriptions
herein: A nodule can carry out the functions for one or all N's;
only the software (via cartridge/transmission) need be altered for
nodule to carry out desired function. Simplified nodules may
receive additional parts to carry out desired functions
(attached/snapped on by user) according to (central computer's,
teacher's, common sense, book's) instructions. Nodule is portable
and can become a stand alone system after development, and have
more complex functions carried out with the help of the central
computer, and or the central computer's main frame hook-up (mfh).
*"Adaptive Design" system also~: helps users develop new
inventions with system's hardware/parts*; acts as point of sale for
merchants (users can try prototypes, and if happy place order for
stand alone N); allows user to program their N in desired manner
via central computer (which creates software cartridge for N).
This system via its CAD software functions allows the user to
cut and paste parts and desired functions creating impressions (eg:
audio/visual) of the listed product numbers and parts (product
specification codes, product numbers can become parts too),
derivations thereof, and new inventions utilizing the listed
product numbers and or parts and or functions. The central unit
can be done on a * personal computer (simple level only), on main
frame computer, and up to virtual reality.
"Adaptive Design" guides users to plug parts into each other
creating the desired products. The software (CAD system(s), etc.)
shows the steps for assembly and creates the cartridge for the
needed software to operate the newly assembled products.
+ User Information Programming 'adapts the output/invention design
and or functions.
1351

Description
* Notes:
-The user may elect to partake in the "Creator's" introductory self
tutorials.
-Most of the needed software (most functions in most product
numbers) can already be in the product numbers. It is simply a
command that activates the desired software application at central
terminal or product number (listed product on this application,
*derivative, *new invention) (R [remote])(via~: r; wire/wireless;
access; uk) in the designated manner to generate the applications
desired.
Notes:
-CRC designates the pathways via which desired
applications/functions are carried out. This designation is
carried out in standard electronic practice, eg: selects
parts/pathways according to their availability (in good repair, not
occupied by another application being carried out); simplest mode
(fewer steps for system, user); usage of elements (nodules, parts)
that are cheaper to manufacture, and or less likely to be needed by
other applications.
User can choose from multiple variations of each product
design, and or create the variation desired which will then be
manufactured (identical products in a quantity of one or more) by
the manufacturer designated by "Creator's" manufacturer database.
Develop inventions by getting ideas from system's database of
product ideas. Device will then select applicable companies who
may manufacture and or sell your product idea.
Use the database of most of our inventions from which to get ideas
about new products. Eg: user keys in "remote control" and gets the
product ideas in that category from which to get stimulation for a
new product idea. The ideas in the database are designed to
increase the creativity of those who read the ideas.
-Then user types in their invention.
-Next is optional: system connects to database of patents, and user
can search to see if a related invention is filed
.--(also can check other electronic databases describing such
inventions).
-User selects the type of letter they desire to mail out soliciting
their idea. Sample letters:
--to manufacturer, we wish to produce this invention with you, what
will be the cost? At minimum this gets manufacturer's interest.
--asks large retail outlets, wholesalers, sales representatives
from database if they would like to place a minimum sized order.
--letters go out to the mass media that is interested in such
product categories
.--although a quick sale may not take place, attention is achieved
and this is the key!
-system's computerized translator makes rough translations of the
product description and diagrams. The inventor's description in
his native language is also attached for mailing.
.-Letter is available in 18 languages, and can be selected by user
-User selects all the manufacturers from our database specializing
in said product categories. By picking any product user is assured
there are 20 - 200 manufacturers world-wide in that product
1352

category.
.-the system both creates inventions, and includes products and
product ideas which create, hence an applicable title for this
device is Adaptive Design.
SOME IMPORTANT CENTRAL POINTS ABOUT 1D-010:
Non-Information Processing Portion of Idea:
+ Briefly, this is how we consolidate the separate ideas into
one. The patent application titled "Adaptive Design" uses software
and or virtual reality, user is able to experience and work with
each invention. Next example: remote device (with transmitter,
receiver, display ("S"), speaker, timer, small computer ("C"),
microphone, sound synthesizer, sound playback, key board, volume
control, memory) interacts with system's main unit (with more of
the same features as the remote device, especially its complex
database and software) in playing out the many of the functions for
nearly all the inventions in the filing. The specifics for how
each invention would be processed by the software is very simple,
yet viable.
Other common threads for each idea: they all increase user's
creativity by virtue of the product ideas (future separate
patents), special effects of "Adaptive Design", functions for each
invention can be programmed by user. 98.5% of the inventions may
be electronic, all could later be made electronic in some haphazard
means.
The aim is for our descriptions and diagrams for each separate
invention to constitute a priority date in this or an updated
filing.
-[air pad, basic, cart, character, mfh, notifier, uk, osc, pi,
portable, pp, speech, cordless speaker tel, tds.
-------------
+-this system combines all the products in directories A, B, C and
D. However, remember each of the products are obviously, also able
to be developed separately from each other as well.
-the software and database are sold within portable computer ("C")
device which has many other features
-The term CREATIVE SHELL' as explained below in notes for 1D-010 is
one of the important methods of developing ideas with 1D-010
-The branching out of the database is explained in "Beginning
Introduction" - simply computerize all mentioned in this file.
-The structure of the database is largely explained in the paper
titled "Database". Additional details are available from other
parts of 1D-010's explanation.
-Some of the purposes of 1D-010 are: to make inventions, come up
with creative ideas, make money for the seller of 1D-010 and its
users, entertainment, education.
-"Imi" parts are interconnect able. E.g.: as in 3C292 Magical
Building Blocks.
FAIRLY IMPORTANT POINTS ABOUT 1D-010:
-user can order through 1D-010's manufacturers any/some of the
products listed in this or other filings of this inventor to: buy,
and or lease and or see pictures of and or get greater information
about.
--user can choose from multiple variations of each product design,
and or create the variation desired which will then be manufacturer
by the designated manufacturer (eg: one with rights to the basic
1353

idea that generated the creative shell)
-user can select and or develop many product characteristics, eg:
size, casing design, color, product's "pp" or "mp" or "cart"
Software and or Virtual Reality:
.-using software and or virtual reality, user is able to
experience, work - interact - play with the basic idea and or
creative shell (includes both the basic idea from 1D-010 and the
additional information about product provided by user by merging
with other parts and functions from 1D-010 database and or the
addition comes purely from user's mind).
.--This is for creating product ideas, and or experiencing those
products which might already have been produced and available for
order. This serves also as a type of interactive computerized point
of sale, accepting credit cards, etc.
-software is likely to offer possible suggestions and or directions
into the right branch see "Beginning introduction"] for the ideas
selected by user
-when user want more options about an existing and or new idea
proposed by inventor (his invention, or someone else's) user can
request how far he wants system's branching to seek out such
elements, eg: request can be made to find all elements pertaining
to "interactive" within one or more product numbers up to branch 2
or 20
--the product numbers can be selected via: key words, category,
keying in product numbers, or by any other element that separates
one product number from another.
-any product can be stored into 1D-010's memory, eg: patents from
another system's database; literature on electronic media about
product; etc.
-May utilize technology from Echelon Corp which works on bringing
a common intelligence to all sorts of electronic devices. Wall St.
Journal, June 19, 1995, p.R28.
* OTHER POINTS ABOUT 1D-010 HARDWARE DESIGN:
-waterproof and floats, e.g. for use in pool, bath, shower, beach,
lake, picnics, voyages
-makes sounds that please user when latter is in low creative level
according "score" (little typing on key pad, few products with
their files created); or user may request such sounds
-connects with music stereo; music synthesizer allowing user to
"compose" sounds that boost their creativity (while composing and
or listening)
-via "clapper" user is able to easily/creatively input data (just
talks system which converts sounds to computer ("C") signals)
One Diagram Version For 1D-010:
"artist"
.
1 memory......"cart"
. 3a-950 3D converter ............. 5 auxiliary hook-up
. microphone...3 COMPUTER...display/"notifier"
"air pad"/"remote"/"uk" .............. printer
....................... ...8 "distancer"
1354

c (central computer - most important feature for "Creator").
Sub-diagrams (additional parts that connect to the above #1
diagram, eg: the below connect with #1 via #1's Computer):
#2: R ~ C ('computer) ~ mfh
#3: uk / vc* / visual analyzer* / osc / mouse / morning* / locator*
/ distancer* / microphone / sound analyzer* / speech / any other
sensor(s) = R / C('computer) / MFH* = printer / display / score
#4: uip / pp / mp / mq / cart = R / C MFH*
#5: modem / fs / sp tel / tel = R / C MFH*
#6 : c = vr.
Utilizes software functions found in other creativity enhancement
and brainstorming software.
OPTIONAL MODES OF TRANSFORMING PRODUCT IDEAS IN THE USER'S MIND:
A number of the product ideas within this and other patent filings
can transform the ideas within the database, e.g.:
-3a-950 Picture To 3-D Converter (user can also input via "uk" in
conjunction with database and software for product design, the
dimensions of product and have them
-"artist"
-4a-430 Game Creating Machine
-5a-130 Color Sticks
3a-580 Remote ("R") control
5a-610 invention Store Software
5a-620 Virtual Reality Invention Laboratory
OTD:
pp; mp; toy; game; entertain; printer; mfh; cart (product ideas for
database; letter formats; computer ("C") based software language
translation systems); word search option of software, allowing user
to pull up all product ideas with the desired key words from 1D-010
or "mfh"'s database - in order to get product ideas, or do patent
searches; character; 3a-110 Antenna Art; Magic Air Pen; 5a-460
Touchless Switch; % remote; % notifier
POSSIBLE OPTIONAL CONFIGURATIONS OF 1D-010'S HARDWARE AND SOFTWARE:
3a-580 Remote ("R") control
5a-610 invention Store Software
5a-620 Virtual Reality invention Laboratory
OTD: pp; mp; printer; mfh; score (levels of interest from other
parties in user's ideas; number and or quality of ideas he
develops; % changes in "pi"); % tgh; cart; 3a-110 Antenna Art;
Magic Air Pen; 3a-820 Silent Light Notifier; 5a-460 Touchless
Switch; a1-040 Space Phone; a1-500 Personalized outgoing Message
(adaptation for people responding to the solicitations made by 1d-010's
user, e.g.: via user's mail or tel or fax...; personally
answers even E-Mail, Fax, ?letters, Modem transmissions, etc); *a6-010
musical necklace; remote; notifier
-database of parts applicable for most of the inventions predicted
to come out of invention are selectable and with prices. This
information can be attached to letter inventor sends to
manufacturer.
-this is more fun than playing chess or watching television. Also
it allows for hope that the inventor may one day become rich.
-the book on how to increase creativity as filed with the US
1356

. Copyright office is available on the system for reading.
.-additional trademarks to this product: invention man; inventor;
. let's invent; invention software [and database]; develop[er];
creative shell; creative developer; invent; create; Adaptive
Design; invention challenge
Software to assist brainstorming.
-One of them is produced by Mindling Corporation for about $200.
Their US Tel 1 800 253-1844. Also covered in San Jose Mercury
News, Sept 18, 1995 issue, titled 'Problem - Solving Software...'
-The type questions are selected according: to UIP for nature of
product or problem needing brainstorming; UIP of U; available db (databse)
on
sys, eg: if it can recognize and make suggestions for key words
supplied by u (user) (DB has files for related information on such key
words).
-OTD: "entertainment" and "mood" creative an upbeat psychological
/ sociological effect in U of sys (system) / sw.
OTD: display ("S"); fd-hdd; pp; mp; uk; mouse; date; tds;
%interactive; basic; %game; entertain; portable; printer; au; mfh;
bp; osc; speech; vc; egh; score; cart; for communicating with other
companies - tel, sp tel, tr, mo, fs, caller id, tel number memory;
cp; uq; mq; access; pi; character; multi-user; cc; * remote; *
notifier; remote ("R") control; % morning; portable.
Additional Notes
Codes: "N" designates product number. "CRC" designates
central computer of "Adaptive Design" - though the functions can be
the same as the N's computer, CC is larger (and less portable).
User can create inventions by finding pertinent parts and or
functions in the database of this patent application's product
numbers and parts. User searches via key word and or product
category, or "Adaptive Design" can do its own type of searches
based on the characteristics of the product(s) and or desires
(functions, applications, preferences) user is working with and or
keys in.
New cuts and pastes via software allow user to develop his new
ideas. He may also develop new software for the new inventions via
(Creator's) different model software which require (easy)
programming steps.
Examples of product numbers and parts are in patent
application. E.g., remote control, display, speaker, key board,
locator, memory) interacts with system's main unit (the "Creator"),
and or a separate central feature (computer). The assembled product's
functions are controlled by software. Applications can be any
invention in application, e.g.: the "Balancer" product. Balancer
causes speakers to adjust audio balance according to where remote
control transmits its location.
Common aspects of every electronic product number and part:
-They all increase user's creativity by virtue of their fantastic
natures. Refer to Steven Kays' materials on how to increase
creativity (confidentially filed in copyright office, etc.)
1357

re-seller/seller/ "MFH"..... 6 synthesizer...sound
network/manufacturer . generator..
(4 "printer")/"tel"/"mo"/"fa".....2 software amplifier
7 speakers
1: Memory: Databases; holds memory for sound generation; files
created by user
2: Branching: see paper describing how this file of separated
product ideas are organized and described and coded. Virtual
Reality and Software: 5a-610 Invention Store Software; 5a-620
Virtual Reality invention Laboratory; can get software and other
data from 1 and or "cart"
3: Computer ("C") is the central point; analyzes, converts and
processes all data; with minimal key strokes system will send out
solicitation letters or electronic signals (fax, e-mail) using
format letters
4: system may also fold and stuff envelopes; plus also print letter
sender's signature on letter, then stamp the letters
5: CD-ROM reader; pre-recorded music generating system; etc
6:
6a.-Analyzer Determines Sound Effects: sounds are generated to
stimulate user's creativity. The system selects appropriate
sounds/music according to, eg: combination of user's "pi", product
idea (such as idea's "pi"), what user has stated they prefer, the
type of product they are working an can generate applicable sound
variations (car invention will hear car and or wheel sounds
according to the feature and or direction in which user wants or needs
or can go in their thinking and or branching around in software.
6a1: user hears consumers using, speaking about, asking questions
about at store, and others selling the basic ideas or creative
shell ideas.
6b. -"Synth"
7. "Balancer"; (sounds appear to only come from certain parts of
room and toggles back and forth to create all types of interesting
and or unusual sound effects, e.g.: sounds toggle from left to right
every 3 seconds for 30 seconds; this slight disorientation in
listener can unlock their creativity); different buyers/users/etc
can each be heard on an one of more than four speakers.
8. "distancer": helps replicate real life experiences in using
product
8a. each feature of distancer can have "display", "cart", "uk", "fd-hdd",
"remote", "air pad", "microphone", "synth", "speaker". User
with help of 3 computer ("C") programs distancer's functions so
that it helps replicate many functions of desired product ideas.
Eg: the "portable" distancer can be programmed to be the following
products, plus other products from this inventor's patent filings
too: 3a-281a morning code alarm clock; 3a-580 remote ("R") control;
3a-630 sound analyzer; 5a-310 world clock; a6-010 musical necklace;
3a-790 magic air pen.
8b: (3 computer ("C") and its parts) will via transmissions provide
other signals to help "distancer" to function somewhat like the
desired product.
8c: system's pp and mp allow such programming
Additional Diagrams
#1: notifier / access - air pad = cart-date-c (computer)-display =
1355

-One or more functions for each product number can be programmed by
user.
-Functions can first be visualized/experienced by user/targeted
*parties on central computer's ~display",'"printer", *"vr", "osc",
*"character". And altered (to suit preferences) via: uip, pp, mp.
-Central computer's role in each product number.
-Electronic: Over 98.5% of the inventions are electronic [or have
potential electronic versions]. Remaining *1.5% can be discarded
from "Creator's" uses. Those,products not fitting with "Adaptive
Design" have their individual advantages. All products can be
toyed with on "Creator's" central computer.
-Simultaneous operation: "Adaptive Design" can control 100 or more
different product numbers simultaneously via ~: its separate ports
(wire/wireless) (one or more ports for each invention). Central
computer has optional multiple work stations (for visualizing /
then getting product numbers operational).
-Software: Each product number is controlled via and has the
benefits of software via: central computer's software (cAD, author
language), mp, pp, cart.
--Cartridges (from Creator/manufacturer) create completely
different applications from same hardware. Just insert cartridge
(into product number/ *central computer) and follow the (easy)
steps / system is operational soon thereafter automatically (cart
may turn product number/system on according to mp/pp/uip).
*-Product numbers can be made waterproof/float, e.g. for use in pool,
bath, shower, beach, lake, picnics, voyages. E.g.: product fits into
a waterproof box with: view to see display; sealed openings for
keyboard, speaker, etc.
*-"OSC": Makes sounds according to programming, such as to: please
user, alert him to malfunctions in assembled product, give the
status of an operation - such as two beeps means designated
function was completed satisfactorily. E.g., see parts: "notifier",
"score", "osc".
*-See "Entertainment": Product numbers are in their degree
entertaining (for user, parties effected by device)
-"Educational". E.g.: learn electronics; software; invention process
(CAD, assembly instructions); increases creativity (gives ideas for
related/new products); puts what one learns (via central computer's
software. assembly) into practice; central computer allows for
tutorials;
-Security: "access" (restricts usage to all or limited applications
(on a user by user basis (uip, "access" code))).
-User can select and or develop many product characteristics, e.g.,
one or more of the following: size, casing design, color.
-Manufacturing costs: Due to the similarities of parts, total
hardware, and type applications, there are savings on cost of
producing same/related parts and or products for each invention.
Software costs for all products are reduced as well.
-Boosts sales
-Market testing
-Interfacing: Unique possibilities for user
-Mobility: Portability of product numbers ("R" [remote control])
/ User need not be tied down to product number ("speech")
-Same/related hardware for multiple uses. Many of the same parts
are used (though their applications differ).
1358

--For simplification, "Adaptive Design" and or product numbers can
be designated into different hardware systems, each designated for
particular product numbers. Each area of applications can have one
or more "Adaptive Design" systems.
--Separating "Adaptive Design" into separate (sub-) systems. E.g.:
different "creators" for applications in: audio (input/output);
desk use; user's mobility; indoor/outdoor use; non-mobility;
security (sensing via audio/visual/vibration/ "access" /alterations
in uip); etc. Each product number can have all or some of its
applications/functions handled via one or more (sub-) system(s).
--Each product number / feature can also be completely separate from
the other inventions.
-Product number tailors itself to user's
needs/behavior/desires/situation, via~: uip, pp, *mp.
Notes On Common Aspects:
Due to the branching (see "Introduction to Product Descriptions"
paper) each part has the option of being connected to each product
number in multiple ways. The diagrams for complex potential wiring
between parts are in the application. Applications for each part
are described in the product number's central description or in one
of its branches; and or determined by: the user / *target parties
(via~: "creator's" central computer; and or mp/pp/cart which are in
the product number's separate hardware and or in "creator's"
central computer.
CONCLUDES TODAY'S INTRODUCTION TO UNITY SECTION
File: Claims / UIP All
SECTION ON INVENTION ADAPTING TO CHANGING NEEDS
User Information Programming. Independent & Dependent Claims.
Sections Of This File: 1. Introduction. 2. System Can Get Harder as User
Learns. 3. Links. 4. Patents & Our
Improvements. 5. System Thinks Like An Inventor Getting Solutions.
What is UIP TM? It collects and or receives data/input about both the
situation and a (potentially corresponding)
need. Its broadly termed "analyzer" ('behavior analyzer = 'score) determines
what will best meet that need.
This leads to an output which includes: a 'tailored function, or product
(schematic). See UIP, 1D [Unity of
Invention] and other files!
Independent Claim: User Information Programming. Creates a catalog of
inventions, tailored to the needs of the
manufacturer's marketing analyst, users, etc.
Dependent Claims:
1] Invention creating machine.
2] Compensation: When one part doesn't work properly, then other parts handle
things with UIP. See UIP-Link.
3] Links between parts.
4 - Other Dependent Claims] The functions, and numbered byproducts.
Notes on Dependent Claims] They have unique features, which also can overlap
onto the other dependent
claims due to the high interrelatedness of each page in this application.
Database of possible
functions/byproducts. For example the pet door which 'adapts to the situation.
UIP's Invention Creating Machine Claim shows:
How a list of needs are determined, and then is correlated with a list of
potential functions (inventions in the
1359

application). Each need and potential function has its own types of scores
used to match a need with an
available function or idea for an invention.
-Tailors itself to a need as defined by UIP in specs
-Suggests inventions (hopefully) in at least the degree of details that are
developable by (some) people skilled in
the art based from a list of options spelled out in say a million pages of
inventive ideas. Ideas spun out might
also be designed to trigger more (related) ideas from: readers (people), or
software based 'analyzing systems%.
Exclusions (What isn't covered by the User Information Programming claim):
. When there is only one type of response from the product based on what
happens to it. A difference in user or
most environments/situations does not effect a change in the response.
Examples:
-Items comprising a single uniform material like metal or rubber that responds
to pressure, heat, pulling, etc.
-Existing versions or parts of a: rubber band; hinge; stapler; thermometer
(controlled devices); ball; wire; match;
candle; oven; wheeled vehicles; text editing software like Microsoft's Word
® software including search and
replace functions; electrical power adapters /generators.
-When a person / organism pushes something like a button, then there is a pre-
programmed response like a light
switch, that has a single response.
-Many other examples
-Non electronic byproducts and how they are tailored is covered, but not the
non-tailorable duplicate-able
byproduct itself.
-See listed patent numbers throughout, the application, and the patent numbers
those applications refer to.
UIP-Link: UIP LINK = Optional ways of dealing with situation when a function
isn't working correctly. See
UIP-Link File.
U IP-GETS-HARDER
(Good Examples: Pet Door Paw Cleaner, 'Education Gets Harder, 'Therapy Gets
Harder)
Broad Claim: User must handle requirements A then B to gain 'access. Access
requirements change in time,
and are 'tailored to the situation, resulting in the same/related results.
-User must meet multiple 'designated criteria in 'designated 'order & timing
to achieve desired result from
system.
-This is one feature of our Pet Door Paw Cleaner. It teaches pets to move
their paws on mat before 'access.
Staging Of Rewards:
Examples:
-System 'Educates accessor 'interactively = rewards/'reacts by: allowing
'access, 'educating, 'guiding.
-'Guides 'Education Get Harder = as user learns. There's a gap in each lesson
getting harder via: 'order &
timing.
-Gain 'access to new features/functions as user learns: menu of options opens
up; pet gains rewards.
Criteria for receiving reward gets harder:
-Pet: gains 'access, grooming, food.
-User (humans): 'access to
- Level of reward increases as user's learned 'education increases.
.-Exists: the better user learns how to use existing products, often the
greater the benefit, e.g.: pushing down a
common stapler with the right speed and pressure = results in better stapled
documents; Apple, Oracle &
Microsoft based software. They would be enhanced via this patent application's
'tailoring.
3C292 Magical Building Blocks: Each combination has designated results.
'Guides user to learn 'tailored
skills: [re]learn to use [poor/[non]functioning] parts of human/organism
brain. 'Tailor tests user to determine
brain functioning 'traits = then designs 'educational program = then 'guides
and rewards user.
-See 3CE file.
* 6B240 Driver Identity System: can only activate vehicle after correct
actions/'sensors have been triggered.
W5 travel patterns restricted by such 'access behavior.
-See part Access-BA-Auto.
6G241 GPS Tracker: like 6b240, it rewards/allows 'access to 'designated
features based on: user
1360

performance/W5 'tracked object [did not] change locations.
3E061 Motion Tutor: Requires/'Guides users [to improve their] movements, eg:
the correct level of movement
gains 'access. System assumes user's movements will either change or improve
over time.
At first requirements can be A then B. Later it can be either: A then B then
C; or B then C [then...]; or C then
D; or * C then B.
USER = 'TAILOR =
ANALYZER =
ARTIST = enter artistic data
CART = 'access criteria/results from 'access
DISTANCER .TM.= movements 'correlated with 'access requirements.
EGH = lessons [once user achieved minimum 'score] leads to next lesson and
test requiring tougher test 'score
before progressing to next lesson.
EXERCISE = exercise gets harder = like 'egh/'tgh
GAME = play requirements get harder
GUIDE .TM.= 'egh
ORDER & TIMING .TM.
UIP-Link
Optional ways of dealing with situation when a function isn't available.
Types of New Linking Needed When (Designated Function Not OK):
Finding Alternative Parts and/or Inventions When Any One or More of Them Is
Not For Whatever Reason
'Accessible or Known.
1) Unavailable Part - Severance:
-it is not in [full] connection [due to wireless interference].
-computer virus detected via: anti-viral software program(s).
-function is fully or partially unavailable, e.g.: it's file(s) were erased or
corrupted.
-function is (too) busy serving other needs [for other users].
-[central] computer has other trouble/limitations ='accessing/connecting: a
function outside a more central
description of a function is not OK.
-conflict between functions: one function has dominated/interfered with
another function. Software [may] need
to be fixed.
2] Better Mode Found:
Finding new functions that [better] meet needs [even if all functions/aspects
remain [mostly] available: Another
mode/function is determined to better meet needs = then system goes via new
links/functions [to better 'adapt
itself].
Should portion of invention become unavailable: [Like the brain for a human or
other organism] Adaptive
Design can still function if almost any portions of this patent application
were removed, due to the many links
between its many functions. Also, 'Adaptation creates new links between
available functions if part of the
invention's hardware/software/peripherals damaged, functioning improperly, or
not [fully] unavailable. Each
function has many common functions built into it - and such functions can
duplicate/transfer/copy themselves to
other features [as a self-repairing/other 'adaptive mode].
-Finding/creating the alternative/new tree branching links when an applicable
link or 'associated function are
unavailable: 1. 'scores can be given to every possible link/[combination of]
functions that can [help] satisfy a
'designated need. 2. 'route with the highest 'score [based on whatever
criteria(s)] becomes the backup/default
mode = and need gets met [with only temporary interruption/aberration] until
new mode is
determined/tested/better 'adapted (after it [re]learns needs).
-A user [person/(another) system] can request/suggest/get 'guided into
determining alternative/better modes.
Figuring Out Something Is Not Working Right So Other Functions Compensate:
1361

Topic Reworded - Determining Something Is No OK. Should any number of
functions/parts be unavailable,
how the remaining parts/functions can 'adapt and still provide [all/some of]
the same functions. How to
[Automatically] determine a[current] function/mode is [not]-ideal/inoperable.
E.G.: When user: disappeared /
changed their need or there's a completely new user.
-Feedback/input from user / 'analyzer, e.g.:
--A problem might be suggested when a user (chooses to) deactivate a function
via 'remote control and or
changes from a function. Cause of this could be the function didn't apply well
enough, didn't apply at all, or
wasn't working. [Each] such avoidance of a function is [also] used for
creating the 'score.
-Signals sent to/from [central] and function - to [help] determine its state
of functioning based on whatever
criteria, e.g.: how useful it is/was based on popularity of usage =which
affects its 'score.
--Central Computer sends = signals to [peripheral] part/function ='seeking
[and asking for] ='score [how well,
function is operating = then 'analyzer 'reacts by [keeping mode/function and
or altering the mode, and or
'seeking a new function by creating a new link] = then verifying if the new
link/function achieves a [better]
'score.
--Function [continually] does self checks: like how existing software programs
check/fix their software issues;
have level of Kilobytes per folder and their files remained [constant /
adjusted as expected due to past
occurrences -'order & timing]; function compares itself with the same/similar
functions elsewhere in the
same/different unified invention.
-Chosen invention sends signals to 'analyzer giving 'status of its function(s)
/ ability to 'adapt.
-Fact(s) that other function(s) stepped in, or something suggesting such, can
indicate something isn't alright.
-If one function isn't working properly, another function might catch the
problem - because they might not
normally be doing something if the questionable function acted OK.
--'tracking might imply/state that 'access isn't working when: 'access permits
entry to entity, but the 'tracked
behavior of that entity does not match expected behavior for that user - such
as a bank teller seeking 'access to a
bank's foreign currency holdings available for withdrawal by clients not
connected to that teller's password.
-Multiple functions address similar issue - but one function isn't matching up
to the other functions. Info from
other functions [with similar goals] [suggests] that a function(s) isn't OK,
because it doesn't [come close to]
matching the info from the other functions. E.G.: a 'visual analyzer shows a
truck speeding through a red light,
but the 'sound analyzer hears a truck stopping at the same time via its 'time
date stamp.
DETERMINING A FEATURE(S) ISN'T IDEAL:
[Parts Section #11: U = Applicable Functions Of Invention [1. Gets poor
feedback. 2. One or more of the
following inventions/parts signals to the 'analyzer = that the 'designated
mode's 'status in meeting [previously
selected] [minimum] 'score has changed (for the worse)] ~ 'C (CPU) / 'Analyzer
=
[Parts Section #2] - How 'Analyzer Determines Something I.sn't 'Ideal: ACCESS
(Security Control)[not
granted (despite repeated attempts to gain entry by same user) (who otherwise
[from other 'scores] seems
legitimate)] // BA (Behavior Analyzer) [user isn't (as) happy] // EDIT [mode
of 'editing causes a poor 'reaction]
// EDUCATIONAL [user's 'score [school grade] not getting better [fast enough]]
// MULTI-USER [system
works for one user but not as well for other] // NOTIFIER [is activated when
it wasn't needed (because
user/system/'score for other function doesn't give a high score of needed
'notification, eg: user inputted the
'notification was a false alarm] 1/ OSC'[got bad 'score] // PS-ZONE
['predicted behavior/function in a 'zone
doesn't match ideal/past actions/'reactions/'scores] // QUESTIONING [types of
questions received 'score that
there's a technical problem [but probably not an 'access or other
(quantifiable) topic based on the theme of the
['order & timing of the] questions] // R (Remote Control) [used from non-
typical locations because old locations
had worse connectibility (due to interference or function at that 'zone might
not be operating properly] //
ROUTER [alternative routing is given/suggested] // SA (Sound Analyzer/Sound
Recognizer) [sounds don't
match 'predicted profiles] // SCORE [drops] // SEEKS & REACTS ['seeking
doesn't result in
'designated/historic/'predicted 'reactions] // SENSOR [multiple 'sensors (in
same 'zone) give conflicting
info/status] // TDS [doesn't match what's 'predicted] // T (Telephony)
[connections aren't achievable or go to
non 'predicted points/inventions] // TRACK [lost (full) tracking of
user/function, and or behavior of tracked
element changed (out of range)] // VA (Visual Analyzer/Visual Recognizer)/SA
[the range picked up 'scores
with (likely) malfunction so SANA needs to get feedback from other function
['predictor]/(the) user (by asking
her a question(s) like: 1. Is system functioning properly? 2. What score(s)
would you (user) give the
'designated function(s). 3. Ask questions / give 'guidance that doesn't
directly ask user to 'score the function,
but by inference (may) determine a malfunction is occurring - eg: user
couldn't provide (proper)
answer/feedback about something they should/could have known had system
functioned properly] // WA
(Walk About) [].
# Sections I and 2 interact.
1362-

Sub-Parts of UIP-Link:
Compensate =
Another function takes over for the failings of a non OK function. Part or all
of the non-OK function can be
compensated = to achieve a higher 'score for 'adaptation.
Function Not OK =
Function is not connected; fully or partially malfunctioning = and the not OK
function might need to be
deactivated / 'tracked for aberrant behavior [ba].
Licensing =
When a feature isn't or can't be licensed, then the system can operate as if
it were somehow inactive. Discover
what other links lead to alternative adaptable features.
.(Potential) Licensee: finds ways to reduce royalty payments by restricting
themselves to 'designated resources,
even when related features in the unity of this invention exist.
.(Potential) Licensor: discover how [potential] licensees can find ways to pay
fewer royalties, and/or infringe
upon another's'intellectual property rights. Then possibly block 'access to
such alternative routes [by which the
same feature and essentially similar invention could be constructed and/or
offered].
Anti Hacking method.
Patent searching tool for patentability: Explore [all] the variations
comprising a unity of invention.
Inventions are 'licensed based on ['W5 something is adapted].
A speedy license agreement is 'tailored ('edited) for the licensee, using the
form agreement.
Remnants =
-(Each) function/invention can have remnants of itself in the other functions
(limited to how we have links
shown). When one aspect of a function is not working OK, then its remnants
elsewhere in the system can [help]
cover for what's missing/not OK.
-Each [main] part is 'correlated with every other part = resulting in the
correlation/creation of a sub-part [file] in
each such part. Just because a feature is not working correctly, doesn't mean
all its sub-parts [located in other
parts] aren't OK = especially if [anti-viral/hacking/corruption] software
programs are properly executed.
-Remnants from less related remnants can compensate. Remnants in [less]
directly-connected / spelled out
functions can compensate: If function "A" isn't OK, then:
--Option 1: remnants of functions "B" found in functions "C through Z": can
compensate function "A". Etc.
--Option 2: Wider Abilities: remnants of functions "A" / "C" found in
functions "D through Z" can
help/compensate "B" (partly not OK) = so "B" can better compensate function
"A". Wider options based on
pattern shown from option 1 to 2.
--Option 3: step 1: function "D" remnants inside even, remnants of "E" = which
are both in "F" = can
compensate function G or [A to Z]". Diagram: f [e (d)] = compensate = g. Step
2: G / H remnants in G
compensates A. Step 3: A [helps] compensate A in above options 1 & 2. Etc.
--Options 1, 2, 3 and so forth offer even broader options, via unlimited
possibilities within the parameters of the
parts and presence of links. JUST FOLLOW THE LINKS - To See The Available
Forms of [backup]
compensations.
Synergy =
There's a synergy from having multiple functions/inventions, in that
alternative ones can fill in when another
one isn't OK. The more functions connected the greater the synergy in: backup
strength, 'adaptation. Just
another reason why all exemplified functions (invention numbers and parts)
listed are important in this
application.
EXAMPLES IN SPECIFIC PARTS:
Shows how it's determined a part isn't OK, then how to compensate.
U / Another Function = This N Sys [1. Determining Function's Not OK. 2.
Compensation(s) - Solving Problem
By 'Rerouting To Other Function(s)] ~ C =
ACCESS [determining what's not OK] =
IParts Section #1.1: U = 'Access =
IParts Section #2 - Access maybe shouldn't have been granted earlier as
evidenced by aberrant
occurrences: actions of past (correct) and current (illegitimate) users don't
match (per 'BA) as in actions
1363

in following parts. 'Access has sub-parts/remnants for all/portion of itself
in each (main) part. This
determines what's not O.K about the 'access part; then can compensate by
'analyzing/'tracking user via
the other functions (and or access's remnants inside the other parts). Then
'access' compensation can do
what 'access normally would do: convert user to higher alert, limit or deny
all access, etc.l: ARTIST
[user's style doesn't match behavior [ba] of correct accessor] // CART [cart
is/is-connected to another
function/user] // EDIT [] // EDUCATIONAL [user appears to know too much or too
little or some of each in
different subject areas] MULTI-USER [interchange between multi-users] //
NOTIFIER [current accessor
triggers notifier too much; or user altered W5 'notifier could function] // PS-
ZONE [user rarely goes to a 'zone]
// QUESTIONING [] // R (Remote Control) [] // ROUTER [] // SA (Sound
Analyzer/Sound Recognizer) //
SCORE [] // SEEKS & REACTS [] // SENSOR [] // TDS [] // T (Telephony) [] //
TRACK [] // UIP (User Info
Programming) [] // VA (Visual Analyzer/Visual Recognizer) [] // WA (Walk
About) [W5 it is used (as
'tracked)].
* Sections 1 and 2 can interact.
ANALYZER =
OTD: [Parts Section #1]: U = Part [] -'C (CPU)
[Parts Section #2]: ACCESS (Security Control)[shuts out access (to user);
locates villain who made 'analyzer
(and uses this info to fix/compensate [main] access] // CART [insert a
new/similar 'analyzer file/sw] //
EDUCATIONAL [lessons are given in chronological order, from where left off
without the 'egh option. 'Educ
teaches system how to fix/reprogram 'analyzer] // MULTI-USER ['analyzer that
works for one user [1], can
compensate [copied over] the aberrant 'analyzer for user [2] = [then [2's]
'tailor 'adapts 2's analyzer for #2
user] // NOTIFIER ['access takes over] // PR (Programming) [] // PS-ZONE [] //
QUESTIONING [] // R
(Remote Control) [] // ROUTER [element is 'scored = then 'tracked = 'seek will
'react by 'routing element
based on 'react's parameters] // SCORE ['access given to elements with proper
'scores] // SEEKS & REACTS
[automated responses with less 'analysis (like in non human animals)] //
SENSOR [sensed situation occurs [at
'tracked tds] = creates a 'score = then 'correlator connects info with
applicable function = which is controlled
automatically by 'seeks & reacts] // T (Telephony) [system connects to other
functions/systems to determine if
something is not OK / compensate] // UIP (User Info Programming) ['adaptation
occurs automatically without
'analysis].
ARTIST =
OTD: [Parts Section #1 ]: U = Part ['Artist /'Edit -(Semi)-Creative Thinking
relies on following parts] ~ 'C
(CPU) =
[Parts Section #2]: ACCESS (Security Control)[user taken to zones where access
allows] //// ANALYZER [] //
BA (Behavior Analyzer) [] // CART [] // EDIT [] // EDUCATIONAL [] // MULTI-
USER [] // NOTIFIER [] //
PS-ZONE [] QUESTIONING [] //ROUTER [] Il SA // SCORE [] II SEEKS & REACTS []
// SENSOR [] II
TDS[]//T[]TRACK[]//TAILOR[]//VA[] //WA[].
BEHAVIOR ANALYZER = 'tailor = 'tracking / 'score.
OTD: [Parts Section #.1]: U = Part ['behavior analyzer] - 'C (CPU) / [relies
on 'database remnants in:] =
[Parts Section #2]: ACCESS (Security Control)[offer tailored features based on
'access' permission]
ANALYZER [u = 'track/'multi-user (rely on database of that user)] // CART [one
of the functions or invention
numbers in cartridge form] // EDIT [] // EDUCATIONAL [] // MULTI-USER [] //
NOTIFIER [] // PS-ZONE []
// QUESTIONING [] //ROUTER [] // SA // SCORE [] // SEEKS & REACTS [] // SENSOR
[] // TDS [] // T
(Telephony) [] // TRACK ~ // TAILOR [] // VA [] // WA [].
U (User) = Part ['behavior analyzer] ~ 'C (CPU) relies on 'database remnants
in =
. UIP-Gets-Harder = 'egh / 'tgh.
BALANCER = 'ps = 'osc
BILL / BILLING = 'tracking/'score/'database
CAMERA = 'visual analyzer = ['tracking]
CARTRIDGE = any of our functions / inventions' electronic aspects can be
connected to the united system like
a cartridge. Different functions and inventions [with corresponding features]
can be plugged in as a replacement
[though may not be a full compensation - better than not having this option].
1364

-'tel connection = with another system /'sw / function that compensates for
the cartridge.
CHARACTER * = 'tailor / 'ba make up a 'character
CLAP ='sound analyzer ='remote control = device being controlled
COMPOSITION (of sounds) = 'microphone / 'keyboard = 'synthesizer / 'edit =
'computer = 'osc / database
stores music - and offers template audio pieces that can be 'synthesized.
COORDINATOR = 'analyzer.
U (User) / System = UIP / controls function /'transfer of signals output based
on what's 'predicted [as a need]
[completely compensates] =
UIP-DB = based on how 'database elements are 'scored
UIP-Guide = draws upon: 'ba / questioning / 'seek & react
DATA BASE ['remnant] data stored with other function(s) can replace/help data
in another database.
DISTANCER = 'positioning system, 'tracker ['order & timing]
EDIT = 'tailor the text; artist-edit.
EDUCATION = 'tailor = 'guide. 'Access appropriate files. 'Analyzer / 'Behavior
Analyzer determines what
needs to be taught. 'EGH. Answers to 'Questions = 'Guide / 'Analyzer /
'Tailor.
ENTERTAINMENT = 'tailor
EXERCISE = 'guide 'adapts the 'educational program to user. It 'coordinates
info from other parts.
GAME % = 'tailored 'guidance offers: 'egh, 'tgh, 'artistic 'entertainment.
GUIDE = 'tailoring the 'educational process.
INTERACTIVE = system 'adapts to the needed situation via: 'multi-media,
'entertainment, 'order & timing for
how it functions; 'predicting; 'analyzer determining what is needed w5 and in
what 'order and timing.
K (Control via keys) = 'Remote control; 'tilt. 'tailor determines user's needs
without user needing to key in
their interests. Creating 'artist related 'images as form of communication -
each 'image user creates or clicks
on = represents a different string of [hyperlinked / active] terms/buttons.
LOCATOR = Ways to locate an item:
1]'Clap your hand and [wireless] device's 'osc will sound.
2] GPS; PD'; 'distancer
3] 'Sound analyzer determines where the sound is coming/came from, its change
in location and speed.
4] 'Notifier alerts [when device needs to be notified about something].
5] W5 [mobile] device is in/out of 'zones.
6] 'tracking
7] * source of 'vibration
MIC = 'visual analyzer to sound converter part.
MODEM = 'Tel
MORNING = 'ba 'adapts to user's need by 'analyzing w5 user needs to be woken =
then the 'time date stamp
signals the = 'notifier.
MOTION SOUNDER = 'vibration analyzer = 'osc
MULTI-USER * = Different user determined via = 'access [password] /'ba / how
something is requested to be
1365

'tailored by user or system.
MM / MULTIMEDIA = 'analyzer 'coordinates how the following function = 'artist
['image alteration] / 'edit /
'composer / 'synthesizer / 'osc.
NOTIFIER = 'access / 'score / 'ba / 'sensor = are 'analyzed for shift in
desired functioning of parameters [based
on what's stored in database] = system 'seeks such shifts = and 'reacts by =
an 'osc.
ORDER & TIMING = system 'correlates what has/is/will be needed by its = 'time
date stamp /'score = 'reacts.
OSC (Outgoing Sound Communicator) =Audio signals to 'speakers replaceable via
= 'seek & react.
. When Audio Signal portion of 'OSC needs compensation: OTD: [Parts Section #
1]: U= Part ['OSC] ~ 'C
(CPU) [limits / alters what audio signals are allowed]=
[Parts Section #2]: ACCESS // ANALYZER [] // BA (Behavior Analyzer) [] EDIT or
'COMPOSER //
EDUCATION GETS HARDER / TGH [] // MULTI-USER [] // NOTIFIER [only high 'scored
items activate
'speakers] // PS-ZONE [only certain locations can send/receive audio
(signals)] // QUESTIONING [] // SA
['analyzes the sound in the audio signal before allowing it to compensate] //
SCORE ['scores the audio signals]
// SEEKS & REACTS [to 'designated audio signals] // T (Telephony) [censors
what signals can be 'transmitted)
// TRACK [only (un)tracked sound signals are transmittable] // TAILOR
['analyzer controls what audio signals
are broadcast W5].
. When 'Speakers of 'OSC are not OK: System sends [compensated] audio signal
to: 'vibrational mode that
might be audible [to humans/pets]; vibration used to communicate via signals
that are felt; 'speakers from other
parts of the same/different system; text info = connected to audio signal can
be broadcast / sent to 'screens;
lights flash ['notifying target user to: read their email /'screen.
Communicated via sending out smells.
PD (Positioning Device, GPS) = Compensated by [non GPS] features of:
'Distancers /'Locators /'Tracking.
They follow / identify locations.
TRACKER =
when certain 'tracking [sub]-parts / functions are unavailable [eg:
'sensor/"visual analyzer/'ba/'education] a
[bad] person can still be identified /'tracked via one or more of the
following:
1. System notes that user has made improper/questionable 'access [spent too
much time in highly protected
topics/'zones] = which is determined by 'scoring = the occurrence is then
'analyzed and system determines to
continue 'tracking / deny [full] 'access. 2. The pattern by which person is
[getting] 'routed = results in
'reactions [functions for which are likely to trigger the 'notifier /'tds
determines there's a lack of timely
payment] = then system 'reacts by further 'tracking /'routing person to
another topic/'zone [that has less/pseudo
confidential information] [so person won't know they are being 'tracked] then
info is fed to the
police/government courts [for prosecution].
-Loss of essential functions of [software based] 'adaptation functions would
be one of the greatest detriments
but would not stop all functioning.
Compensation relies on ['remnant files] in other functions based on: their
'database / what is predicted [as a
current or future need by (user)] / [automated - 'order & timing / 'seek &
react] / 'edits [censors] what [audio]
signals are allowed.
Concludes UIP-Link Section
STAGES IN GIVING REWARDS:
Examples:
-System 'Educates accessor 'interactively = rewards/'reacts by: allowing
'access, 'educating, 'guiding.
-'Guide's 'Education Get Harder = as user learns. There's a gap in each lesson
getting harder via: 'order &
timing.
-Gain 'access to new features/functions as user learns: menu of options opens
up; pet gains rewards.
Criteria for getting reward gets harder:
-Pet: gains 'access, grooming, food.
-User (humans): 'access to
. Level of reward increases as user's learned 'education increases.
.-Exists: the better user learns how to use existing products, often the
greater the benefit, e.g.: pushing down a
1366

common stapler with the right speed and pressure = results in better stapled
documents; Apple, Oracle &
Microsoft based software. They would be enhanced via this patent application's
'tailoring.
3C292 Magical Building Blocks: Each combination has designated results.
'Guides user to learn 'tailored
skills: [re]learn to use [poor /[non]functioning] parts of human/organism
brain. 'Tailor tests user to determine
brain functioning 'traits = then designs ;educational program = then 'guides
and rewards user.
-See 3CE file.
* 6B240 Driver Identity System: can only activate vehicle after correct
actions /'sensors have been triggered.
W5 travel patterns restricted by such 'access behavior.
-See part Access-BA-Auto.
6G241 GPS Tracker: like 6b240, it rewards/allows 'access to 'designated
features based on: user performance /
W5 'tracked object [did not] change locations.
3E061 Motion Tutor: Requires /'Guides users [to improve their] movements, eg:
the correct level of movement
gains'access. System assumes user's movements will either change or improve
over time.
For Techies: At first requirements can be A then B. Later it can be either: A
then B then C; or B then C
[then...]; or C then D; or * C then B.
USER = 'TAILOR =
ANALYZER =
ARTIST = enter artistic data
CART = 'access criteria / results from 'access
DISTANCER .TM.= movements 'correlated with 'access requirements.
EGH = lessons [once user achieved minimum 'score] leads to next lesson and
test requiring tougher test 'score
before progressing to next lesson.
EXERCISE = exercise gets harder = like 'egh /'tgh
GAME = play requirements get harder
GUIDE TM = 'egh
ADAPTED MENU To Interact With Pat Application's System:
. Drawing 06-12-19A Covers Steps In Structure Of Links Between Features &
Inventions:
1 User = 2 Software Menu (Home Page) = 3 Hyperlinks adapted to user = 4 What
User 'seeks /'experiences /
gets /'licenses (for their use) /technological applications.
. Explanations on above drawing:
-1: User can be (potential 'licensee, patent examiner, consumer, other
'accessor).
-2: (Limited) 'access given via user's 'mainframe computer / website /
invention's point of 'access.
-3: User and or system adapts ('edits) information that is available in
section 4.
-4: Alternatives Available Include:
--Adapted or generic features -> more adapted features for = user
--Any other (sub) feature(s) in our invention disclosures (for the specific
application sought), e.g. any of its or a
related feature's keywords
---The closer the 'association the higher on a menu can it show up / be
available for use.
--Type of technology, product category, (international) patent classification
code
--Drawings. (Real life) 'images (of it being used).
--(Available) 'licenses
--Status Options: what's available for license; type of engineers/engineering
needed to make a real life (fully
tested) model; 'predictions (market size, typical user 'behavior profile (for
San Francisco or Tokyo market);
related existing products (their prices); ethical 'score for companies
licensing our or related inventions.
--Intellectual Property 'Status: number of direct and less direct links
to/from a (sub) feature or invention
requested by user; infringement issues and or law suites for (in)directly
related inventions and (ethical 'score of
potential infringer plus ('guide's suggestion for deserved retaliation for
their bad behavior - with or without
economic gain to the infringed party)); legal opinions.
--Much more.
1367

Later read the detailed Adaptive Folder, e.g. Its file on how system comes up
with the invention ideas in this
application. For an updated list of inventions visit www.LicenseltToday.com
File: Claims / Door Access / Door Access Claims
File: Claims / Door Access / Door Access
Door Access Cleaner
Invention gets pets to clean their own paws. Unique device reduces dirt
tracked in by pets. Pets are guided' to
clean their paws. Pets walk on the brushy floor mat while waiting to gain
entrance through our electronic pet
door.
Dirt is removed from their paws while waiting for the door to eventually open
automatically.
Pets and people will always need pet doors with the best known cleaning option
available, and this is it! For
extra measure, the system has the option of beeping the owner just before pet
enters, so their paws can be
checked.
TRAINING [PET]:
-Initially installed without [major] 'access restrictions. [Can] 'educate how
'access is made. Animals quickly
learn and remember points of 'access.
-As the pet becomes accustomed to their new pet door, encumbrances increase
via ['order and timing]. The
required [waiting time] [increases]. The longer the pet waits frantically, the
more they step around and remove
the dirt from their paws.
-Line up/install more [cleaning] encumbrances over time.
BENEFITS: [Pets] learn to better clean themselves like humans.
-Invention more than pays for itself.
-Save costs on carpet cleaning and replacement.
-Decreases the likelihood of urine and feces being found on carpet during
pet's childhood and in old age [as pets
can't wait as long during such times to relieve themselves].
-Saves [human] productivity.
-More people will rely on pet doors, including those using designs dating back
thousands of years - a flap over a
hole in the wall or door.
-Happier pets and owners.
-Health: [pets don't freeze in cold outside, and reduction in uninvited
[animals]]. Less back breaking work for
people to manually clean pet paws - resulting in less [back] injuries.
-Safety: less mud [for humans] to slip onto on shiny floors.
-Dirt is what keeps people from getting [more] pets. Easier for people to risk
adopting additional pets as the pet
door reduces the risks of pets relieving themselves indoors.
-Huge niche world market, especially in wealthier countries.
CLEANING SIDES OF PET*:
-Pets are induced to brushing or rolling themselves against (standing/flat)
objects that will remove unwanted
elements: dirt, hair, insects, etc. This feature is less central to the main
concept of removing foot dirt.
-Teaching Pet: Owner can teach pets that the door opens faster when the animal
brushes themselves. Pet food
treats can also be given for learning any feature.
TIMER:
-System knows pet's presence on/near the mat/door via:
1. laser beam(s) which need to be broken (continuously or certain percentage
of time during the waiting period);
or 2. timing device that goes on upon initial nearby contact w/ door via
laser/collar transmitter.
-Maximum number of access times (coming indoors) can be set, to reduce
traffic.
PET WAITS (For Alerted Owner):
-(Series of beeps) alerts owner (in stages) that pet has/will probably (BA)
enter. Enables owner to check (for
dirt) if owner elects.
-Cage waiting area (past access' point) can:
1368

1. reduce dirt in cage area (like pre-entry area, or via other means), such as
when raining; 2. give (more) time for
owner to come; 3. allow pet indoor entry, without coming inside until owner
opens the inside gate.
BROADEN-ABLE TERMS:
-Pet: Any moving organism, from microscopic (amoebas to humans, or animals
studied/induced (for zoological
studies or agriculture). % Includes pet clothing, shoes. Dogs, cats,
(pet/raised) pigs birds/poultry cattle sheep
goats (fixed skunks) gerbils hamsters.
-Door: 'access.
-Inducing (pet): they (help be involved in) dirt removal process/system; (not
gain) access, or redirect to other
location/access.
-Dirt: debris on or near paws, or between toes; anything on or near pet
(fleas, vegetable matter (seeds w/
stickers) on fur, ticks, dander, dandruff, (shedding hair/skin).
-(Pet) Collar: gives access. (Embedded) pet ID.
-BA: connects UIP (of pet or master)= w pet's (behavior / needs of pet/owner)
-Access (points): home, stables, cages, any (artificial) boundary in/outdoors.
Threshold.
-Sensors: (paw) dirt level, pet location/ba, pet's (changing) distance from:
access point; owner's location in/out
[home], [hence required 'notification/access permission may differ].
-Cleaning Elements: doormats and other bristly or combing related devices. The
stiffness and length of bristles
and combing teeth can match the animal breed, size, (willing) behavior of pet,
how dirty the terrain is, etc.
Other actions pets are encouraged into:
-Not to bark/meow while waiting. Sound Analyzer' will deactivate or stall the
opener upon hearing such sounds.
For example, the door may not open for a set time period after any pet noises
or other nuisances (regardless of
whether other pet behavior parameters have been met).
-% pet learns new tricks: sensor is attached to determine how pet has acted
(w5).
Issues:
-No cleaning device may be perfect but this one is maybe by far the best.
OTHER CONNECTABLE PRODUCTS:
-might connect this device with other products to remove unwanted elements,
eg: vacuum pet door (= which
follows this invention in chain of entry events).
-create a housing over/around the mat helping to force the pet to stay, put
(on mat).
-[Fitted] doormats/brushes/etc designed for specific invention [grips the
replaceable/cleanable] [brush like]
cleaning device.
REDUCES DISEASE caught via: transfers between in/outdoor, zones. Dirty farm
animals coming into
proximity of poor farmers in undeveloped areas, eg: southeast Asia.
MAT / SENSOR TYPES:
-Placed (vertically): pet induced (via imbedded sensors / laser sensors) to
scratch paws/body to trigger access.
-The mat is neither too bristly to keep the pet from standing on it, nor too
weak to not remove a level of dirt.
Replaceable (fit in) mat differs based on type dogs, terrain (sand, mud or
vegetable matter issues), weather
(rainy).
-Dirt level.
-Also: 'visual analyzer, smell 'analyzer: they 'seek & 'react to [dirt on
entity (feet/tires)]
[BIRD / INSECT] EXCREMENT CATCHER:
Bird Gate: Teaches birds to poop before they fly inside the person's home.
-Cage is where bird gets their food, water, toys, etc.
-Bird bowel (BM) movement is the main problem with enjoying pet birds.
-Sensor' determines BM occurred. Then the gate opens automatically. Gate only
closes (slowly and gently) after
the movement sensor' determines the bird has come back inside.
-BM Sensor can be triggered by:
1. Bird BM smell analyzer.
2. Bird must have BM over any or part of bird floor cage. Sensor determines BM
via, A. (greater)
vibration (than the norm) from the BM drop. B. presence of any portion/element
of BM triggering sensor, e.g.
1369

dampness.
BIRD GATE CONSTRUCTION:
. General:
-Careful not to hurt or close upon bird.
-Perches placed on both sides of door. Bird then pushes the (non heavy) door
or curtain to gain entry. The
gateway becomes stiffer or less movable when in "closed mode".
-Bird Foyer with two doors. Cage design doesn't encourage pet to enter foyer
or doorway except when the
gateway is (visibly) open(able).
. Bird Encouraged Not to Remain Outside Cage Too Long (before they have the
next BM):
-Minimal food is (automatically) given at a time, so bird needs to get back
inside to feed often.
. Keeping out other [birds/insects/creatures]:
-Designated' birds wear tiny transponder on foot, only allowing their access'
-Useful for having birds which live outside too.
BASIC DIAGRAM: pet (paws) = floor (bristled carpet) ="access" (pet's collar)
triggers tds = after designated
time pet waits (on mat) = door opens (allowing pet inside).
FIGURATIVE DRAWING (TECHNICAL DIAGRAM):
User ('pet) = This N Sys [pet door opener] - C= ACCESS [pet collar designates
user; each user's different (RF
emitted) password allows differing access, eg: dirtier pets must wait longer
(even if a cleaner pet w/ access is
also waiting; entrance/*exiting prohibited at certain times: when raining;
humans wish to be left alone (while
having a party))] // ANALYZER [] // BA [times pets i.e. coming thru door] //
CART [attached to collar; emits
scent (to attract/repel bugs/other dogs)] // EDUC [teaches pet to wait by
door; TGH teaching pets to wait longer]
// MULTI-USER [each human/pet have different access, and control features, eg:
Mary wants dogs in house
during afternoon, while Bob (if he's home and his RF shows he's home) wants
them outside; so once pets, leave
they can't come back inside during designated times.] // NR [when pet/human is
in/outside notifying the
pet/user] II PR [] // PS-Zone [existing invention Steve Kays conceived before
another manufactured it: pet stays
within designated bounds (based on where underground wire transmits signal to
dog's collar, mildly shocking
them until they know not to cross the line.] // Q [u asks system to track' pet
behavior and is told how/when/W5
pet behaved/went thru door] // R [user controls door opening remotely - this
is easily a stand alone feature] //
SCORE [] // SEEKS & REACTS [seeks certain pet behavior; then allows them
access'] // SENSOR [motion
detector needs to be activated for designated time (TDS), minimizing chance
pet will sit and wait] // SOUND
ANALYZER [recognizes pet's noise (bark, meow, chirp) which may also be needed
to gain access; keeping out
unwanted pets] I/ TDS [] // T [user can monitor remotely how pet is doing; and
how they'were tracked'] //
TRACK [] I/ UIP [manner of pet access given based on user preferences] //
VISUAL ANALYZER [shows
(which) pet needs access; and if they moved and in what manner] // WA
[portable dog door (for when visiting
(grandmother's house)].
MORE STEPS:
Additional stages/aspects [to access process] might be added on/made more
difficult, in stages as [pet
learns/becomes accustomed] /[additional cleaning needed]. Can attach on other
[previously patented]
cleaning/'access restriction device(s).
OTHER ENTITIES SEEKING 'ACCESS:
. Clean Mobile Devices [vehicles]: [Tires / body] are/must be cleaned before
'access. Reduces contamination
spread. 'Environmental Protection. Steps might include: 1. going through
'designated [car wash] steps; 2.
['visual] 'sensor 'seeking dirt/discoloration; 3. Continued cleaning 'reacts
to earlier step's [dirt 'analysis], then
'guides/'predicts for additional needed cleaning steps. 4. Same/different
cleaning process [with different
cleaning agents 'designated for type [dirt] issue found.
. Work clothing / Space suits / other material or casing surround [humans /
animals / robots / mobile devices.
The wearer/possessor of protective material needs to initiate / handle steps
[on their own] [with 'guidance].
Items coming down [factory] conveyor. Patentable variation?
REFERENCES:
1370

h2p://boards.h9tv.com/eve/uhb.x/a/tpc/f/1974011632/r/2351090681/r/8791031681 -
87910316811 built a
"deck" made of stone dusk and pavers outside the dog door so that the dogs
walked across that before they got
into the house. I then had a variety of rugs that they walked over before they
made their way upstairs. Very little
mud made it upstairs. In this house
US PAT 5,546,895 Grooming brush pet door
A pet door consisting of an opening filled by the bristles of a brush or
brushes. An animal moves through the
opening by pushing aside the flexible bristles, which reliably and quietly
reseal the opening after the animal
passes. Moving through the brushes is as natural to an animal as moving
through tall grass or underbrush. The
brushes perform a grooming function by removing dirt and debris from the
animal's coat as it enters. The
brushes have high insulating value due to the volume of air trapped among the
bristles.
http://www.halfbakery.com/idea/Vacuuming 20Pet 20DoorA ring-vacuum that goes
around the pet's door. For
dogs or cats: A ring shaped vacuum cleaner attachment mounts around the pet's
door to the house. When the pet
sticks its head in the door, the vacuum is automatically triggered, and the
pet is swept of any dirt and fleas as it
wriggles through. Sure, it will scare them at first...
WEAK COMPETITION:
-Dirt Trapper: A cotton floor that absorbs water, dirt and mud from dog paws
to help keep your floors clean.
Non-skid latex backing keeps it stable on most surfaces. Price $24.95 - $74.95
www.plowhearth.com 800-494-
7544
KEY WORD SEARCH Ideas Include:
-track, dirt, mud, paw(s), clean(s), cleaner, blow [warm] air
-(door) mat, bristles, comb, rake
*animal(s), *rug, *carpet, fur, "(dirt) sticks to"
-wait(s), waiting, (in)patient, patience, electronic
-pet(s), door, petdoor, doormat, automatic(ally)
-More Parts: movement (sensor), RFID, collar
.PET DOOR ADDITIONS FOLLOW (PROBABLY FROM 2006).
Limited Doorway Access: Invention gets [pets] to [clean their own paws].
Unique device reduces dirt tracked in
by pets. Pets are guided' to clean their paws. Pets walk on the brushy floor
mat while waiting to gain entrance
through our electronic pet door.
Claim is for any entity seeking 'access, whereby a pause requiring multiple
non-identical steps are needed prior
to granting physical entry.
[ONLY ONE] PET ACCESSES AT A TIME: Step up onto platform option: only one dog
at a time. Door
closes after 15t dog gets in. Prevents one dog from doing the paw cleaning and
the 2"d from scooting in right
behind the 1st dog and through the door.
-Multiple pet doors, with one or more collars assigned only to specific pet
doors.
-Pet collar's RFID required for access. Keeps out other pets, wild animals
[raccoons].
[PET] KNOWS /'PREDICTS DOOR IS OPEN by one or more:
-sound (s)
-smell (s) of: food, inside the home
-(un)clicking of door heard by dog (s)
-door positioned in (slight) tilt position. Then door opens a bit when its
released (s).
-door opens partially (so dog pushes rest of way), or opens fully.
-pushing on it
-sees it moving [in wind] or vibrating or fidgeting from mechanical device *
DOOR OPENING METHODS: slides open/closed; opens up/to side, and out at (90
degree) angle (sticking
outside the house).
1371

MISCELLANEOUS:
Many related features in the 'Games folders, e.g.: 'access controls.
Most dogs don't get the dirt only on their paws, they get it up a little bit
higher as well. So maybe a
SIMPLE two stage process or a deeper material/brush to wash paw and foot. Or
(adjustable mat) whereby the
mid section reaches the pet's chest,
ADJUST WAITING TIMES: The user can adjust/'edit pet's/person's waiting times
for 'access for the
'designated/specific person/animal (dirtier pet / breed). Time is adjusted by
'designated occurrence, eg: big
dirtier dog forced to wait and clean self on mat longer.
-Diagram: Big Dog/('game) villain (w/ low 'honesty 'score)=more dirt (mud/bad
'tracked
history)=longer/shorter/altered wait/'access privileges (more / longer
bristles must be past thru) . Little
dog=little dirt=shorter waiting time at door. Programmed from collar/'PS to
door/'access.
. Time device working w/ locking mechanism, to lock after a certain time, so
that the pet may not come in/out.
Pet taught to either come home before too late, or can't get in; and or that
they can't go out after set time.
[WATER] CLEANING: from source of water or liquid is sprayed upon pet as
requirement prior to entry.
Maybe swim through water/pond/bin of water. Then maybe fan/air drier for next
step, hanging (dry rags to walk
thru) or other drying methods (used for any moving objects). Then maybe pet
must wait [in foyer (w/ warm
blowing air)] to dry [in cooler weather].
AREA AROUND DOOR RAKES THE FUR/CLEANS PAWS: Make the actual door made out
of/attached to
with some kind of cleaning device(s), door mats, plastic covered with cloth(or
bristles) so that when the dog
tries to kick/hold open the door they are cleaning their front paws. Dogs/cats
can enter legs/head first.
BRISTLES: Make bristles (very soft, like toothbrush bristles). That way, even
if the dog does not move
around a lot, they are still getting the dirt off just by the bristles moving.
IS PET INSIDE OR OUTSIDE? 8B-010 Pet Locator: (certain products from this
feature number are Not
Electronic) user knows if pet is inside or out, based on whether they past
through their special door or not.
-The way the door was opened, either going in or out, results in door shutting
in certain manner and easily seen
by owner whether they look at door from inside or outside.
-pet's collar has transmitter which shows if animal went in or out of door
(based on direction in which pet's
transmitter got weaker); transmitter shows what part of house or garden they
are in, by owner looking on special
screen;
-+ owner's receiver can be used to find animal's collar transmitter. Receiver
signals if owner is getting closer or
farther from animal.
-useful for locating children. Animals in large zoos; nature areas; etc.
-way door was opened also can trigger electronic signal showing if animal past
in or out of the doorway
-Footnote: This locality concept applies to any moving element other than pets
too, eg: vehicles going in and out
of a walled in zone; etc.
SENSORS: Detect dirt [on/in paws or fur]. A required 'score [for cleanliness]
needed for 'access. More
expensive version for smaller market niche.
-Sensors located on ground [inside] mat / sensors that need to be stepped on.
Also sensors placed on [wall].
-'Sensor types include: 'visual analyzers, 'smell analyzers, 'content
analyzers. While it may be difficult there's
the option of 'sensors being placed on the ends of bristles / other protruding
devices that [partly] fit between the
paw/foot's toes/fingers/%finger nails.
.--Other safe content analyzers might see through paws ['seeking dirt], such
as very bright light whereby the
'visual analyzer looks at the paws from the top.
Training: will be more difficult. But in time pets can learn that they need to
[repeat] the cleaning process to
gain entry. They [may] learn that dirt they feel between toes is enough for
them to keep cleaning, instead of
even trying to gain 'access.
-Training device / human trainer can dispense food/biscuits outside. Pet must
go through [different] types of
dirt/mess to [come back] to the gate. They need to clean self to get more food
from [similar] automatic
dispenser indoors. As only a little is given at a time [and one exit/entry] is
required between each serving, pet
can keep up the process days on end [without human labor time].
-[Pets] can be trained to do other things in like process, e.g.: clean their
fur. Simpler/Safe versions can apply to
human children [coming in from playing outside]. 'Exercise [and solve boredom]
[when recuperating from
injury and [pet] doesn't wish to walk/run/fly (bird)].
1372

-'Customization: computer read outs show owners 'W5 pets bring in less dirt
based on: time of day,
environment [rainy weather]. System/owner can 'adapt accordingly, e.g.:
increase 'access requirements [during
inclement weather]; give smaller food rewards and 'guide pet into more [self]
'education in learning to clean
their paws.
-Unfavorable rewards [see our other pet inventions] can be given when: pets
try 'accessing when [dirty]; they
walk outside near dirty [muddy] areas.
Most Of This Section From 2005 Patent Filing. Invention Inspired By Steven's
Neighbor Dog.
CONCLUDES MAIN SECTION OF [PET] DOOR DIRT CLEANERS
DOORWAY ACCESS CLAIMS
(Includes Patentable Concepts For Pet Door Paw Cleaner)
CLEANING ANYTHING THIS CAN ADAPT TO:
Run 'software test on text to 'analyze for its contents. Should it pass this
test then next test is required.
Remove features of an invention (including those in this patent application)
on an as desired/needed basis [in
'tailored fashion]. 'Edit 'seeks 'designated criteria ['scores what is needed
and cost/availability of
parts/resources/time/'education]. Helps simplify [aspects of (this)] invention
/ existing system(s).
.'Access: omitting criteria that effects one's 'access 'score. 'Order &
Tracking of 'tagged entities behavior [ba]
can [alter] 'access [let in person/animal/mobile device].
FORCED WAITING FOR 'ACCESS: [Pets] are made to wait before entering the pet
door.
-(Impatient) Pet Behavior Used To Get Animals To Clean Their Own Paws
-Entities are encouraged to conduct designated, activity to achieve the
desired purpose (of the owner). Pets are
motivated to act in designated manner to achieve their goal (gaining entry).
BA triggers actions based on: pet's
behavior / how designated actions are met (no entry, owner's wishes). Eg:
-Required waiting time (increases and or changes) over usage time. So pet
doesn't always expect that they'll
have to wait a minimum set time, the required time can deviate, (thereby
inducing impatient behavior where pet
may move more (removing more dirt).
KEEPING [PET] MOVING ON MAT:
System minimizes chance pets will just sit and wait, and not tramp their paws
on the mat. Methods to keep pet
lively:
-Sounds (of owners (coaxing pet)) = via osc/recorder/ba: BA = triggers OSC
when = motion detector doesn't
'sense pet motion.
-Food [odor] released at designated stages in time/place.
-Heat / Cold (air flow/mat) (according to weather/programming).
-Alerter: master knows when pet gains access. (Owner might (manually) remove
excess dirt). Animal trained
(by owner/sys) to wait upon entry (designated time).
FOYER *:
-(Semi) caged waiting area between geographical zones' can be useful in
isolated circumstances.
-Foyer becomes the pet's main home, from which they can go outside, or come
into the main part of person's
home.
-Maintain more control over pet's location, and dirt.
SENSORS:
-Required situation/result/'reaction is necessary for gaining 'access = then
'sensor gives 'access.
-'Sensors 'seek [dirt] [with an amount [not] to exceed] per 'score.
-Relies on more than 'predicted behavior to meet entry criteria.
-Weight and/or light 'sensors, e.g.: can give 'access to 'designated pets
during certain times of day (based on
changing day light hours).
Also See Following Feature's Central Descriptions: access, adapt, analyzer,
educate, game, gps, order &
timing, pd, predicts, ps, react, sensor, sa, status, tag, tailor, guide,
interactive, multi-user, va, zone.
1373

THE CLAIMS HERE ARE RELATIVELY NARROW EXAMPLES FOR THE WIDE AREA OF
TECHNOLOGY WE CLAIM. IT'S LIKELY THAT A PATENT SEARCH YOU MAY BE DOING
NEEDS TO DIG DEEP INTO THE BODY OF THIS PATENT APPLICATION, INSTEAD OF
RELYING ON WHAT HAS BEEN CLAIMED TODAY. THIS PATENT APPLICATION IS MUCH
MORE MULTI-DIMNENSIONAL IN ITS SCOPE THAN IT APPEARS ON FIRST VIEWING. WE
TRY TO MARE THE LICENSING SYSTEM A FAST, EASY AND ETHICAL PROCESS.
For Updates & More Embodiment Information Visit Us Now At
www.LicenseItToday.com. Thank You.
1374

Description

Note: Descriptions are shown in the official language in which they were submitted.


DEMANDE OU BREVET VOLUMINEUX
LA PRESENTE PARTIE DE CETTE DEMANDE OU CE BREVET COMPREND
PLUS D'UN TOME.
CECI EST LE TOME 1 DE 5
CONTENANT LES PAGES 1 A 313
NOTE : Pour les tomes additionels, veuillez contacter le Bureau canadien des
brevets
JUMBO APPLICATIONS/PATENTS
THIS SECTION OF THE APPLICATION/PATENT CONTAINS MORE THAN ONE
VOLUME
THIS IS VOLUME 1 OF 5
CONTAINING PAGES 1 TO 313
NOTE: For additional volumes, please contact the Canadian Patent Office
NOM DU FICHIER / FILE NAME:
NOTE POUR LE TOME / VOLUME NOTE:

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
GENIUS ADAPTIVE DESIGN
TABLE OF CONTENTS
FOR REVOLUTIONARY PAT APPLICATION
Did This Application Show Up In Your Patent Search?
Get Updates. View New Embodimerits'. =-
Visit.LicenseltToday.com (+1) 707-428-5000
Be Careful Not To Mi'ss Its Contents
APPLICATION'S FREE UPDATES: = =
INVENTIONSDIRECTORY/LicenseltToday.Com = '' '
INTERFACEPATENTAPPLICATION/LicenseltToday.Com
F E ATU RE S L I ST I NG /L i ce n s eItTo d ay. Co m
LICENSEAG REEMENT/LicenseltToday.Com
OVERVIEW/LicenseltToday.Com for this and future pat applications. Start Here.
PATEN TATTORN EY S/LicenseItToday.Co m
QUESTIONSANDANSWERS/LicenseltToday.Com
REQUESTANINVENTION/LicenseItToday.Com gives new inventions, or new variations
for yours.
TRANSLATIONS/LicenseItToday.Com Translations in 40+ languages coming
More at LicenseltToday.Com
INTRODUCTION SECTION 1:
Introduction Part i: READ FIRST - Then Key Word Search Interesting Inventions
Inside!
Features - short handy version. Read this soon.
Abbreviations - short version
Symbols - short version
INTRODUCTION SECTION 2: Read Much Later
Awards We Gave
Continuous Research In Past Decades
Search & Replace
Abbreviations & Symbols In Detail
Figurative Drawings: diagram codes and more
Less Common Features
Miscellaneous: Key words, Details on common features.
1

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
COMMON FEATURES: Moderately Described.
COMMON FEATURES: In Greater Detail. Read Later.
Access
Adapting
Analyzer (decides how to get inventions you want)
Artist (creative process)
Behavior Analyzer (adapts to user's behavior)
Balance *
Basic *
Billing (generates income)
Brain (creative process)
Camera * '
Cartridge (software license upgrade)
Characters *
Compose (creative process)
Content Analyzer
Coordinator
Dance (connects to what can move)
Database
Distancer (brings client to inventions)
Editor (adapts instructions, etc)
Educator (learn to use invention)
Entertainment *
Environmental Protection is important
Exercise *
Experience (improve user's experience so they spend more)
Game (concepts for non game applications)
Guide
Icon *
Keyboard *
Locator (find about anything)
Mainframe *
Manufacturer Programs
Microphone *
Morning Alarm (can remind about anything tide to invention)
2

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Multi-Media (optional ways to interact with inventions)
Multi-User (can adapt to each user)
Notifier (know what's happening)
Order & Timing (looks at patterns of events)
Outgoing Sound Communicator (optional speakers)
Pets *Predict (invention's future market size)
Prediction Software
Programming * -
Questions (system asks user what invention characteristics are wanted)
Remote Control
Routing clients to what they seek
Screen
Seek & React (system reacts by giving invention you seek)
Sound Analyzer (voice commands)
Score (measures how well inventions adapt)
Security (catch infringers, etc.)
Sensors
Software
Sound Vision (audio visual option)
Status
Synthesizer (any sounds adapt to user preferences)
Telecommunications (stay connected with inventions)
Therapy (feel better using inventions)
Tilt (joystick)
Time & Date Stamp
Track (know how invention was used)
Users (defining people who use inventions)
Visual Analyzer (adapts based on what it sees)
Virtual Reality (futuristic...)
W5 (invention asks what happened, where, why, when & how)
Walk About (offers variations for portable uses)
Zone (see Locator section).
THE COMMON FEATURES ABOVE HAVE THEIR SUB-FEATURES IN SEPARATE FILES.
The Following Common Features Are Separated Into Multiple Files. Their Files
(Sub-Features) Are Organized
Alphabetically Along With The Other Features.
3

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ADAPT:
Introduction & Tailor
Adaptive Inventions
Sub Parts
. Expand
Article
Code Sequences for software & DNA
Other Adaptations *
ARTIST:
AR Intro & General
AR IMIS
ARIMI
. AR Write
AR Cause
AR Crawl
AR Educ
AR ReadHelp
. AR ReadHelp*
AR Dys-Ed
AR Dys-IMI
AR Dys1
AR Dys2
. AR Dys App
Artist Misc*
GAMES Main Sub-Folder.
Includes Sub-Sub-Folders
with their files:
Games Intro (file)
GA LIC R: (sub-sub-folder)
-Collar Game
-Dating Game
-Dating Game Details
4

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
GA INVENTION & PARTS:
-Guide Behavior Modify
-Tailor Communication
-Tailor Match
-UIP Emerge
.GA3
-Predict Game Functions
-Puzzle Maze Guide
-Real Life Practice Game
-Real Time Interface
GA2
-Good Intentions
-Health Game
-Seek A Reaction Game
. GA I
-Games from March 2006
-Games Other
-Games from 1990's
-Invention Game
Game* (file)
GAME PARTS (Features):
-UIP Sub-Part Games
-Action Points
-Parts from our 1990's Games
-Artificial Intelligence UIP
-Industry's Common Features
-RPG Plot List
-UIP Big Facets *
-UIP Input Games *
. Upgrade Other's Games
LOCATORS (GPS):
5

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Introduction
1 G 104 Oceanic Miscellaneous
. PS I
. PS2
. PS Functions
. PS Zone
PS Feature Listings
PS Other
PS Miscellaneous *
PETS (In Addition To Pet Door):
Introduction
Parts
Sub-Parts
. Pet Door Notes (read later)
Expand
Patents
INVENTION DIRECTORY: They are listed in the above feature files, and below.
The initial section of each
invention may be easier to interpret until one may have read the entire patent
application. Start today and
explore by your key words.
Inventions In Following End User Categories Were Created Through Our Genius
System: Chemical related
for home and business use, locators, motion related, audio, pet adaptations,
plastic & mechanical adaptations,
telecom, jet lag reduction when lights set by alarm clock, track sea food for
your safety, voice & language guide
applications, etc. More in Other Files!
I Directory Inventions
J Directory Inventions
G Directory Inventions
E Directory Inventions .
D Directory Inventions
6

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
C Directory Inventions
B Directory Inventions
A Directory Inventions
DETAILED TABLE OF CONTENTS FOR THE BIGGER SECTIONS ABOVE
(CONTENTS FOR SUB-SECTIONS):
The following table lists multiple sections that group different files.
In capital letters are Section names; followed in order of presentation are
their file names.
The Game Section is further divided into its sub-sections, then their
individual files.
- * We continue to improve the interface to this patent application, while the
application itself evolves.
Visit our site for updates to the interface and other matters at
www.LicenseItToday.com.
INVENTIONS BY CATEGORY (A Small Portion Of Our Inventions)
CHEMICAL - Ties To Other Classifications:
Introduction
Indicator Patents
. Indicators
Parts
For Techies
.7GN
. 7GQ
. 7GR
. Chemical in General -7G
MOTION TUTOR:
Introduction
. Body Guide
Body *
Claims
7

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Claims *
Other
. IMI*
. For Techies
. Patents
MUSICAL;
. 5E080 A
. 5E080 B
. 9J Compose
Audio D-J
Audio Miscellaneous
Trigger Toy
PLASTIC & MECHANICAL:
. 6G Plastics
.6GE
. General Plastics
Sound Analyzer
Sports using our technology
TELECOMMUNICATIONS:
. Cell Phone Notifier
Noise Canceling Assistance
Keep phone ringing until you catch it.
Tools for Consumers using our technology
Toys using our technology
Travel Gadgets
Visual Analyzer
Web: A better way to send information, and prove what was deep inside.
8

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
I MISCELLANEOUS:
.3E
3G
.4E
. 4G280 Frisbee Adaptation
.5E
.5G
.7G
.9G
Audio in General
Cord Length Notifier
Cord Length Research
Invention - Motion Capture
. Jet Lag Adjuster
Point of Sale Software
"R" List Inventions
Sea Food Poisoning Safety
Voice Analyzer Pronunciation Guide
FIGURATIVE DRAWINGS
ABSTRACT
CLAIMS
Independent Claim
Dependent Claims: Interesting ways to search our invention directory in this
pat application and updated info
at LicenseltToday.com. The Genius Thinking Adaptive Design. Unity of this
patent application and its posted
invention directory. Access Systems.
Keyword Searching For Your Inventions Can Be A Quick Way To Discover Our
Revolutionary Technologies
Today
For Updates & More Visit LicenseItToday.Com
File: Intro To Pat / Intro6 Section 1
9

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
SHORT INTRODUCTION TO PATENT APPLICATION
Updates at LicenseltToday.Com
PLEASE READ!
FOR FIRST TIIvIE READERS: First read this introductory section. Second, locate
inventions by a keyword
search or its ID number. Third, carefully study table of contents, then read
from there.
Common features in each of the inventions view the simplified handy version.
More details are in the main
feature file where most abbreviations are spelled out.
First timers might ignore information preceded with a star "*", or dotdash ".-
". Enjoy the interesting patent
application..!
Central Product Description: The central description is laid out first by its
name and often preceded by its
product number, afterwards its description. Additional information on the
invention is explained in the
Branching section. Product ideas can be integrated with other product ideas,
or developed separately.
Seeking a specific range of inventions? Now do a keyword search of this pat
application. For updates and more
'information visit www.LicenseltToday.com. Then you can read about how our
patent application is laid out.
BRANCHING OUR INVENTIONS
Branching helps explain the likely levels of importance in comprehending the
central description. Concepts
further down the branching are ideas, which may be merged with the central
description, may be in the same or
different patent application(s) from the central description's idea(s). There
are many ways to branch the links
between this pat applications many sections. This introduction covers a good
portion of the variants.
* Reducing Space: The tree branching system greatly reduces repetitive
disclosures. The simple listing for type
of branching that the invention branches into: it informs the reader to find
that branch section in this and related
sources, for the remaining information.
* There are two sections for where the branching system is disclosed: first,
the product descriptions; second the
separate 'Features'. Applicable 'Features' supplement product descriptions.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
* Software key word searches for all the data in this and referred to filings
are (also) used inlocating related
data. Searches include: part names, product numbers, *% other data (particular
words or phrases found in
central description and mentioned in other parts of our filings, or *patent
searches in any (US) patent database).
Use our keywords found in the specifications, and specific keyword sections.
Both product descriptions, and Features, generally branch out in the following
network:
BRANCH 1: The first paragraph (if any) in the central description to the
invention, or common features shared
by our inventions.
BRANCH 2: The additional description excluding the following OTD (Other
Technical Details) (if any).
Branch 1 & 2 make up the central description.
* BRANCH 3: OTD following Branch 1 & 2. Drawn diagrams with their attached
descriptions in the same file,
but not covered in Branch I or 2. * Later Read Introductory Notes which
explains Branches 4, 5, 6, 7, 8, 9, etc.
Our system is more elaborate than a tree's branching. Links (branches) do in
many directions, and often link
back to the point where the user is in our inventive system. Links start from
where ever you are interacting with
the interesting system.
GENERAL iNFORMATION
Discover why this application was done differently from traditional filings.
* One of the main purposes of the "Features" is to reduce research,
development and manufacturing costs by
using similar designs within different electronic product systems. It makes it
easier to program, manufacture,
market and learn to use the system's more simplified, and repeated features.
" Any one or more features mentioned in a product description might be useful.
The product description
includes the central description, the part(s) with their appendices, and the
diagram(s).
Priority Goes To US Pat Applications:
Appi # Our Reference # Date Filed (Approx):
60/755291 US2101 Filed Dec 29* or 30, 2006
60/756607 Filed Jan 05, 2006.
60/778313 US2400D. Filed Mar 01, 2006
60/783018 US2404. Filed Mar 15,2006
11

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
60/786906 US2410. Filed Mar 28, 2006
60/852794 US2522. Filed Oct 18, 2006
USAAdapts2006-12 Filed Dec 19,2006 Filed electronically
This Appl PCTAdapts2006-12 Filed on Dec 19, 2006 Filed in paper form
The two Dec 2006 patent filings at USPTO (US Pat & Trademark Office) have
identical specifications. The
applications are identical except for the application forms.
This entire patent application is may be filed with updates within three weeks
for national patent application
submissions in different patent offices including the European Patent Office.
File: Features Intro / IMI S 5
FEATURES - SHORT HANDY VERSION
This File Gives Basic Idea For Each Feature.
Now Key Word Search Inside, Or Browse By Subject!
ACCESS = Gain access to electronic functions with a correctly keyed in
combination, etc.
ADAPT = Another term for Tailoring. See User Information Programming.
ANALYZER = Computer sofl.ware analyzes how to handle situation.
AP = Application: How invention can be used.
ARTIST = Allows user to make and edit images.
ASSOCIATE = Associating similarity levels between multiple events or digitized
files.
BA = Behavior Analyzer. Analyzes live behavior of people.
BALANCE = Speakers' volume adjusts according to where person sits. System uses
central point for two or
more people.
BILL = Billing: Charges users by amount and type of usage.
12

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
BRAIN = The Computer's brain. Combines: "Analyzer", "UIP", etc.
C = Computer. The center of the, system unless otherwise described.
CAMERA / LENS = The system's eye.
CART = Cartridges to be inserted into system. Frequently contains useful
software / databases.
CLAP = Clapper. Each combination of claps controls a different function.
Allows user to control invention
without touching.
COMMUNICATE = When any two or more people, animals or devices communicate with
each other in any
way.
COMPOSITION *= Electronic Music Composition: Another variation of product can
also be used to create
interesting music.
CA / CONTENT ANALYZER = Analyzes the physical, or database contents.
COORDINATOR = Coordinates different Features of system.
CUSTOMIZE = See our Adapt feature.
D = Diagram. This symbol often precedes diagrams.
DANCE *= Body movement generates sounds.
DATE = Internal clock, calendar, clock alarm notifier.
DB = Data Base
DISPLAY / S = Screen.
DISTANCER T'" = Signals whenever any two parts separate or come together.
Signals via radio waves if
separation is more or less than programmable distance. See other registered
file on distancer for details.
Distancer rM
13

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
EDIT = sw ('software) edits / screens out data before it reaches the user.
EDUC *= Educational: teaches interesting skills. Replaces human instructor.
EGH = Education Gets Harder T"' Adjusts to user's proficiency.
ENTERTAIN = Also used as form of entertainment.
ENVIRONMENTAL PROTECTION /E.P. =[ Customizes] EP friendliness!
EXERCISE = Also used as form of exercise.
FX = Fax transmissions.
=
GAME = Also used as an abstract form of a game.
GPS = Global Positioning System.
GUIDE TM = An instructor. Suggests how user might proceed. System guides user
so they can better use
system. Guide TM
INTERACT / INTERACTIVE = System interacts with user.
K = Key in. User manually commands system, keys in command or data, etc.
KN = Invention by Steven K ay s.
LICENSEE = User who uses invention.
LOCATOR * = Shows location.
M / MFH = Mainframe computer hookup option for more complex tasks.
MIC / MICROPHONE = Microphone
MM = Multi Media.
14

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
MO = Modem
MOOD = User's mood.
MORNING = Morning alarm.
MOUSE = Computer mouse.
MP = Manufacturer programs.
MQ = Machine asks user questions to obtain information so system can better
serve user.
MULTI-USER = System is specially designed for multiple users.
N = Product. Can also be an invention from S t e v e n K a y s.
NOTIFIER = User is notified on the status of any situation.
ORDER & TIMING / O& T = System reacts to the order and timing of external
events.
OSC = Outgoing Sound Communicator. Signals user when a function within the
device occurred.
OTD = Other Technical Details. For Techies.
PD = Positioning Device. Portable unit, which broadcasts its location to the
Positioning System.
PR = Program (software)
PREDICT = System predicts what will occur, or what user wants.
PS = Positioning System . Identifies the position of the PD (Positioning
Device) via its airwaves broadcast.
PS-ZONE = System reacts according to the location of element in question.
Positioning System Zone
Q User / System ask each other questions. Helps each better understand each
other.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
R = Remote Control
RC = Receiver
REACT = System reacts to occurrence as programmed.
ROUTE / ROUTER = Sys routes User / other (part of) sys to designated point /
program. A type of "Editor".
S = Computer screen.
SCORE = The status of situation and or user's performance.
SENSOR = Sensor. Senses via many means.
S&R / SEEK & REACT = System seeks designated occurrences, which intern causes
a reaction which
responds accordingly.
SA / SOUND ANALYZER = Analyzes type sound. Not important.
SOUND VISUAL ANALYZER = Converts sounds to visual effects; or conversely
converts visual effects to
sounds. It's "Visual Analyzer" &"Mic" interprets images into data: words
describing what it sees/hears; other
codes sys ("brain") can use to process ("brain") images/sounds.
SPEECH = System talks to user.
SP TEL = Speaker telephone.
STATUS = System shows the status of situation.
STEREO = Stereo
SW = Software
SYNTH = Sound synthesizer.
TAG = A user, or file, or other part is labeled in some manner. Details are
covered by the Tracker feature,
which relies on Tags.
16

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
TAILOR TM = System tailors itself to better function for designated purposes.
This is also called 'Adapt,
'Customize, and 'User Information Programming.'
TDS *= Time Date Stamp.
T / TEL = Telephone.
TGH = Therapy Gets Harder. As user's ability increases, system matches user's
newer skills.
TILT = Devices are controlled by how the stick is tilted. Each tilt position
represents a different function.
TR = Transmission/receiving via airwaves & or wire.
TRACK / TRACKER = Sys tracks or monitors actions of user, or system.
TRAITS = The traits of the user. User Info Programming adjusts inventions to
the user's traits.
U= User. Person or other party licensed to use the features.
UIP T"' += User Information Programm ing . System adapts to user's unique
needs by collecting information
about them. Also called: 'Adapt, 'Customize, 'Tailor.
UK = See "K".
UQ = User can ask invention questions.
VIBRATION = Vibration generated by device for specific reasons,
eg:'entertainment; notifier; form of
communication based on type of vibration.
VA TM / VISUAL ANALYZER *= Alerts when camera sees a change in its view. Not
important.
VR / VIRTUAL REALITY *= Future use with virtual reality technology possible.
Less important now.
WA = Walk About. Portable unit. Also interacts w(with) user via speakers.
W5 TM =. When / Where / How / Why / What
17

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ZONE = A certain area with defined boundaries. The area is also dealt w/
according to its distance from point
of perspective.
Each Feature Is Explained In More Detail Throughout Patent Application
Abbreviations & Symbols - short list
File / Feature Intro / Abb-Sym Short 4
COMMONLY USED ABBREVIATIONS & SYMBOLS
With Simplified Explanations.
Read Expanded & Detailed List In Its Main Section.
ABBREVIATIONS - COMMONLY USED
'D' = Figurative Drawing, Diagram.
'El' = Electronic / *Electrical
Exists' = The particular function described exists and is designed to
compliment the product's other functions.
Fq" = Frequency: transmission frequency via wireless or wire. Eg: digitized
electrical signals / codes;
infrared; radio frequencies [RF]; sound (for transmission purpose).
'IMI' = See Features (Parts) File.
'KN' = Invention.
'KW' = Key words to find related features in this application, patent
database, etc.
' Misc' = Miscellaneous
'N' = Existing product on market, or confidential invention.
'Obvious' = The simple version of what's described may or may not be (fully)
patentable.
'OP' = Option(s).
'OTD' = Other technical details. Read its section later. Or for techies.
PL' /'Plastic' /'PVC' = Productconstructed of PVC / other petroleum by
product.
"SW" = Software
Sys' = Electronic system.
'U = User (s)
'Ver'= Version.
w' = With.
WO' = Without
"Zones" = Designated locations. See "PS-Zones".
SYMBOLS SECTION
The following description is the beginning of a new section describing the
product.
-'= The following is the sub-section of the previous section describing the
product.
*' = This item may be less important to the central over-all product concept.
18

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
'.-' or '-.' = The same meaning as '*' and '-'. The '.-' is however only used
to begin a new section
describing the product.
'.' is lower in the branching, hence equal to **. Started using'=: instead
of'. ' in Aug 96. This is virtually
not used, and usage of this form might be an error signifying a period as
well.
'...' = Etc. Or the previous concepts can be one or more of the examples for
the said product idea(s);
This symbol is normally three, yet up to five dots.
When used in the product descriptions it designates the lines between parts of
a
diagram. The presence of one of these symbols shows the data is an actual
diagram; hence no need to write
'diagram'. '->' & '>' are same, and opposite of <-, <. They designate
direction of signals, '=' allows one or two
way signal transmission (<- and or ->).
t' = One of the more important aspects.
= This function significantly expands the product idea beyond the basic
concept. It might also be
too "far out" to be feasible.
'( )' or '[ ]' = Shows one or more of the multiple possible examples. One can
keep or retain what is in
the parentheses.
Includes a limited list of possibilities.
'P or '\' = Means 'And Or'. For example A/B means, A and or B applies to the
scenario.
'-' = Same as 'I' or '\' except a line is also drawn between the parts when
this wavy line symbol is
used.
information following the colon represents one or more of the possible
manifestations.
File: Intro To Pat / List Awards
TOP AWARDS ARE GIVEN TO THE FOLLOWING PEOPLE:
The following people from around the world are awarded high honors for their
creative contribution to this
patent application. Awards have been given since the 1980's for people's
creative contribution to this patent
application. The Award Recipients are for:
T Acevedo
A Akiyama
R Akui
P Akuna
A Alexander
19

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
S Alten
A Ayama
S Bazhinev
D Beach
F Bellet
R Bigham
A Bloom
BBock
G Boissiere
A Borg
V Borisovich
C Buhler
B Burns
D Callister
S Canfield
I Chenevey
M Chism
J Conca
H Contrino
A Cook
V Davidenko
B Demars
S Edwards
D Farr
A Fedorov
D Froseth
MFuji
V Galakhov
0 Galianova
S Gaisenyuk
A Giustino
S Golder
S Grinko
E Hauglan
D Heller
C Herlon
R Hollstein

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
H Kim
B Kornilov
A Kravitz
A Krilov
T Kwon
B Lantum
D Lee
D Lemmon
A Leshenko
V Lenivenko
C Macone
S Manzo
C Mason
J Mezzeera
B Nolta
A Nazarenko
K Nooruddin
F Pavez
A Procopenco
K Ramirez
S Richmond
C Rojoy
I Rubin
M Sanem
E Savage
M Scinto
S Senn
R Simon
B Smith
M Stamos
H Tanabe
K Thompson
O Tsibin
V Villaneueva
R Weiss
B White
H Young
21

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
More Awards Are Being Given Next Year
File: Intro To Patent / Continuity of R&D
OUR REAL LIFE RESEARCH ON ASPECTS OF THIS APPLICATION SINCE *
Read This Section Much Later
This Also Signifies Our Continuity In Researching This Patent Application. It
Includes Real Life Research in
Applying the Invention Concepts. In the US, Patentable Rights can begin at
idea conception, even prior to the
patent filing date as required in all other countries except the Philippines.
Research Examples:
OVER VIEW: OUR RESEARCH SUBJECT MATTER
Government security in: border check points when entering/exiting buildings to
country borders,
transportation: 'access, 'behavior analyzer.
. Adapting to cultural behaviors in Japan, Europe plus Former Soviet Union,
US, Mexico, Canada, etc.
Promoting the business incubator
Researching the functions of: commercial and related (residential real
estate), office business centers
(executive suites), business incubators (funded by government and/or private
sources). Many
sources/organizations on the internet: OfficeBusinessCenters.Com,
Technology.Gov, WorldBank.Org, Bio.Org,
Jetro.Go.Jp, *NewEnergyFinance.Com, EmIncubation.Co.UK
. Government: 'BA for government employees (located regionally and elsewhere);
citizens and voters;
expressing views publicly and through government channels (for needed
improvements and/or problem
identification). Problems with self interest of power players that does not on
average elevate needed
benefits/improvements for the (regional) citizenry.
'Environmental Protection: recycling; generating/saving energy. 'Track via
'VA, 'SA, 'BA.
Certain organizations obstruct the development of business incubators. This
helped our researching and/or
improving the business incubator concept and its process [even if final
results didn't appear totally novel.]
. Researching the creative thought process. 'Adapting ideas, features,
services to: culturally bound thought
patterns (purchase decisions that aren't all economically based [as determined
by 'ba]). This requires extra
'tailoring, since the role business economics plays in client thought patterns
more easily transcends cultural
lines.
22

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
How professors (of engineering and the arts), engineers, artists and consumers
behaved, in and out of their
research behavior patterns.
People's 'reactions to our confidential invention(s).
Simplicity of 'lnterface: how to present matters in simplified 'edited format.
Which features should be first be
explained (in abstract), (so users can be 'guided to appreciating/using other
'linked/'associated
features/services). 'Interfaces for: Business Incubator; Selling/Leasing
commercial/residential real estate
around the world; explaining our inventions; Helping people enhanceJ'analyze
their creative thinking process;
Importance of(}ob) labels/titles; Screening applicants ['access tests using
('ba)], etc.
Cost effectiveness:
-Unity: consolidating needs from 'multi-users, then 'tailoring services for
their common/average needs saves
costs, e.g.: incubator type features. One service becomes tied to other
features offered [unity of invention], even
due to proximity of client/feature, how one need links to other needs (upon
client being 'guided), familiarity
of [human] interface, more..!
-Cheaper to research live human actions, than build prototypes. Our inventions
are also modeled/'associated
with [our business] human/economic transactions [resulting in revenue
generation] from the research process /
release of future inventions.
. Confidential matters explored, a portion are disclosed here.
RELEVANCY TO (BUSINESS INCUBATOR AND/OR TNVENTION) FEATURES:
ACCESS = Police, ADT, Sonitrol and other US based security company services
were researched. Behaviors
of people correctly 'accessing building security system, and properly exiting
the security 'zones. 'Guiding
people in the 'access methods.
. Restricting 'access based on: 'behavior analyzer (background checks); 'time
date stamp; privilege to 'access
'designated 'zones.
. Passwords to use devices (copiers). 'Tracking usage, and 'associating this
with revenues, and generating
longer term clients (extended licenses). Cheaper fees per copies made makes
clients happier as this is a
frequent point of 'interaction for clients. This makes frequented
'interactions more affordable, and thereby
increases the amount of client satisfaction. Revenues from fixed, less
auxiliary services (office space leases)
might generate more income. When a feature is less reliable (copiers) consider
charging less for it (until the
invention feature is improved).
. Our pet door foot cleaner tied to people tracking dirt into building because
they failed to spend enough time
using floor mat.
ADAPT TM = Matching business to business (B2B) services to customer needs,
e.g.: phone answering
(services); giving 'access and 'ba related services (at the receptionist
desk). 'Reacting to people/companies
taking improper advantage of our 'tailored services.
23

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Communicating with people via alternative behavioral patterns, designed to get
'designated 'reactions.
'Seeking their interest by offering 'designated 'interfaces.
. Tackling deception in others: 'tracking their behavior without their
knowledge; 'educating them and others
via the 'order & timing of my behavior that I won't budge when they think it
will be cheaper for me to do what
they want. Establishing my consistency in not putting up with fraudulent
practices had a'predicted benefit in
having fewer conflicts (infringements).
. Making our business and other services more 'accessible via 'tailored
'guidance, e.g. few understood the
business incubator's services, nor our methods for increasing the inventive
creative abilities in people.
ANALYZER = Giving 'access: relying on security system data/'tracking to
improve 'access system [by limiting
'access privileges to parties with improper [access related] behavior.
ARTIST ='BA showing views people have of art. How 'artists / art creates
'designated 'moods, and effects
people's behaviors [as reflected in 'BA].
ASSOCIATE TM = Associations clients/employees can make/link with what they
see/hear/read ['va, 'sa,
'editing, 'ba]. Which links/'associations led to sales or using of services
[use/license services and/or physical
space rentals that were 'adapted by 'W5.
BA = Landlord behavior: how they exchange 'access for 'billing income,
balanced with risk 'analysis [based on
security (background search, 'ba), 'predicted client ['licensee] behavior.
BILL ='Track 'accessing of features in [monthly] invoicing. Which features
were used 'W5, and willingness
for clients to pay, regardless of how they 'associated a costlbenefit ratio.
Some services are so important but
people were less willing to pay for them [for 'ba showed such were expected
rights for their 'access 'license].
How different business incubators 'analyzed /'tracked this situation for
greater 'billing revenue, and client
['royalty] income.
. Billing 'software, eg: Excel software.
CAMERA / LENS ='access, 'ba, 'va. Security camera research.
CART = Digital flash card [with 'image] for [color copier / compute].
CLAP = Lights /'access [restriction] features activated. Knowing people are
building based on sounds in
hallway, etc. With sounds, lights are left on.
24

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
COMMUNICATE ='Telephony. 'Adapted our phone answering service to clients. Our
marketing 'adapted to
local behaviors and business styles.
COORDINATOR = Client needs with available services and building facilities.
DANCE *= Which body movements (of receptionist) generate 'predicted 'reactions
in 'licensees, eg: greater
pleasure ('entertainment), curiosity (interest in buying/'accesing other
features) to continue the positive
experience. Ergonomics (not hurt one's back, or fall).
DB ='Tracking'billable usage. 'Accessing database to: 'analyze 'W5 is using
features, so we can: increase
client satisfaction -> client retention (longer licenses) / greater monthly
'billings.
DISTANCER TM = Not loosing items. Keeping things where they belong. Tying pens
to clipboard. Theft
reduction.
ENTERTAIN = 'W5 'entertainment generates greater [long term] 'billing.
ENVIRONMENTAL PROTECTION / E.P. = Electrical consumption by [fixed] devices
like lighting, HVAC
[heating ventilation and air conditioning], personal 'computers, electronic
'gadgets.
. Difficulties getting people to recycle their wastes, and having them picked
up with a better 'interface for
[tenants]. 'Tracking, 'BA, 'Access ['W5 for pick ups; shredding documents].
EXERCISE = Devices [tenants] could want. Stairway = built =in tread master
[behavioral resistance to walking
up a single flight of stairs despite health benefits]. ADA [American
Disabilities Act]. Office gym installation(s).
GAME = Visitors in reception area playing [video / non electronic] 'games. 'W5
they are played.
GPS = Who did W5.
GUIDE = Clients learn more available features after they started 'licensing
something. Too much information
about available features contradicts invention's desire for simpler
'interface.
. Trusting / learning to use one function, can naturally lead to client's
interest/open-ness to learning about other
less or [un]related features, eg: [color] copier functions get complicated
requiring 'EGH.
. Friendly / Honest 'interface create synergistic effect in: clients trust
more when provider is [user] friendly;
user friendliness helps create trust. Tricky behavior [to maximize short term
profits] hurts long term 'billings in
many ways, eg: clients speak with each other. Clients 'analyze / ba the
services/invention features.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
INTERACTIVE = the more the better. Live versus automated phone attendants.
LICENSEE ( LICENSOR = Client and Landlord behavior ['ba]. How they
maximize/minimize, monetary
income/expenditures/royalty fees. 45 something is licensed/used. 'W5
licensee/licensors don't act in their
best financial interests [due to failure to see all the (linked/'associated)
benefits]. What behaviors/perceptions
('ba, 'associations, 'editing) cloud/effect judgment (business decision =
making 'analysis).
LOCATOR *= know 'W5 clients (tenants) are: helps connect incoming [screened]
telephone callers to our
clients. 'Tracking client quickens the phone 'connection in terms of:
quickening the 'connection / being able
to make the 'link (hard to do if the designated person and/or wanted feature
can't be found/connected to).
MIC / MICROPHONE = Security system's 'VA.
'BA of [receptionist on phone] shows what actions create greater 'billings.
'VA is form of 'access control: can visitor / potential client be trusted?
'Predicting future 'billings [how
much they will spend].
MM = Power point. Putting printer onto networks [for those with 'access].
Simplifying 'interfaces can also
reduce income [fewer people able to access complicated printer network]
generates less 'billings, but less
frustrated clients. Frustrated clients might be shorter term.
NOTIFIER = Improper 'access [usage] 'tracked by einployees/security systems.
PREDICT = client's [unstated] needs, and length of remaining a client. Study
their credit history, and use our
'behavior analyzer related process.
Q = know ' W 5 questions to ask
ROUTE / ROUTER = direct prospective clients to the services we 'predict they
need; or even to other
organizations based on their behavior profile.
S&R / SEEK & REACT = how we and/or clients 'seek and 'react to each other.
SYNTH = which voice tonalities 'W5 had 'predictable 'reactions in
listeners/users.
T/ TEL = business incubator phone system features recommended by OBCAI
TGH = methods to increase creative thinking (in conceiving inventions) got
harder.
TRAITS = of clients.
UQ = common questions & answers
VIBRATION ='track 'W5 people are walking [in building] [for 'ba]. What
features are used 'W5.
VA 'tracking business activity /[incubator employees] 'analyzing client
behavior ='tailor features/services.
26

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
W5 TM = usage patterns for 'billable services
ZONE = Real estate property rights. Greater usage of certain 'zones in
building create a behavior pattern of
users; whereby we 'react by 'adapting ourselves to their needs accordingly,
e.g.: location of our services,
equipment, etc.
Much More..!
File: Intro To Pat / Search & Replace
SEARCH & REPLACE TEXT FOR THE PAT APPLICATIONS VARIATIONS
important Simplified & Detailed Versions of this Patent Application
CHOOSE THE VERSION NEEDED
For Updates & More Info Visit www.LicenseltToday.com Or call California
Headquarters 1-707-428-5000
This File Shows Search & Replace Features That Can and/or Have Been Conducted
On This Pat Application.
To condense the application while providing instruction, search and replace
has been conducted in different
manners throughout.
New Paragraphs:
-Replace two returns (carriage returns) with a carriage return then a tab.
This results in omitting empty lines
between paragraphs (as in the original text version). The indentation starting
on the left margin eases
readability. This is better than omitting all carriage returns, even if a
symbol were used to designate where a
new paragraph starts.
Abbreviating Terms in General:
You might convert most of the common words in application.
Choose the 100 to * 10,000+ most commonly used words like "and" converted to
"&".
Published patent application should/can have a link to our website that could
give the entire content with
and/or without abbreviation - as a courtesy. We want people to get easy access
to this patent applications
contents.
Translating text into other languages. Adapt whats translated
The earlier parts of the patent application use fewer abbreviations. This
helps in learning and comprehension.
Files with fewer abbreviations, hence good starting points to learn our
system: the Main Features file, Access
Features.
. To condense and simplify the required reading of this entire patent
application; this pat application, singular
terms were often used, while omitting word suffix variations showing
plurality, past or present tense, and other
grammatical structures. Hence seeing a singular term such as "feature" implies
the plural "features" can apply.
27

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Links:
Alternative features can be inserted (by our software) where there are links.
Each feature has links to many
other features and their sub-features. These links are shown in various ways.
They include:
. Terms in brackets (like such) or [like this].
What follows drawings containing single equal signs [lines between parts in
our drawings], or colons can
achieve the same purpose.
-Empty (open space) in brackets, or after these mentioned equal signs and
colons show where specifications can
be inserted. Examples are found throughout this application. Remember empty
spaces aren't needed to show
the link's presence.
Miscellaneous Pointers on Adapting This Text:
. Spell out at least the full word, with or without extra words describing the
feature. It can be a few extra words
to more than a paragraph.
. The full description for an invention with its many adaptations might exceed
I,000;000 pages. This HIGHLY
IMPORTANT point naturally is because:
-The links made from a feature (step 1) go to many other pages (step 2). The
links in step 2 go to many of their
pages (step 3). Step 3 links to Step 4, 4 to 5, and so forth. Many ofthe links
make a full circle back to the
feature in step 1, via divergent paths. The pat applications introduction has
details.
. Use text editing software like Word for Windows or Apple; online programs;
do it in your (readers) head;
handwrite changes; etc. Save each variation incase one version is better
adapted.
Changes That Have Been Made In Portions Of This Pat Application: Correct and
or alter the grammar. Correct
miss-spellings. Capitalize Headings: New inventions, and new topics.
Search Strategies:=
. Search strategies are not normally included in patent applications. They can
be used to seek inventions in this
application and/or databases of other patents. While one alternative of this
patent application is not disclosing
them, we wish to: 1. Show additional examples for how related patents can be
found, despite the limited nature
of the suggested strategies. This further shows related embodiments to better
understand the inventions. 2. Be
user friendly, without requiring the user to be creative in conceiving good
key words.
See the Abbreviations Section For More Examples. Arrows show what a term can
be made into or from. You
can reverse the arrows, e.g. "with' -> "wP' in enough to show that "wP' can
be expanded into the word "with"
w/o (without) having another arrow going the other way. Arrows adapted this
section in making it easier for
more (not all) people to understand (and contemplate).
28

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
õ=.
Specific Terms That Can or Have Been Edited In This Application:
and -> &. & --> and
ao->!. ao-*&or. &or - and or
OTD -> Other Techie Details, or Other Technical Details, or For Techies (omit
any carriage return after it)
. Footnotes --* . For Tech ies
Lengthen:
w-->w/. w/ ->with
wo --> w/o. w/o -without
. optional - optional/alternative
U ->User
D: --> Drawing. . D--; Figurative Drawing. . D-> Diagram
Commonly Used Terms: Abbreviations & Expansions used are listed on their same
lines:
'D, Diagram, Drawing, Figurative Drawing. Often followed by colons.
'El, Electronic
'Fq, Frequency - the electrical type.
'IMI, Feature, Part, and maybe Function
'KN, N, Invention. Often followed by colons.
'KW, Key words. Often followed by colons.
.'Nr, Notifier, Alerts
'Misc, Miscellaneous
'Obvious, Exists
OTD, Other technical details, For Techies, Read later. Often followed by
colons.
S W , Software
'Sys = Electronic system.
U, User (s), Person
' W, W/, With.
'WO, W/O, Without
Abbreviated:
approximate(ly) -- approx
average --> av
especially --> esp
, experiment -- exp
. laboratory --- lab
maximum - max
29

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
month -> mo
negative (ly) - ~ neg
positive (ly) - pos
separate (ly) -* sep
. separated -> sepd
standard -> std
technical(ly) --- tech
volume -> vol
Features (Parts) Samples Abbreviated:
communicate(s) / communicated / communicating -~ comm
computer(ized) -> c
coordinate -> coord
invention or product -> N or KN
. notifier / notify / notifie(s/d) --> nr
OTD --+ For Techies (either label reduces confusing non technical people)
Remote Control --s R [not research]
Soflware --> SW
Sound Analyzer --> SA
. Telephone -- Tel
Visual Analyzer =-+ VA
Alter Invention Descriptions (Specifications):
Small --* Adapted Size
. Obvious --= Exists?
Fast -> Adapted slow speed
More --> Fewer. Quantity --- Adapted quantity
Optional -i Important (Aspect)
Expensive --> Adapted to fit budget
. Exclude --> Include
Seek Sought
Find --> Found
* Other Methods:
Labeling the last line of each file, before they are consolidated into an
application:
Ends File: = Concludes This File: . Note, all information and functions are
found by
accessing (with permission) all links tied to what the user wishes.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Zip text (to reduce memory requirements by putting it into a zip file). Zip
via manners that change the
memory required, with or without text changes.
. Replace words to something a person may not understand to: keep out of hands
of (children), people not
educated in applicable methods, security, etc. Maybe keep the change codes
elsewhere.
* Free Open Space:
Reducing Empty Lines: Convert all multiple empty lines from 3 on up down to 2
empty lines, eg: convert four
carriage returns to two carriage returns, then word downward to three carriage
returns into two carriage retums.
Convert two carriage retums into a carriage return followed by a small tab.
* Precedes less important material beginning with either * or .- or .-. Have a
uniform code.
-Reduce two (or more) empty spaces in or between sentences, to (a single
space).
-In the (original) text, new subjects often start at the left margin, on a new
line with a dot, dash, or double dash.
--+ A tiny circle might represent where one point or sub-point ends and a new
point or sub-point starts. Or a I
precedes a dash, and a 2 precedes a double dash. The idea is that the lower
the number the further down the
chain of broadness.
Replace two empty spaces between words to one space.
Replace empty lines with less space, (but more than whats found between other
lines).
Space before new sub-points. Alternatives:
--the shown example: paragraph's sub-point is a dot. Dot's sub-point a dash. A
dash's sub-point double
dashes. Details in intro.
--insert a tab (within same line as preceding sentence)
--code number for each new sub-point, eg: dot = 1, dash = 2, double dash =
3...
--sentences preceding sub-points may not have periods at their end.
Consider Not Searching & Replacing Designated Sections, e.g.:
. Reducing open space in pages with columns, e.g.: tables of contents; lists
of people receiving our awards.
Figurative Drawings (diagrams) using linear dots.
. Figure Drawings which usually are already very condensed using our special
method we claim.
The best way to experience this patent application is imagining how the entire
system will operate. A real model
is best as inventions and their features can be in one or more clicks (links)
away, depending on where in the
system you are at the time.
Concludes This Search & Replace Section
File / Feature Intro / Abb-Sym 4
31

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ABBREVIATIONS, SYMBOLS & RARELY USED FEATURES: In Detail
ABBREVIATIONS SECTION
'B' = This old symbol was changed to 'N'.
'Basic Idea' = The full descriptions for each product number. Includes:
central description and all its branches.
'Branching' = Tree Branching helps explain the likely levels of importance in
comprehending the central
description.
'Central Description' = The written description following each product
number's main listing. It is the central
part of the branching system.
.-This excludes the product number's OTD - Other Technical Details section;
but includes: aspects with any
symbol (except %), and the parts, used in the central description up to one
branch.
'Code' = See'Parts', or * 'Parts File'.
'Creative Shell' = Any additional product features provided by other parties
beyond the scope of the basic idea.
'D' = Diagram /Telephone*. Eg: DI is diagram #1, D2 is diagram #2. DI and D2,
if in the same general
section, should normally be related for the same and or separate products.
'Dev' = Develop, **development, %developer
' Dir" = Directory: of Kays' inventions. The first two spaces of a product
number have a letter which shows
from which directory the product file is from, eg: I B-050-022004 -> B. Sample
letter categories A, B, C, D,
E...
'Eg' = the following examples are only one or more of the possible examples.
Same as: '~', 'etc', '...'
'El' = Electronic / *Electrical
'Etc' = the previous concepts can be one or more of the examples for the said
product idea(s). Is not a complete
list. Same as: '~', 'eg', '...'
32

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
'Exists' = The particular function described exists and is designed to
compliment the product's other functions.
Omission of'exists' from any description never implies it is a unique feature.
'Fq" = Frequency: transmission frequency via wireless or wire. Eg: digitized
electrical signals / codes;
infrared; radio frequencies [RF]; sound (for transmission purpose).
'IMI' = See 'Parts File'.
'IOW' = In Other Words. The information might be reworded, with or without new
dimensions.
'KN' = Mr. Kays' invention. One or more inventions he conceived.
'KW' = Key words. Usually used for software key word searches, eg: to locate
files related to designated key
words. % These key words mentioned might also be used for electronic patent
searches of worldwide databases
to expand invention (applications).
'Letter Category' = See 'Dir': Directory.
'Letter Sub-Category' = The letter category has products from each of its
files divided into separate sub-
categories. Eg: letter category D has letter sub-categories: DE, DG, Dl.
'Misc' = Miscellaneous
'N' = Existing product on market, and or KN.
-definition up to about 1995: product number; one of Steven Kays' aspects of
invention; any product preceded
by a product number'; product parts are products too; "'Product Specification
Codes Appendix - US Patent
Numbers For Each Code'
'Obvious' = This has some chance of being obvious just in its simple form.
Obvious can mean not patentable
due to being too similar to other products. The fact that this term was used
does not say in any way functions
with this statement are more or less likely to be obvious.
'OTD' = Other technical details.
'OP' / Optional = Option(s). Important: this term is used to help clarify
descriptions, and/or offer alternatives.
An optional element does not in itself suggest that if used, it is instead of
something else. Each feature/aspect as
described is a variation even when such is not mentioned.
33

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
'Organism = Any live organism, which moves [unless otherwise stated]. Eg:
Humans, mammals [pets,
animals kept in captivity or found in wild, birds], birds, *reptiles.
%Microorganisms apply if invention can be
made to apply to them, considering their small size, eg: amoeba, *bacteria,
viruses. Organisms are commonly
described in the context of scientifically analyzing them via'ba, or
for'tracking their behavior.
' PL' /'Plastic' /'PVC' = Product constructed of PVC / other petroleum by
product / (hardened) rubber /
%vinyl / *metal / *wood.
'Parts File' = Product Specification Part, eg: "distancer", "clapper". Parts
File is the full list of all parts in the
'Product Specification Parts' paper.
'Product Category' = The type of product from the manufacturer's point of
view, eg: cameras, toys.
'Product Description' /'N' = The central description of each product number
plus all its branches, eg: OTD,
Appendixes, Diagrams.
'Product File' = The files within either a letter category, or letter sub-
category, eg: 2D, 2DE, 2DG, and 2DI.
'Product Number' /'N' = Most product ideas with a central description are
preceded by a # eg: 1 B-050-022004.
.-Each product number designates product idea(s) separate from the remainder
of the papers. Product numbers
are normally found in a product file with one or more product numbers.
'Product Specification Part, Product Specification Code' = Parts: The
identical meanings are the parts used in
the product descriptions. Each concept in capital letters within this 'Product
Specifications Parts' file or its
appendix, and used in product number's descriptions. The abbreviation 'IMI'
was used to designate the Parts
File, and IMI& the Parts Appendix.
'RM' = Read Me. Notes to better uhderstand.
"SW" _ ("Computer") Software
'Symbol'=Eg:_,().1.1,, +, 0,...
'Sys' = (Related (El)) systems, * system
' Ver' = Version. Eg: electronic or mechanical or plastic version.
34

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
'W' = With. For diagram (figure) purposes, %each "w" also represents a line
between what precedes and
what follows. W/In = within.
'WO' = Without
'Written Description' = Embodiments. It is the description of a product number
or part in the word form,
including all branches. Excludes diagrams.
"Zones" = (Designated) locations as described in part "PS-Zones". Eg:
differing zones in which (PS) is
located result in differing: effects, causes, processes, etc.
SYMBOLS SECTION
-' = The following description is the beginning of a new section describing
the product.
-' = The following is the sub-section of the previous section describing the
product.
= Designates information for the reader who has already grasped related ideas
without such markings.
This item may be less important to the central over-all product concept.
Realize that the lack of this part does
not signify that item is a central idea. This and related parts (-, .--) have
no bearing on patentability due to the
part in and of itself. This part may immediately follow or precede such a
possibly less important aspect. Also
included are any of its following subsections represented by Example: if a
part's element or section is
preceded or followed by *, the applicable are less important. An element may
have from one, to a maximum of
two * (** is less crucial than *) directly next to it.
.-The star * following the title of each part applies only when: the part is
used in any OTD section (unless
otherwise specified, eg by '+' which cancels out *); this type of star does
not apply when the part is used in a
description other than OTD.
"." = begins new main section within a file. Something like a new sub-chapter.
Followed by "-" which are
subsets of "." Eg:
. Edit: the program adjusts---
: Don't confuse "." with ".-", or "...", or a simple period at end of
sentence.
.-Such new main sections may also just begin after having skipped an empty
line. Sometimes main sections are
strung together via a single dash on left margin between sections.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
The same meaning as '*' and ''. The '.' is however only used to begin a new
section describing
the product.
'. = is lower in the branching, hence equal to **. Started using '-: instead
of'.-' in Aug 96. This is virtually
not used, and usage of this form might be an error signifying a period as
well.
= Descriptions following a colon are some of the examples for the invention's
description. This symbol is
much more important than may appear. Colons often can also be interpreted as
separate two sides of diagram.
The colon ":" symbol represents a line from the disclosure preceding it to the
disclosure following it. The
disclosure following the colon can also be a subset of what precedes the
colon. The colon represents what
follows as being 'includes at least the following', 'a plurality of...'.
-Additionally, something of an independent patent claim might be interpreted
as what precedes the colon; and
sub-claims being what follows the colon.
the previous concepts can be one or more of the examples for the said product
idea(s). This symbol is
normally three, yet up to five dots.
'=' '->">'* = When used in the product descriptions it designates the lines
between parts of a diagram. The
presence of one of these symbols shows the data is an actual diagram; hence no
need to write 'diagram'. '->' &
'>' are same, and opposite of <-, <. They designate direction of signals, '='
allows one or two way signal
transmission (<- and or ->). *'=' if used in Product Specification Parts
immediately after the part title in cap's,
describes the part referenced.
.-signals traveling on these lines may go via~: wire, wireless, telephony.
-also see 'Intro to Parts' file for detai Is
-when '=' lacks a space only on its left side, the symbol can also be read
(for ease of reading only), as a comma.
Eg: Activate the switch= then light turns on.
-the -> and <- symbols are arrow lines. %* If no conflict, or trouble with the
patent application, such symbols
can also be replaced with "=".
'O' or'o' = The following description is a separate product which might also
be combined with one or more
parts of the remaining description within same product number. These symbols
are not in capitals or quotes
when used.
: or '~' or'@'* = Listed are one or more of the possible types of functions,
applications, parts, and or overall
product designs. Not a complete list. '@' is rarely used, and if so, before
Mid-1994. 'A' is same as: 'eg', 'etc',
..:, '@'. Those items following'~' are treated as 'and or' if they are
separated by';'. This applies to what
follows ":". The 'A' symbol was used until 1995.
36

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+' = Important aspect. One or more of the ideas within the section immediately
following the '-{-' symbol may
be a central concept for the overall idea. However, lack of this symbol does
not signify that the idea is of no
central importance. Most places that might be labeled with '-V were not so
labeled, hence lack of the '+' has no
bearing (except possibly within the context off the surrounding 100 words on
the same/consecutively numbered
pages).
- if a part in OTD is de-emphasized by a star in this 'Product Specifications
Parts' paper, the placing of'+'
immediately next to the part cancels out such star.
"" = Represents parts. Used this in the 1990's Parts are either in
parentheses, or each of the part's letters are
sometimes in capitalized letters. If parts are found in the body of the worded
description, the part(s) refer to the
fully capitalized titles of a part in the 'Product Specification Parts' paper.
For ease of typing, the parts listed in
the Diagrams and or OTD (Other Technical Details) need not be in quote marks
or be fully capitalized. The
form of the part might change slightly, eg: for grammatical purposes, the part
can be in the possessive case.
The part's abbreviations were used until June 1996.
The single' symbol, and the "" symbols have identical meanings.
'D1d = This function significantly expands the product idea beyond the basic
concept. A subset of the idea may
be related to the central product description. Most or all aspects lie outside
but near the central product
description. Example: if the same part is referred to in different branches of
the description, those with a % or *
are effected accordingly in that particular branch, but % or * do not effect
the same part accordingly in branches
without the symbols. Only one % is placed next to an element, hence there is
no double %.
'( )' or '[ ]' = Shows one or more of the multiple possible examples. One can
keep or retain what is in the
parentheses.
(Used in embodiments / written specifications / diagrams./ how
mentioned_function might be put into practice.)
+- () include limited list of possibilities. Other elements (may) be placed
(additionally) within the ().
-Combinations: information in these brackets need not necessarily be read, eg:
omitted from description,
though they may still be needed in some capacity to enable the invention.
Descriptions with () can be read in
many different ways": w/ or w/o information in (); if there are multiple () in
description -> can use / ignore one
or more bracketed information in each the possible combinations.
--Use and or ignore one or more sets of information separated by '()', to read
each designated combination. Eg:
#1: [a(b) = c (d) ] can be read at least nine ways, such as #2: a= c(d), and
or #3: a= d. Each combination is
for different invention variations (for alternative uses). The greater the
multiple '()' occurrences spread
throughout the main embodiment, the number of combinations grows
exponentially. The '()' used in the
'branching' embodiments further increases the overall exponential number of
combinations.
37

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-These brackets designed normally to expand the N's description(s).
-Information within () are usually a subset of the part, eg: "sensor" = c
("analyzer") = osc: the line is drawn from
analyzer to computer ("C"), and lines are drawn from "c" to both "sensor" and
"osc". --Data inside '()' need not
be a subset, when it's a different / related idea. Eg, stapler (staples): #1,
staples could also be nailed in manually
without a stapler; #2, staples might be welded for non-connective applications
too. % If the issue of'()' being a
subset or not [without the option of both], then '()' can be considered a
subset (for patent purposes).
.--D: legs = toy robot (sensor/c ("analyzer" (software))). For (printed)
schematic purposes, software is inside
analyzer, analyzer inside c, c inside toy robot, sensor inside toy robot -
(for purposes of this diagram). Toy
robot could have different insides since () are limited possibilities, eg: toy
is purely mechanical.
.-Sometimes the left bracket is keyed in with the accidental omission of the
following right bracket, eg:
(analyzer) equates with (analyzer.
.- When () used after a patent number: these are inventive ideas (new
applications) based on KN's and patent's
configurations.
f' or '\' = Means 'And Or'. For example A/B means, A and or B applies to the
scenario.
Another example: in a diagram the '/' symbol is used as follows: [part 1/part
2= part 3= part 4]. In the
preceding example, part three's diagram goes to part's I and or 2, that is
there is the possibility for variations.
Part 3 has a line to part 4.
* Details Follow: Example: [part l/part 2= part 3 = part 4/part 5] is the same
as a: >3< shape diagram, 1 2 4 5
go around the 3 (in clock wise pattern); and or b: can be split D1: 1=3=4, D2:
2=3=5. (No line is shown
between 1& 2. Important: a line is not excluded, and %might be drawn between
the two parts if viable.). In
isolated places a'\' may have replaced '/'.
-Combinations: there are frequently multiple '/' in N descriptions -> use and
or ignore one or more sets of
information separated by'/', to read each designated combination. Eg: #1: [
a/b = c/d ] can be read at least nine
ways, such as #2: a= c/d, and or #3: b = c. Each combination is for different
invention variations (for
alternative uses). The greater the multiple '/' occurrences spread throughout
the main embodiment, the number
of combinations grows exponentially. The '/' used in the 'branching'
embodiments further increases the overall
exponential number of combinations.
'--' = Same as '/' or'\' except a line is also drawn between the parts when
this wavy line symbol is used. Eg
#1: 1-2=3=4/5, lines are between 1&2, 1&3, 2&3, 3&4, 3&5, %maybe 4&5; 1/2 go
thru 3 to connectwith 4/5.
The lines between I and 2 are optional, since the '-' symbol could also be a
diagonal slash, in another version of
the diagram.
-see 'Intro to Product Descriptions' for details
.-[if this file's symbols doesn't transfer between computer software systems:
its the upper case of the "' single
sub-quote key as found on the Toshiba T1910 notebook computer, while utilizing
WordPerfect software 6.OB
38

CA 02635954 2008-06-30
...........
WO 2007/081519 PCT/US2006/048704
...
for DOS. From 1991 to now (Jan 3,1995) all data entry was on Word Perfect 5.0
for DOS or higher. Since
4.94 the Toshiba T1910 computer was used.
the semi-colon is a break in thought flow (weaker than a period, yet stronger
than commas). When
there is a diagonal slash in the sentence followed by ';', the semi-colon
should normally break the lines in the
diagram. See the '/' section.
information following the colon represents one or more of the possible
manifestations [%applications for
said function(s)]. The 'Qsymbol is similar to the data following the colon.
Data following ':' are more likely
to have the possibility of stepping beyond the bounds of the idea / terms
directly preceding the colon, than data
directly preceding the '()'. The connected symbols '~: are same as ''.
Sometimes there's information followed
by colon, which is then followed by another':' within same sentence, in which
case this can mean that data
following first colon is a semi-subset of data preceding it, and data
following third colon is a semi-subset of data
following first colon, or data *preceding first colon.
Old Diagram Symbols: used in material done up to mid-1993. Vertical lines may
also be represented by "I", a
dot ".", or * "L", etc. The latter shows additional parts that are on the line
below and directly to the right of the
"L". Sometimes a line of blocks scrolls over to the next line or page.
OLD ABBREVIATIONS SECTION
Introduction: This section covers old abbreviations and symbols, which are
mostly discontinued in newer
inventions. Older inventions can be those found in sections A, B and C, or
which have those letters in their
product numbers, e.g. "2A400".
Ad or Adv: advertising
ASAP: As Soon As Possible
Cat: product category, eg: tv; tel
CIS: Former Soviet Union or also called SNG
Dir: directory, eg: 'A Dir' are of first N developed
DM: Direct Mail
F: fax
G: cv, job hunting; grant (from foundation/gov't)
H W: help wanted (advertising); new people needed
ll:Innovationlnstitute
L: tegal
Pls: please
39

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
N: Prod, Product # (usually one conceived by K a y s). Since aboui 1996 "NK"
meansproduct,conceived by K
a y s, and "N" means products and inventions in general.
Mk: marketing
Moss: *Moscow
Mu: Musical, music
J: Japan
R: research
Req / RQ: requirements; require
RF: Radio Frequency. * When feasible it includes Infrared transmission and
reception. D:
device# 1=tr/rc=tr/rc=device#2
SPB: St. Petersburg, Russia
T: Telephone, see' Parts'. Old definition:
letter / *mail
TYO: Tokyo
U: you*, newer definition is: user
Ur: your
X: document: for publication, viewed by public
2: Product Idea Development
4: Public relations, articles
8: Check to see who is copying my ideas
\: Diagram Parts -'And or designating if a line is drawn between parts. See'
Parts'
if no line is 'necessarily' drawn between parts in diagram. See' Parts'
** OLDER VERSION OF PARTS (FROM 1990-1992)
The newer version as in main ' Parts' superimposes the descriptions herein if
there happen to be two different
definitions for the same Parts.
A = and
AT = game piece communication, each player's piece communicates with each
other and the central
processing machine via air waves (probably not wire)
AT = and or
AU = for adult level 16 years old & over
B = has buttons (not mentioned if PP); "K"; *"R"
BA/KI/CH=for baby use 0-4 years old / kid 4-8 yrs / child 9-15 yrs
C = use products as helpful exercise companion & or guide, rule setter;
"exercise". New version is
"Computer", if doubtful about interpretation use "computer".

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
CS/BU/CL=for consumer / commercial use / client application
D = this is the old definition for "T" (telephony) ( built in (cellular or
standard tel))
DA = has internal date, clock, timer needed for sw functioning; "tds"
DD = "S"; built in digital display (eg: LCD), may flip in for compactness .
DS = "S"; machine displays on crt, digital display, or print out (regular or
thermal paper)
EP = electronic parts: product operates by use of microchips, processors & the
other standard elements for
this type electronic product; "C"; "basic"
EL = teaches practical (not necessarily psychological) skill. Definition used
from late 1993 is el = electronic.
"educ"
ET = new type of entertainment ('entertain')
EXT Functions on flat or semi flat surface, table top, this option doesn't
operate on batteries, or vibration
power.
FIN = finishes product option descriptions
GI = game for one person only
G2 = game for two people only
G23 = game for two or more people. G12 = for I or 2 people, G3 = three people
only.
GGH = game gets harder. as user's ability at condition improves or worsens,
machine will compensate by:
being easier, harder to play (in terms of skill, quickness.._)
HM/OF/SC=for home / office / school or laboratory use
IQ = special version for people with IQ within top 2% of population
JK = for use as humorous fun, an unusual novelty, 'entertain'*
M = Old definition: machine (product described within product # only). New
definition that was applied to
new writings as of 3.94: "MFH" [Main Frame Hook-Up]. The old definition is
still found in writings made up
to 1992.
MA/FE = for use by males / females
ME = memorizes previous input signals in its "C"
MI = The elements of this product are interchangeable with one(s) mentioned
and or is based on the basics of
the other.
NRL = not real life game, played by interfacing with electronic game and or
board.
0 = or
OD = telecommunication device working via air waves; "T:
PG = programmable by user (by keying into its plastic buttons) and or
manufacturer; "pp"; "mp"
PO = built in printer prints out info/data/pictures onto paper, has paper tear
edge, thermal or [regular] paper;
"printer". "S"; *"fs"
> .
RH = rhythm
RL = real life game, played in or outdoors, requires people moving' in an
environment
SD = speaker telephone; new Parts "sp tel"; "T"*
41

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
SC = sound communicator: receives ("mic") and or sends ("osc") mechanical
sounds, & or human words &
or voices
SH = show
VC = person controls sound volume; "osc"
TD = technical descriptions
TO = toy use, *'entertain'
TK = for use as a fun trick, prank; ' entertain'*
TM = trade marks for product
TSC ="mic" (internal or external) records sounds facilitated by user (onto
microchip or possibly tape), and
can be played back in entirety or probably in edited or other altered format
using built-in synthesizers; "osc"
UR = your
WH = which
only when used in TM: separates word order, 1 st, 2nd...
ISL = operation, instructions & marketing in 18 languages: English, Japanese,
Spanish, German, French,
Chinese (Mandarin, Cantonese dialects), Russian, Arabic, Portuguese, Italian,
Greek. Plus the language
families of Baltic, Slavic, Germanic, Iranian, Sudanese, Matayo-Polynesian and
Turkish.
OLDER VERSION OF PARTS (Up to 1995 or so)
CH ** = Also for children below the age 16. Newer part.
CM ** = Casing is of sleek quality metal with enamel coating.
CC ** = Creative casing design.
-D: .......... Dots (...) are the plastic casing
=IIIIIIII=
Colon bars (I) are the product
.......... Boxed shape is too simplified, but to show
casing is an outside covering.
-OTD: Used up to maybe 1995. Snap on, or screw on pieces can be sculptured
around the basic unit as
decoration only. Pieces are of colorful plastic and or enameled metal. Pieces
can only be snapped on in
manners that don't obstruct normal usage of device, or cause danger. Casing
might be molded and welded so as
not to be changeable. See "Brain".
COLOR ** =
-New definition - after Aug 1996: Any 1,000 or more standard colors / inks. +
See "Artist" and "Edit".
-Old definition - before 1995: Color of item you touch changes, eg: caused by
how changes in temperature
effects liquid crystals. One or more of the following may change color: all or
part of casing (a strip of liquid
crystals), buttons, "display".
CP ** = Sleek quality plastic casing, safeguards against common hazards like:
impacts, heat, discoloration,
etc.
42

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-D: ......... Dots (...) are the plastic casing
.1111111. Colon bars (1) are the product
..:...... Boxed shape is too simplified, but to show
that plastic casing is an outside covering.
CR ** = Casing of sleek strong and durable rubber, safeguards
against common hazards. Similar to "cp".
CRC = Central computer ("C") of "Adaptive System" product number 1 D-010.
* * PERIODICAL ABBRE V IATIONS
Intro: References are made to commonly used periodicals worldwide. The
inventions developed herein are
usually improvement inventions of those published. For diagram purposes: the
improved inventions are
juxtaposed vies a vis the published products.
DY ='Daily Yomiuri', Tokyo. * Also any includes any differing coverage within
publisher's 'Yomiuri
Shimbun'. Article found in their 'New Products' section, in published weekly
in the daily newspaper.
ES = 'Edmund Scientific' Sales Catalog. 101 E. Gloucester Pike, Barrington, NJ
08007 USA. Tel +1 609 547-
8880, Customer Service 609 573-6260, Fax 609 573-6295. Products mentioned in
the Edmund Scientific 1995
Catalog are one example which may be incorporated in all or some of the
inventions. ** There are occasionally
multiple examples of such products in this catalog. Cover of this catalog has
'15CIA' printed.
PS ='Popular Science', USA. Don't confuse this with "PS" for positioning
system (if in real doubt then
presume "PS" stands for "Positioning System".
QMRR = "Quirk's Marketing Research Review".
-See "Quirk's Marketing Research Review: Practical Applications in Marketing
Research". Especially Feb 1996
Issue. 8030 Cedar Ave., 4229, Bloomington, MN 55425. Tel 612-854-5101. ISBN:
08937451. Has listings of
related softwares, and companies with specialists capable of doing the
programming, especially pages 78 to 85.
-When QMRR is used in the Software Parts File. Especially see the software
product classifications with same
/ related headings (listing about 10-20 existing softwares).
-Definitions of functions used in marketing research softwares: survey
(methods, questions, responses,
"analysis"), environment, marketing research, customer profiles, (changes in)
sales figures (eg: more and less of
certain models being sold, tied to other changes in world/market/user) see
"Quirk's" listed companies, and
marketing research books.
NK ='Nikkei Weekly', Tokyo.
-This product idea includes and is an extension of the product described in
Japan's 'Nikkei Weekly's (part of
Nihon Keizai Shimbun) 'New Products & Services' section which comprises one
full page in most of their
issues.
-On occasion, an article will include and be an extension for 'Nikkei Weekly's
'Science & Technology' section
for said date.
43

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
EPO, USPTO and WIPO: Government patent databases linked from www.WlPO.int
DTSW ="Directory of Technical Software Suppliers", published by: CAE
Consultants Inc. US Tel +1 914-
963-3695, Fax 914-376-5011. 41 Travers Ave., Yonkers, NY 10705 USA. This data
also available at:
HTTP://www.caeconsultants.com Directory used was "up to date as of 1/1994".
CAE also offers free info on
tel to locate suppliers.
Also see the less commonly used features file (was named Features *).
CONCLUDES THIS ABB-SYM FILE: Detailed Abbreviations & Symbol
File: Intro To Pat / Diagram Intro
FIGURATIVE DRAWINGS
INTRO TO OUR DRAWINGS WRITTEN IN TEXT CODE
Introduction To Finding Figurative Drawings (Drawings) In This Application:
Drawings ARE included in this
filing. Most of the existing drawings, however, may not initially appear to be
drawings to someone quickly
flipping through the patent filing. Drawings are usually strings of parts on a
single line; connected by dashes.
This largely covers informal drawings.
Example
Simplified example of computer diagram: USER -+ KEYBOARD --> CPU ---
CUSTOMIZED OUTPUT
Below: version of the above diagram you are more likely to see.
Details
-Drawings can be found for each product description in Diagram Set 1, and/or
in Diagram Set 2. Drawings are
also with printed text. Most product descriptions starting with the "C
Directory" have drawings.
-Features (Parts) are usually in "parentheses", and Features (Parts) from 1997
are preceded by an 'apostrophe.
See the Features (Parts) paper for details:
"=" connects Features (Parts) of diagram. The presence of the "=" signifies
that such is a diagram
*(clarification of its being a diagram may be made but is not necessary). To
ease reading the first time,
might be considered commas, especially when there is no space to the left of
the symbol as with regular
commas. E.g.: Activate the switch= then light turns on.
44

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"/" diagonal slash means 'and /or'. The easiest way to read the description
the first time, is bften to only read
the first 'and/or' option, which allows the reader to more easily see the
thought flow.
* E.g.: Diagram: [part 1/part 2 = part 3 = part 4/part 5] is the same as a:
>3< shape diagram; and b: can be split
D1: 1=3=4, D2: 2=3=5, with D1 & D2 being connected at part 3. No line is
necessarily used in 1& 2, though a
line is not excluded.
"( )" Material in these brackets is optional. The easiest way to read the text
the first time is to almost ignore the
brackets.
Sample diagram. Following is one ofthe drawings for this patent application:
-Diagram: Person = Keyboard = Computer = Printer
* Drawing #1 & Drawing #2 mean two related drawings *(if they are in the same
section), e.g.: D1, D2, D3...
* Part numbers used in the diagram may also be used inside the related For
Techies or Other Technical Details
(OTD) section - Other Technical Details. These diagram part numbers used in
For Techies: show that their
Features (Parts), are connected to that section of the diagram.
* The "-" symbol is the same as the diagonal slash, except there is also the
option for a line drawn between the
two neighboring Features (Parts) separated by this wavy line symbol
* The colon ":" symbol represents a line from the disclosure preceding it to
the subset disclosure following it.
* Each section within the For Techies section is created by semi-colon,
separating it from any other material;
hence each section is also read as a diagram and/or has its diagram merged
with the other sections within the
same For Techies .
* Often the terms "then" and usually "In turn" are equal to "->" or "=". In
other words these worded terms are
equated with symbols for the diagram type structure.
-As is viable, every part/block in each diagram for every electronic product
idea in this filing surrounds the
central computer-like device. Each electronic part, has an optional connection
with a central computer ("C").
D: each and every electronic part of product idea ="tr"/"rc" = "c" = some
other part involved with this product
idea
-"C" (Computer) is an optional inclusion for every central description in this
filing requiring electronic
hardware. As an OPTION, one or more of the multiple 'Features (Parts)'
referred to in each such product's or
part's description can be connected to this "C". Each 'part' is a separate
diagram (as if on a transparency, and
they can be appropriately overlaid, intersecting at "C", to see the
potentially complex system (there may be
some repetition, hence the overlaying might be so that repetitions are
overlaid over each other, so such
parts/aspects are read once)). "C" is defined in 'Features (Parts) Files'.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-The reader knows printed matter is a diagram when any one or more of the
diagram symbols are used.
Drawings are often preceded by the capital ' D'.
Diagram Examples: 3 Increasingly Detailed Versions Of Same Computer Invention
Version A: Simplified example of computer diagram:
User -> Keyboard -> CPU -> Desired Output
Version B: Semi detailed rendition of above computer diagram:
User -> Keyboard (user inputs information, data entered into computer in easy
step process) -> Computer
(software analyzes entered data) = Software edits the simplified inputted
information into more abstract forms =
Software edits originally inputted diagram into different variations for each
customized need = Computer
digitally outputs different versions of the originally inputted diagram.
Version C: Complex rendition of above computer diagram:
User (Electronics Design Engineer or Patent Examiner) -> Keyboard (user inputs
abbreviated format for what
constitutes a diagram of two or more parts and or inputs the desired
applications for inventions; data can also be
entered into computer without tedious computer mouse) -> CPU (software
analyzes entered data) = Software
analyzes database of each entered part with its mu Itiple uses also shown in a
pattern of branching trees (this
database can be the invention tree) = Software converts originally inputted
diagram into hundreds of types of
drawings depending on the desired application) = Computer digitally outputs 8
million different versions for
how invention(s) can be diagramed (constructed):
1) Newly created digitized files
2) (Color) printer
3) Computer screen
4) Software demonstrates in near virtual reality how the inventions would
function.
5) Invention is constructed: 1) by clay carving device (cutter controlled by
digitized files and other software
programs to match the designated diagram); 2) automated software programming
system (such as via using the
"User Information Programming" software part)
END OF CODE FOR DIAGRAM EXPLANATION SECTION
File: Features Intro / Features *
LESS COMMONLY USED FEATURES: Read Later
Features primarily for inventions (inked to files A, B and to some extent C*.
They apply to the united pat application directly/indirectly.
46

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
'DATE' = Our digital clock and calendar. It's the timer for our 'Digital Time
Stamp.
AIR PAD *= See Remote Control. Rarely used, hence delineated with an asterisk.
ALERTER = See "Notifier"
ALL = See "Basic"
APPLICATION / APPL / AP = Application. One of the alternate ways the
inventions can be used. Also called
"Api" - with single letter "p". *Patent Application.
AU ** = Also for adult level 16 years old & over.
BASIC ** = See appendix.
BILL / BILLING = Billing: Charges users by amount and type of usage. Limits
billable usage by criteria.
BRATN = Feature name changed to 'Computer.
DISPLAY = Display Screen. This feature (also viewed as part) was re-titled to
"S".
FD-HDD = This feature (also viewed as part) name changed to "Computer".
FLOAT ** = The separate portable device floats in the air via special magnets.
. The more portable part(s) of system have opposite rnagnets on each end. A
letter 'C' shaped base also has
magnets, which attract each of the ends of the piece in space. .2cm to 2cm of
air is between the attracting
magnets. Portable item is lightweight. Magnets and design are designed to
withstand gravity and wind, and
wearing down of magnet's forces for minimum five years.
-Drawing: 1+ = 2- = 3= 4+ = 5-.
-Drawing's Notes: 14 positive magnets; 25 negative magnets; 3 non magnetically
conductive (between 1/2/4/5)
which is the/part of product; 1& 5 are each at their individual ends of the
'C' frame; one of the purposes of float
is to create an interesting design (entertain); item which floats can be taken
out from the "C" frame (used about
premise/laid on table); cc.
-"Tilt": controls position I functions% of floating object
-Form of flotation = notifier / other form of communication to user.
'Track = type flotation.
47

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
FX** = Fax capabilities. Also can send and receive via: Internet, modem (see
'mo), other (wireless) electronic
mediums for data or text.
-Built in facsimile machine, sending/receiving in different speeds.
-Drawing: data/image = "sensor" = "C" = tr = printer
-For Techies: air pad (sends and receives faxes); cart (how messages are sent
and or received); "S"; "C"; uk.
-o-C95 Fax machine screens out unwanted messages. See fax on display ("S"),
print desired faxes. NTT 29 Mar
93 NK. Drawing: c95=tel-c-remote
.-4E020 Content Date Stamper: Registers and organizes previous occurrences.
LENS = See "Camera / Lens"
MO *= Modem. Modem: connects via tel ("T") with: @ other computers
(mainframes), devices.
Drawing: remote/uk/display = c (computer's data) = data converter = tr/rc =
data converter ="C"
display/printer/function
-For Techies: access required to begin mo communication; air pad commands mo;
character; (data about
transaction on) "S"; % entertain; "C"; % communicates with "M"; mouse; mp;
notifier (shows mo transaction
was or wasn't completed successfully; the information or results achieved from
the mo transaction); pp; output
transferable to printer; tds (of mo transaction).
.-4E020 Content Date Stamper: Registers and organizes previous occurrences.
MD / MOOD * = The mood of users are induced by system to elicit the
'designated emotional feelings.
. Read Later: 'Multi-media of system is designed to trigger 'designated
reactions in humans or animals.
-Diagram: adapt-Database collects information about users ='analyzer
determines which 'multimedia mode
best elicits 'designated emotion wanted in u (user) = achieving the desired
results: users enjoys or finds system
challenging, or more u (user) friendly [having adjusted to user's behavioral
pattern] guide or 'educate is more
effective.
-This function has become part of "ENTERTAIN", though "Mood" is a function,
which can be separated from,
ENTERTAIN.
MOTION SOUNDER T"' ** = Makes sound upon movement of device.
Makes sound or music when 'sensor of device is agitated in any /'designated
manner [ba of movement].
User programs type sound. See product number 5A-1050-042002. "Edit".
Drawing: motion "sensor" = "C" = osc/function/tr
. US Patents [12.95 bib disk]:
-str: (sound* or music*) adj 15 (motion* or move* or moving)
48

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-US Patents: 5475372 Earthquake detector motion sensitive devices; ++ 5373096
Yamaha's Miburi: musical
sound control device responsive to the motion of body portions of a performer
[Yamaha later copied KN?].
MOUSE * = Changed to 'Remote Control.
MP = Changed to 'PR [Program].
PI = Changed to UIP.
PP = Changed to 'PR [Program].
PP = Personally Program [Old feature changed to 'PR 9.97]:
Functions are personally programmable by user. User decides which programs to
activate, deactivate, alter and
or add.
Drawing: uk (programs) / remote ("R") = c(soflware / cart) = software function
(assists user)
-See "Brain".
-"Billing": bills for what / how user programs the sw.
-Access: "Access Controller" or legitimate accessor can alter needed
"passwords" for themselves or other users.
PRINTER * = Prints desired information from system.
-External printer 'adapter, card and software for standard printers.
Drawing: c = tr = signal converter = printing mechanism = prints onto material
(such as paper)
-For Techies: display ("S") shows software's menus for how user wants document
typed; connects to
computerized system utilizing "C"; pp; mp; uk; standard dot matrix or laser or
color printers with their ink
cartridges - basic; *portable printer; cp. C can tr to printer via wire /
wireless. What's on "s" or "printer" can be
seen on the other in full / similar / like manner, in entirety or part= as
"designated" by: uip-tailor, pr, and k.
-Printer=SW=notifier=C: if (w5) printer lacks enough ink of particular color
in cartridge before user: tries to
print / expands image
RC *= Receiver. Receives signals from 'tr (transmission).
RCP ** = Sleek rectangular prism casing (semi-box shaped). Tabletop variants
have 4 rubber pieces on bottom
corners, gripping counter.
SPEECH *= Included into "OSC". This function can be separated from the other
osc (outgoing sound
communicator) modes. If "speech" is in system then there is an option for
"osc", eg: "speech" -> "C" -> "osc".
% See "Brain".
49

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
SP TEL = Speaker tel ("T"). Device's microphone ("mic") adjusts volume of
incoming sound according to
sound source's distance from microphone ("mic"). tr="T"-c=osc
.-"Billing": bills for what / how system' picks up.
STEREO = Sound System. Music/Sound source (pre-recorded music, broadcast) =
Player (CD, Digital Tape,
Cassette Tape, Phonograph, Radio Receiver) = Amplifier = Speakers/I-Iead
Phones
Drawing: mic/tr = signal converter = c-recorder = play back = signal converter
amplifier = osc (outgoing sound
communicator) (speakers)
TOY *= May also function as a toy. For Techies: The process of having an
interesting time is new and
interesting from the experiential point of view; %interactive; multi-user;
notifier; mp; uk, "Brain". "Billing":
bills for time used / "accessed".
VC *= Volume control: user pre-selects speaker sound volume.
-Drawing: knob/button = tr = c (controller) = amplifier = osc
VOICE ANALYZER = See "Sound Analyzer".
VIBRATION = Vibration generated by device for specific reasons, eg:
"entertainment"; "notifier"; form of
communication for: "status", "score", a simple presence or lack of whatever
user may need (to know) such as a
yes or no - or on or off- or good or bad. See "Access" ="Vibration".
Check The Simple Handy Version Of The Main Features, plus our Abbreviations &
Symbols. Kindly visit
www.LicenseltToday.com for updates, etc.
File: Features Intro / Feature Synonym
SYNONYMOUS TERMS FOR OUR MAIN FEATURES
(This may be an easier way for non-technical people to
understand features used in our interesting inventions)
Introduction: Main feature sections are listed alphabetically. Synonymous
terms herein sometimes include a tiny
fraction of the applicable US Patent Classification numbers.
. Alternatives & Keywords for ACCESS feature: admission, admittance, approach,
avenue, connection, contact,
course, door, entrance, entree, entry, introduction, key, open door (slang),
passage, path, road, route, way

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
US Patent Classification code for Access: 726.4 Information Security /
Authorization
Alternatives & Keywords for ADAPTING feature: acclimate, accommodate,
accustom, alter, change, come
around, comply, conform, familiarize, fashion, fit, habituate, harmonize,
make, match, modify, prepare, qualify,
readjust, reconcile, remodel, revise, shape, shape up (slang), square, suit,
tailor
US Patent Classification code for Adapting: 715.789 Data processing:
presentation processing of document,
operator interface processing / based on usage or user profile
. Alternatives & Keywords for ALERTER feature: observant, on guard (slang),
security, warn, notify, watch,
help protect.
. US Patent Classification for ALERTER: 340.825 Communications: Electrical,
subclasses 825 through 825.98
for controlling one or more devices to obtain a plurality of results by
transmission of a designated one of plural
distinctive control signals over a smaller number of communication lines or
channels,
. Alternatives & Keywords for ANALYZER feature: assay, chew over (slang),
confab (slang), consider,
estimate, evaluate, figure, figure out, hash (slang), inspect, interpret,
investigate, judge, kick around (slang),
rehash, resolve, scrutinize, sort out, spell out, study, test, think through
. US Patent Classification for ANALYZER: 706.14 data processing: artificial
intelligence / adaptive
system .
Alternatives & Keywords for APPLICATION feature: appliance, appositeness,
employment, exercise,
exercising, function, germaneness, operation, pertinence, play, practice,
purpose, relevance, usance, utilization,
value
. Altematives & Keywords for ART feature: abstraction, designing,
illustrating, imitating, modeling, molding,
painting, pictorialization, portraying, representation, sculpting, shaping,
simulating, sketching, symbolization,.
composer. US Patent Classification for ART: 382.159 Image Analysis /Trainable
classifiers or pattern*
recognizers
. Alternatives & Keywords for ASSOCIATION feature: affiliation, alliance,
band, brotherhood, bunch, circle,
clan, clique, club, coalition, combination, combo, company, confederacy,
confederation, congress, cooperative,
corporation, crew, crowd, family, federation, fellowship, fraternity, gang,
guild, hookup (slang), league, order,
organization, outfit, partnership, pool, rat pack (slang), ring, society,
syndicate, tie-in, tie-up, tribe, troops,
troupe, union, counterpart, companion likeness, equivalent, equal, copy,
reproduction, clone, duplicate, fellow,
accessory, accomplice, affiliate, aid, ally, assistant, co-operator,
companion, compatriot, comrade, confederate,
consort, crony, fellow, friend, helper, partner, peer, sidekick
51

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
US Patent Classification Code for Association: 706.46 Data processing:
Artificial Intelligence / Knowledge
representation and reasoning technique
. Alternatives & Keywords for BEHAVIOR ANALYZER feature: watch, psychology,
sociology,
anthropology, delivery, demeanor, deportment, ethics, etiquette, expression,
form, habits, management, mien,
mode, morals, nature, observance, performance, practice, presence, propriety,
role, routine behavior, desires,
needs, cravings, seek, want. US Patent Classification Code for BEHAVIOR
ANALYZER: 706.14 Data
Processing, Artificial Intelligence/Adaptive System
. Alternatives & Keywords for CARTRIDGE feature: diskette, floppy disk, hard
disk, hard drive, magnetic
drum, magnetic tape, magnetic tape unit, magneto-optic disk, optical disk,
primary storage
US Patent Classification Code for CARTRIDGE: 706.11 Data Processing
Intelligence / Having Particular
User Interface
. Alternatives & Keywords for COMPOSE feature: author, bang out (slang), cast,
comp, conceive, contrive,
cook up (slang), design, devise, discover, draw up, dream up, fabricate,
forge, form, formulate, frame (slang),
ghost (slang), ghostwrite, imagine, indite, invent, knock off (slang), knock
out (slang), make up, note down,
orchestrate, originate, pen, poetize, produce, put down, score, scribble,
script, shed ink, time, turn out, whip up
(slang), write
. US Patent Classification Code for COMPOSE: 706.22 Data Processing,
Artificial Intelligence / Signal
processing (e.g., filter)
Alternatives & Keywords for COMPUTER feature: adding machine, analog, brain
(slang), calculator, clone,
compatible, data processor, digital, electronic brain (slang), laptop (slang),
mainframe, micro (slang),
microcomputer, mini (slang), minicomputer, number cruncher (slang), personal
computer, thinking machine
(slang)
. Alternatives & Keywords for CONTENT ANALYZER feature: composition,
constitution, matter, subject
matter, substance
. US Patent Classification Code for CONTENT ANALYZER: 706.54 Data Processing,
Artificial Intelligence /
Analogical reasoning system:.
Alternatives & Keywords for COORDINATOR feature: accommodate, adjust, agree,
attune, combine, conduce,
conform, correlate, harmonize, integrate, match, mesh, organize, pool,
proportion, pull together, reconcile,
reconciliate, regulate, shape up, synchronize, systematize, team up
52

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Alternatives & Keywords for DESIGNATED feature: allocate, allot, appoint,
apportion, appropriate, assign,
authorize, button down (slang), characterize, charge, choose, commission,
connote, constitute, define, delegate,
denote, depute, deputize, describe, dictate, earmark (slang), elect, evidence,
favor, finger (slang), indicate,
individualize, make, mark, mete, name, nominate, opt, peg (slang), pick, pin
down, pinpoint, prefer, reserve,
select, set apart, set aside, show, single, slot, stipulate, tab (slang), tag
(slang), tap (slang)
US Patent Classification Code for DISTANCER: 361.179 Electricity, electrical
systems and devices/Proximity
or contact:
. Alternatives & Keywords for EDITOR feature: adapt, alter, amplify, analyze,
annotate, arrange, assemble,
assign, blue-pencil (slang), censor, check, choose, compile, compose,
condense, copy, correct, cut, delete,
discard, doctor, draft, emend, excise, feature, fine tune, finish, fly speck
(slang), go over, make up, polish,
prepare, prescribe, proofread, publish, put together, rearrange, recalibrate,
rectify, redact, regulate, rehash,
rephrase, report, revise, select, set up, strike out, style, tighten, trim
. US Patent Classification Code for EDITOR: 715.530 data processing:
presentation processing of document,
operator interface processing, and screen saver display processing/edit,
composition, or storage control:
Altematives & Keywords for EDUCATION GETS HARDER feature: Gargantuan (slang),
ambitious, arduous,
backbreaking,bothersome, burdensome, challenging, crucial, demanding,
difficult, effortful, exacting,
formidable, galling, hard, hard-won, heavy, Herculean, immense, intricate,
irritating, labored, laborious, man-
sized, not easy, onerous, operose, painful, problem, problematic, prohibitive,
rigid, severe, stiff, strenuous,
titanic, toilsome, tough, troublesome, trying, unyielding, uphill, upstream,
wearisome, abstract, abstruse,
baffling, bewildering, complex, confounding, confusing, dark, deep, delicate,
enigmatic, enigmatical, entangled,
esoteric, hidden, inexplicable, involved, knotty, labyrinthine, loose,
meandering, mysterious, mystical,
mystifying, nice, obscure, obstinate, paradoxical, perplexing, profound,
puzzling, rambling, subtle, tangled,
thoray, ticklish, unclear, unfathomable, unintelligible, vex, boorish, dark,
fastidious, fractious,'fussy, grim,
impolite, intractable, irritable, obstreperous, perverse, refractory, rigid,
rude, tiresome, unaccommodating,
unamenable
Alternatives & Keywords for ENTERTAIN/ENTERTAINMENT feature: amusement, ball,
beguilement,
delectation, delight, disport, dissipation, distraction, divertissement,
enjoyment, entertainment, field day (slang),
frivolity, fun, game, gratification, grins (slang), high time (slang), hoopla
(slang), laughs (slang), levity, merry-
go-round (slang), pastime, picnic (slang), play, pleasure, relaxation, relish,
sport, whoopee (slang)
Alternatives & Keywords for ENVIRONMENTAL PROTECTION feature: ecology,
environmental control,
environmental impact analysis, environmental management, environmental
monitoring, environmental policy,
environmental science, environmentology .
53

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Alternatives & Keywords for EXERCISE feature: act, action, activity,
calisthenics, constitutional (slang),
discharge, discipline, drill, drilling, effort, examination, exercising,
exertion, gym, labor, lesson, movement,
occupation, operation, performance, problem, pursuit, recitation, schoolwork,
study, task, test, theme, toil,
training, warm-up, workout
Alternatives & Keywords for GAME feature: competition, contest, match,
meeting, round, set, tournament,
adventure, amusement, athletics, distraction, diversion, enterprise,
festivity, follow-the-leader, frolic, fun, jest,
merriment, merrymaking, occupation, pastime, piddly, plan, play, proceeding,
pursuit, recreation, romp,
scheme, sport, sports, undertaking
Alternatives & Keywords for GPS feature: X, area, bearings, district,
environment, fix, geography, ground,
locale, locality, location, locus, point, post, reference, region, scene,
seat, setting, site, situation, space, spot,
stand, station, surroundings, topography, tract, whereabouts
Alternatives & Keywords for GUIDE/GUIDANCE feature: adviser, attendant,
captain, chaperon, cicerone,
conductor, controller, convoy, counselor, criterion, director, docent, escort,
example, exemplar, exhibitor, genie,
genius, guiding spirit, guru, inspiration, lead, leader, lodestar, master,
mentor, model, monitor, paradigm,
pathfinder, pattern, pilot, pioneer, rudder, scout, standard, superintendent,
teacher, usher, vanguard
advice, auspices, conduct, conduction, control, conveyance, counsel,
direction, government, help,
instruction, intelligence, leadership, management, navigation, supervision,
teaching
. US Patent Classification code for GUIDE: 706.11 data processing - artificial
intelligence/http://www.uspto.gov/go/classification/uspc706/sched706.htm -
C706S011000having particular
user interface
Alternatives & Keywords for INTERACT feature: collaborate, combine, connect,
contact, cooperate, interface,
interplay, interreact, join, merge, mesh, network, reach out, relate, touch,
touch base (slang), unite, approach,
call, connect, get, interface, reach, speak to, talk, telephone, visit, write
Alternatives & Keywords for LOCATOR feature: come across, come upon, detect,
determine, discover,
establish, ferret out (slang), get at, happen upon, hit upon, hook (slang),
light upon (slang), meet with, nose out,
pin down, pinpoint, place, position, read, scare up, search out, smell out,
smoke out (slang), spot, station, strike,
stumble on, track down, trip over (slang), uncover, unearth, zero in
Alternatives & Keywords for MFH feature: analog, brain, data processor,
electronic brain (slang),
microcomputer, mini (slang), minicomputer, number cruncher (slang), personal
computer, thinking machine
(slang)
54

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Alternatives & Keywords for NOTIFIER feature: acquaint, advise, alert,
announce, apprise, assert, blazon,
brief, broadcast, cable, caution, circulate, clue in, convey, cue, debrief,
declare, disclose, disseminate, divulge,
enlighten, express, fill in, give, herald, hint, let know, make known,
mention, pass out, post, proclaim,
promulgate, report, reveal; send word, speak, squeal, state, suggest, talk,
teach, tell (what happened), tip off,
vent, warn, wire, wise up (slang), write
. US Patent Classification for NOTIFIER: 340.825 Communications: Electrical,
subclasses 825 through 825.98
for controlling one or more devices to obtain a plurality of results by
transmission of a designated one of plural
distinctive control signals over a smaller number of communication lines or
channels,
. Alternatives & Keywords for ORDER &TIMING feature: pattern, sequence, order
(of events), history (which
shows patterns ofbehavior- helps 'predict future).
. US Patent Classification Code for ORDER & T[MING: 706.14 Data Processing,
Artificial
Intelligence/Adaptive System
Alternatives & Keywords for OSC feature: accent, din, harmony, intonation,
loudness, modulation, music,
noise, note, pitch, racket, report, resonance, reverberation, ringing,
softness, sonance, sonancy, sonority,
sonorousness, static, tenor, tonality, tone, vibration, voice, acquaint,
advertise, advise, announce, broadcast,
carry, connect, contact, convey, correspond, declare, disclose, discover,
disseminate, divulge, enlighten, get
across, hint, impart, imply, inform, interact, interface, let on, let out,
make known, network (slang), pass on,
phone, proclaim, publicize, publish, raise, reach out, relate, report, reveal,
ring up, signify, spread, state,
suggest, tell, touch base (slang), transfer, transmit, unfold, writ
. Alternatives & Keywords for PREDICT feature: adumbrate, anticipate, augur,
conclude, conjecture,=crystal
ball, divine, dope, dope out, envision, figure, figure out, forebode,
forecast, foresee, forespeak, foretell, guess,
infer, judge, portend, presage, presume, prognosticate, prophesy, psych out
(slang), read, see coming (slang),
size up (slang), soothsay, suppose, surmise
. US Patent Classification for PREDICT: 706.14 data processing: artificial
intelligence / adaptive system
Alternatives & Keywords for PROGRAM feature: design, instructions, line,
order, policy, polity, procedure,
project, scheme, sequence
Alternatives & Keywords for PS-ZONE feature: area, band, belt, circuit,
ground, realm, region, section, sector,
segment, sphere, territory, tract

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Alternatives & Keywords for QUESTION feature: examination, feeler, inquest,
inquiring, inquiry, inquisition,
interrogation, interrogatory, investigation, poll, query, questioning, third,
third degree (slang), wringer (slang)
Alternatives & Keywords for ROUTE feature: address, conduct, consign, convey,
direct, dispatch, escort,
forward, guide, lead, pilot, remit, see, send, shepherd, ship, show, steer,
transmit
Alternatives & Keywords for SCREEN feature: cathode ray tube, CRT, display,
graphics terminal, monitor,
screen, VDT, VDU, video display unit, video terminal
Alternatives & Keywords for SCORE feature: account, addition, aggregate,
amount, average, count, final count,
grade, mark, number, outcome, points, rate, reckoning, record, result, stock,
sum, summary, summation, tab,
tally
Alternatives & Keywords for SEEK feature: be after, bob for, cast about,
chase, comb, delve, delve for, dig for,
dragnet, explore, fan, ferret out, fish, follow, go after, gun for, hunt,
inquire, investigate, look about, look
around, mouse, nose, prowl, prowl after, pursue, quest, ransack, root, run
after, scout, scratch, search for, search
out, smell around, sniff out (slang), track down
Altematives & Keywords for SOUND ANALYZER feature: accent, din, harmony,
intonation, loudness,
modulation, music, noise, note, pitch, racket, report, resonance,
reverberation, ringing, softness, sonance,
sonancy, sonority, sonorousness, static, tenor, tonality, tone, vibration,
voice, assay, chew over, consider,
estimate, evaluate, figure out, hash, inspect, interpret, investigate, judge,
sort out, spell out, study
. US Patent Classification Codes for SA: 701.231 Data Processing: speech
signal processing / Recognization
. Alternatives & Keywords for VA feature: equivalent, facsimile, likeness,
match, model, photograph, picture,
portrait, similitude, spit, spitting image, mental picture, perception, vision
. US Patent Classification Codes for Sound Visual Analyzer: 704.235 Speech to
image
Alternatives & Keywords for STATUS feature: existing condition, how things
stand, no change, parameters,
present state of affairs, situation, size of it, standing, state of affairs,
status, status in quo, usual, score
Alternatives & Keywords for SYNTHESIZER feature: amalgamate, arrange, blend,
harmonize, incorporate,
integrate, make whole, manufacture, orchestrate, symphonize, unify,
complement, fit, go with, suit, synthesize,
Alternatives & Keywords for TELEPHONY feature: car telephone, cell phone, cell
telephone, cellular phone,
digital telephone, field telephone, satellite telephone, wireless telephone
56

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Alternatives & Keywords for TAG feature: add, adjoin, affix, annex, append,
attach, check, christen, designate,
docket, dub, earmark, hold, identify, mark, name, style, tack, tally, tap,
term, ticket, title
Alternatives & Keywords for TAILOR feature: custom-built, custom-fit, custom-
made, designer, made-to-
measure, perfectly fitted, tailored, accommodate, adapt, alter, conform,
convert, custom-make, cut, dovetail
(slang), fashion, fit, modify, mold, quadrate, reconcile, shape, shape up,
square, style, suit, tailor-make
Alternatives & Keywords for THERAPY GETS HARDER feature: analysis, cure,
healing, medicine, remedial
treatment, remedy, therapeutics, treatment, (slang) See EGH
Alternatives & Keywords for TRACK feature: footmark, footprint, footstep,
groove, path, record, trace, tract,
trail, tread
Alternatives & Keywords for USER feature: final user, ultimate consumer,
client, consumer, customer, end
user, patron, prospect, purchaser, representative, shopper, user, vendee
Alternatives & Keywords for USER KEYS IN feature: bat out, beat out, copy,
dash off, teletype, touch, touch-
type, transcribe, typewrite, write, inscribe, insert, intercalate,
interpolate, introduce, list, log, note, post, put in,
register, set down, take down
Alternatives & Keywords for ZONE feature: line of demarcation, neutral
territory, neutral zone , belt, block,
city, county, division, domain, dominion, enclosure, field, locality,
neighborhood, parcel, patch, plot, precinct,
principality, quarter, section, sector, sphere, state, stretch, territory,
township, tract, turf, vicinity, ward
File: Features Intro / IMI Pat
PARTS - WITH RELATED PATENTS:
* Intro: All patents are US unless otherwise noted. See file "Introductory
Notes - Less Important" for help in
reading this file.
ACCESS = Gain access to electronic product's controls with a correctly keyed
in combination.
-kw: access*, computer*, entry, (gain* or keyless) adj3 (access* or entry),
password*, interactiv*
.--toy*, fun, play*, child*, kid*, image*, imaging, create, creating
-str: (achiev* or obtain* or accomplish* or get [or gets or getting] or gain*
or keyless) adj3 (access* or entry)
-str: password* and (access* or entry). Str: security* and access*. Str:
(draw* or create or creating) adj9 (access
or accessing)
57

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry
system into car 5319364
507402 = "c" 5450524 5206905
. Improvement on patents:
-Patent: 5247497 Security systems based on recording unique identifier for
subsequent playback. Information
provided by U to system when they last entered is played back so U knows if
someone else gained access
previously. Assignee: Octel [big co].
--improvements:
-U = This N Sys (Patent: 5247497) - C
ACCESS () 1/ ANALYZER () I/ EDIT Q// NR (u nr when (w5) u didn't check to see
what their'unique
identifier' (5247497 type input) was during their last session, sys is of no
use if u doesn't check, and best if u
checks each time) // OSC () // PR () // PS-Zone (sys "tracks" w5 u moved and
or what they did (uip, gps))
Q () // R() // ROUTER () // SCORE (u's previous score or "status" or "TDS"
(previous usage) can be a
unique identifier - this automatation helps the less creative /-lazy u) //
STATUS TDS () // T()
TRACK () // UIP 0.
BA = Behavior Analyzer. Analyzes live behavior of people.
. kw:
-behavior* psycholog*, sociolog*, movement [moves, moving, move]
-animal*, human*, person*, people*
-study*, studies, analyz*, monitors, monitoring
. str: (behavior* psycholog*, sociolog*, movement [moves, moving, move]) and (-
animal*, human*, person*,
people*) and (study*, studies, analyz*, monitors, monitoring)
-US Patents: 5465115 Video traffic monitor for retail establishements & the
like; 5433612 Electronic
accountability system - "tracks" u and equipment = "ps-zone" / "track" / "uip"
(develops uip-db); 5428392;
5426425 Intelligent locator system = track / ba / ps; 5424745 Detection method
and system = track / ba / ps;
5386990; + 5250941 Customer activity monitor / 5245314 Location monitoring
system = ps / ps-zone / track /
ba.
. Improvement on US Patent:
5377258 Method and apparatus for an automated and interactive behavioral
guidance system: u receives
motivational messages (osc) to improve behavioral patterns; includes client db
(uip); voice stress "analyzer";
client response required]
-OTD (Other Technical Details) D: U= This N Sys (BA / 5377258) -C=
ACCESS () II ANALYZER () // EDIT (sys edits out less needed input from: u, uip-
db) // NR (penalizes u
when u acts poorly (undesirable behavior) = electric shock to body /
"entertainment" sys N usage is limited (see
KN)) Il OSC (penalizes via harsh sounds = synth) // PR () // PS-Zone (u
trained where its safe / u is not
needed for work, eg: home, coffee room, recreation room, tv room) 1/ Q (to
build uip-db = needed by sys to
58

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
train u) R () // SCORE (how well u's behavior is altering) // STATUS (of u's
behavior) // TDS (w5 u
behaved -> builds up UIP-DB) I/ TRACK // UIP.
BALANCE = Speakers' volume adjusts according to where person sits. System uses
central point for two or
more people. str: balanc*, audi*, speakers.
+-j- US Patents: 5287102 "Whenever the pointer islocated between teh leftmost
and rightmost icons, the volume
is balanced substanially equally between the two speakers" I.B.M. = "Balancer"
TRACKER = Sys tracks or monitors actions of user, or system.
-US Patents for BA / "Track":
5465115 Video traffic monitor for retail establishements & the like; 5433612
Electronic accountability system
- "tracks" u and equipment = "ps-zone" / "track" / "uip" (develops uip-db);
5428392; 5426425 Intelligent
locator system = track / ba / ps; 5424745 Detection method and system = track
/ ba / ps; 5386990; + 5250941
Customer activity monitor / 5245314 Location monitoring system = ps / ps-zone
/ track / ba.
. Improvement on US Patent:
5377258 Method and apparatus for an automated and interactive behavioral
guidance system: u receives
motivational messages (osc) to improve behavioral patterns; includes client db
(uip); voice stress "analyzer";
client response required]
=
-OTD (Other Technical Details) D: U = This N Sys (BA / 5377258) - C
ACCESS () // ANALYZER () // EDIT (sys edits out less needed input from: u, uip-
db) // NR (penalizes u
when u acts poorly (undesirable behavior) = electric shock to body /
"entertainment" sys N usage is limited (see
KN)) // OSC (penalizes via harsh sounds = synth) /I PR () // PS-Zone (u
trained where its safe / u is not
needed for work, eg: home, coffee room, recreation room, tv room) // Q (to
build uip-db = needed by sys to
train u) // RO // SCORE (how well u's behavior is altering) // STATUS (of u's
behavior) II TDS (w5 u
behaved -> builds up UIP-DB) // TRACK // UIP.
END THIS PARTS WITH RELATED PATENTS FILE
File: Features Intro / IMI Tie 2
MANY FEATURES W/ SOME OF THEIR MAIN SUB-FEATURES LISTED
Introduction: Main ways parts can link/tie together.
-How to use this file: Focus more on sub-parts without stars, and sub-parts
that help develop the main part
[versus how the main part helps other parts, since latter should have the
reference under it]
59

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Parts labeled with *, are hopefully main sub-parts needed to make its main
part family function. To reduce
confusion, avoid using this file so sub-parts show how the main part helps
another part; in other words, sub-
parts are listed to help develop main part's sub-parts and possibly reduce
repetition between similar main parts.
.-Parts labeled with * are only part of tie-ins with possible stars.
-Purposes of this file: Non-star parts might need merging and better
redefinitions. Ignore most of the *labeled
sub-parts.
MAIN FEATURE FOLLOWED BY SUB-FEATURES STARTS HERE:
ACCESS = brain order & timing nr ('notifier alerts user) q sa track
ANALYZER = coordinator router *order&timing *seek&react
-'Subsets of analyzer: 'coordinator; 'behavior analyzer; 'seek & *react;
'sound analyzer; 'uip (somewhat a type
of analyzer); 'visual analyzer.
-{- Nature of situation [that isn't completely wired into analyzer] is
understood via multiple 'sensors, eg: sound
and visual analyzers. See 'sensors.
ARTIST =*character *experience image mm *screen toy va
BEHAVIOR ANALYZER = experience *guide *Multi-User Predict *sa *Seek&React
*status tgh
*track uip *va
BALANCER= distancer osc ps zone
BILL / BILLING = score status tds track
CAMERA = Visual Analyzer See: Artist
CARTRIDGE =
CHARACTER = *experience image
CLAP = r
COMPOSITION (of sounds) = synth *sa *mic *dance *entertain experience motion-
sounder *osc
*sensor tilt toy vibration vr *wa
COORDINATOR = analyzer router *guide *seek&react *status *uip- tailor. This is
a subset of'analyzer.
'Sensor = coordinator: 'analyzes multiple sensors to get better understanding
of situations.
DANCE = composition *distancer exercise locator motion-sounder zone tilt toy
vr wa
DATA BASE = *analyzer *ba predict *sa *score *tds *uip *va
DISTANCER = balancer *dance *game locator motion-sounder ps *sensor.
EDIT = artist *camera *character image *mm *router uip-tailor va
EDUCATION = analyzer *ba guide *mood predict score status tgh uip- tailor
ENTERTAINMENT = *exercise mood *toy *vr
EXERCISE = *ba *dance
EXPERIENCE = entertain
GAME % = artist's-crawl *ba character tilt

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
GUIDE = analyzer education *interactive *score tgh uip-tailor
INTERACTIVE = *r seek&react sensor uip-tailor
K (Control via keys) = clap dance *interactive R ('remote control's 'analyzer
'adapts to user) tilt *zone
LOCATOR = see: distancer
MD / MOOD = BA ('behavior analyzer) entertain experience
MIC = osc sa synth
MODEM =
MORNING = BA ('behavior analyzer) entertain exercise experience interactive nr
*osc R ('remote control's
'analyzer 'adapts to user) *score seek&react sensor *tds tgh tilt *zone
MOTION SOUNDER = compose dance distancer *osc vr
MULTI-USER * = BA ('behavior analyzer) *cart *edit
MM / MULTIMEDIA = artist camera composition edit
NOTIFIER = access *interactive score seek&react status track uip- tailor
vibration
ORDER & TIMING = access analyzer morning seek&react sound-analyzer score
status tds uip visual-analyzer
zone. See: Sound Analyzer; Access.
OSC (Outgoing Sound Communicator) = balancer synth
PD (Positioning Device, GPS) = see distancer
PREDICT = *analyzer BA ('behavior analyzer) *coordinator *education *guide *
interactive *order&timing *q
*route *seek&react *sa *tds uip w5
Q = analyzer *db *education guide *interactive *predict uip
R = access clap *interactive see-k sa tilt *track *uip VA ('visual analyzer
'seeks &'reacts to designated
'images) *zone
ROUTER = *analyze *ba *coordinator guide *sa *score tel *track uip *va
SCREEN = interactive-k nr replaces-osc*
SCORE = *analyzer ba *bill seek&react status *tds
SEEK & REACT = analyzer ba interactive motion-sounder nr ('notifier alerts
user) *order&timing *score sa
*status *tds track uip zone
SENSOR = *analyzer mic *motion-sounder *order&timing *predict score 'seek sa
status *tds *tilt *track uip
vibration va *zone
SOUND ANALYZER = analyzer ba interactive k locator *nr predict score
seek&react sensor status
STATUS = analyzer bill score sensor tds *uip *zone
SW (Software) = *analyzer *cartridge *coordinator *db *interact *score *status
*tds
SYNTHESIZER = *analyzer *ba compose-overlapping *entertain *exper *interactive
mic motion-
sounder osc *predict sa uip
TEL = *interactive *mic *modem *osc *router *sa
TDS (Time Date Stamp) _
61

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
TGH (Therapy Gets Harder) =*analyzer BA ('behavior analyzer) *coordinator
education *entertain *game
*guide interactive *multi-user *order&timing predict q *router *seek&react
status uip
TILT = artist *balancer *composition dance distancer interactive *motion-
sounder R('remote control's
'analyzer 'adapts to user) sensor vibration
TOY = artist *distancer education entertain exercise experience game mood
motion-sounder seek&react tgh vr
wa
TRACKER = access *analyze ba *bill distancer *guide locator multi-user nr
('notifier alerts user)
*order&timing ps *predict router score *seek&react sensor sa status tds uip VA
('visual analyzer 'seeks &
'reacts to designated 'images) w5 zone
U (User) % = Systems that can be users in addition to people: access
(accessing system part or personl *game
multi-user R('remote control's 'analyzer 'adapts to user) router [what's being
routed] sa [what makes the
correct sound can use system] tel [accesses system via tel] uip [whatever
meets the uip profile, becomes an
accessor]
UIP (User Information Programming) = UIP-Access, UIP-BA, UIP-Edit, UIP-DB, UIP-
Router, UIP-
Tailor+, UIP-Track. UIP applies to all IMI.
UIP = UIP-Access, UIP-BA, UIP-Edit, UIP-DB, UIP-Router, UIP- Tailor+, UIP-
Track
VIBRATION =*dance *exercise interactive motion-sounder r tilt vr
V ISUAL ANALYZER = *analyzer artist camera *guide * interactive mm *predict R
('remote control's
'analyzer 'adapts to user) screen score status
VR % = *balancer dance *distancer *entertain *exercise *interact *locator
motion-sounder mm predict r router
screen *score *seek&react sensor *sa *synthesizer *tgh tilt toy uip *va wa
*zone
WA = *exercise *nr *osc *sa *tel toy vr zone
W5 =
ZONE = access ba balancer dance * distancer *locator *route *score *status tds
tracker uip visual-analyzer wa
CONCLUDES FILE ON HOW FEATURES CAN LINK TO MAIN SUB-FEATURES
File: Features Intro / IMI Exist 2
EXISTING PRODUCT EXAMPLES RELATED TO OUR FEATURES IN 1996 *
Introduction:
-Products listed in this file% exist, and exemplify optional embodiments of
the parts as mentioned in
descriptions of new inventions.
-Product description can also include new inventive material based upon /
correlated with the existing products.
62

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
* The part heading to which the existing products are tied are part of the
"branching system" as described in the
main "Introduction to product descriptions". Manufacturers are probably in
America unless otherwise
mentioned. Any dates directly tied to existing products are probably the
date(s) when its product publicity was
published. Brief description of each part pre-cedes existing products only to
help familiarize reader on general
orientation of part.
ACCESS = Gain access to electronic product's controls with a correctly keyed
in combination.
-Electronic fence: keeps pets away from underground voltage wire, since dog's
collar emits negative signal
when dog comes near. Replaces need for common fences. Sold by Alsto's at 800
447-0048, and Comtrad
Industries 800 704-1121, and Sharper Image. 94-9/95.
--unauthorized people can / can't = gain physical "access".
COMPOSITION *= Electronic Music Composition: Another variation of product can
also be used to create
interesting music.
-Interactive virtual guitar computer game: If you manage to play along to the
songs correctly, you advance to a
higher level of music playing. See preset images as you play. Sold via Skymall
at 800-424-6255, #63004'94-
95.
NOTIFIER = User is notified on the status of any situation.
-Gadget lights up during earthquakes. Sold by Innovative Electronic Solutions
Int'l, VA. SF Chronicle Feb 1,
95, Page Z2.
+--"Track": states if type occurrence occurred within (which) designated area,
eg: breaking glass, other break-
ins, fire (temperature sensors), chemical accidents/leaks.
-"Notifier" signals when train tracks are blocked: laser lights notice any
blockage. Nikkei Weekly - before early
'95. Developed via Japan Aviation Electronics Industry Ltd and Eas'Japan
Railway Co.
-Car owner "notified" when their car is being broken into. Nikkei Weekly -
before early '95, under article titled
"Crime rise boosts sales of auto anti-theft devices.
-Alarm sounds when "notifier" detects slight changes in air current within
car. Sumitomo Metal Mining Co,
Japan. Nikkei Weekly - before early '95, under article titled "Crime rise
boosts sales of auto anti-theft devices.
-"Notifier" seeks changes in infrared radiation (body heat) emitted inside
car. Nikkei Weekly - before early'95,
under article titled "Crime rise boosts sales of auto anti-theft devices.
-Auto voice dialer alarm: when motion detector ("sensor") activated =
predetermined telephone numbers are
dialed = receiver hears pre-recorded message, eg: this is John, my home at ----
- is being broken into.
. Existing Canine Systems:
Introduction: Also applies to parts%: R, Access, Track.
-Stop excess barking by emitting high pitch sound. Sold by Alstos at 800 447-
0048.'94-9/95.
63

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Electronic fence: keeps pets away from underground voltage wire, since dog's
collar emits negative signal
when dog comes near. Replaces need for common fences. Sold by Alsto's at 800
447-0048, and Comtrad
Industries 800 704-1121, and Sharper Image. 94-9/95.
-Prerecorded dog barking heard when someone comes near, eg: as detected by
motion "sensor". Sold by
Sharper Image 6/94, # S1600; and Comtrad Industries 800 704-1211.
OSC = Outgoing sound communicator signals user when a function within the
device occurred.
-Wireless speakers: pick and go almost anywhere (within home), #45121W & 53111
W. Also wireless
headphones, #53577W. Sold by Hammacher Schlemmer '94295. Speakers also from
Comtrad Industries and
many other manufacturers.
-Device mutes car stereo for incoming and outgoing calls on your cellular
phone. Comtrad Industries 800 704-
1211. '
--OSC is stopped / volume reduced when certain / important occurrences happen,
eg: alarm, bell rings (tel, door,
alarm, (cooking) timer).
R = Remote Control
-Datalink Watch: Downloads information from your computer. Store appointments,
tel numbers, to-do lists...
Made by Timex, USA.
-Wireless computers mouse that is moved in 3-D within room. Manufacturer
unknown. (Maybe another co
other than Creative Lab.)
-Pass hand in front of stereo activates snooze function (turning off sound).
By Magnavox, sold by Wireless at
800-726-8742 #31014'94-95.
-Adjust angle of tv via remote control. Sold by Skymall at 800-424-6255.
#63004. '94-95.
-(Video camera)'s controlled by eye movements via its = "sensor". KN: for
controlling any other electronically
hooked up system. Canon. SF Chronicle Aug 17, 95, page c3, Col. 1.
-Voice Command Remote Control. Trade name: VCR Voice Programmer. Sold via
Hammacher Schlemmer
9/94, #53554W. Also sold by Comtrad Industries at 800 704-1211.
-Leapfrog: Converts (infrared) remote signal to (radio) frequency. Enables the
signals to pass through
obstacles. Comtrad Industries 800-704-1211. '94 - early '95. Earlier KN
(invention(s)) too?
TRACK = Sys tracks or monitors actions of user, or system.
-Gadget lights up during earthquakes. Sold by Innovative Electronic Solutions
Int'(, VA. SF Chronicle Feb 1,
95, Page Z2.
+--"Track": states if type occurrence occurred within (which) designated area,
eg: breaking glass, other break-
ins, fire (temperature sensors), chemical accidents/leaks.
UIP = User Information Programming. System uses collected information about
user to better serve them.
64

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-UIP - T (Telephony): [People kept on telephone hold hear advertisement and
other informative recordings
(according to caller's UIP profile (their caller ID = database(s)). Caller can
also hear recordings during busy
signals. Average phone call answered in four rings according to study.
San Jose Mercury News 6.28.94, page 1 E. Quantum Systems Inc, Ramsey, NJ.]
--callers choose what they hear/get (via on-line/fax) from server's sw
('tailored software) menu.
-Radio Broadcast Data System: 1] U's radio interrupted to give traffic or
weather warnings (KN: combine gps =
sys). 2] "s" shows messages from stations, eg: song name & artist &
advertising & kn-other uip-
communication. USA Today, Feb 22, 1993, front page.
END IMI EXIST FILE: See Main Parts File and their Appendixes!
File: Features Intro / IMIT 7
" T" TELEPHONY FEATURE MANY OF ITS SUB-PARTS
Intro: This file includes additional definitions to Parts for products in
telephony, communications, interactive
multimedia. These definitions are part of (to be merged with) " Main Parts "
file. Definitions herein are only
minutely more important than Parts file. However, if there is a question
(conflict, such as between this file and
Parts File) this file's Part take dominance (are the default). For: Telephony,
* Electronic Communications, %
Remote ("R") Interactive Electronics, % Multimedia, etc.
GENERAL: One, multiple and or all of these telephony Parts can be incorporated
into one or more large
complex telephony network systems covering multiple locations (integrating
different systems). "C" is the
center of the merged diagrams and descriptions.
-When "TEL" /"T" / "D" are used in N (Product Numbers) other than those in
this file (such as those whose
main features may / may not be telephony), it refers first to
'telecommunications' simply, then branching further
out into all the telephony Parts contained in this file.
-The following products also apply to ~: all types of tel instruments (home,
office, professional), multimedia
(video, cable, video phone), interactive audio/visual/data (voice mail, toys,
entertainment), wireless
communication (Mobile, Cellular, PCS (Personal Communication System), %GPS,
Walkie Talkies, pagers).
TELECOM PARTS
ACCESS *= Access to tel functions is restrictable: Telephony functions are
iimited/modulated/controlled/
permitted/"access" according to the type "cart"/"access" put into/"uk" "tel".
Examples:
--W5 type calls allowed (to whom; system can request information from user
before allowing "access" into
desired mode/to desired tel #.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-D: 1 User = 2UK-3TR(speaks) = 4TEL-5C = 6TR = 7TEL/SC/9MFH
-7MFH analyzes ACCESS code from CART/PD and intern permits applicable
functions/ACCESS.
-3 Remote ("R")
-0-Direction Finders: "GPS" type systems incorporated into mobile tel units.
Information is available to user
according to his/its location (system acts as tour guide: better than the
current system which is restricted to users
being kept in the bus; system will guide person as well (where to go next,
while person can also use a map from
"display"/printed (out)))
-D: tel-pd-c-printer = mfh-live person who gives information\tel-o-C5
Intelligent hotel room key goes beyond
old magnetic card keys, has circuit chip. Can be programmed re data pertaining
to user, billing, etc. 18 Dec 92
X. Card enables activation of "tel". D: C5=tel/tr=remote
%-o-C78 Device warns user if they forgot to lock up when leaving. Door is blue
when locked, red when
unlocked. 20 Dec 93. D: C78 = c = "tel". User alerted (via: "tel"/tr/notifier)
whenever unauthorized person has
entered door (didn't user correct "access")
+5A-700 [ncoming/Outgoing Controller: to activate outgoing call feature, first
press a special button (once or
any number of repeated times in sequence) which lets you get dial tone. Caller
must dial the numbers soon
thereafter or dial tone is lost and any pressing of other keys on pad are
ignored. Additionally, there will be a
ring if an incoming call comes and can only be picked up (if handset is off
hook) by pressing the 'same or other
special button - this prevents kids/pranksters from answering the phone.
-OTD: requires memory of fewer codes; lets others use your tel too allowing
for greater flexibility; can restrict
any/all calls (long distance; by area code/specific tel numbers (caller id
restricts how certain calls are picked
up); incoming and or outgoing calls)
-Parents can't always control their kids from using the tel; hence this is a
valuable feature.
-D: tel=c (memory; caller ID recognition & processing) = tel line
* 5A-701 Long Distance Controller: Restricts access to long distance dial out
functions via first:
-needing to "uk" "access", eg: wait exactly _ seconds after picking up
receiver before beginning dialing / key
changeable code prior to dialing, the user's tel instrument or its "mfh" will
allow dialing out
+ Offer free telephone instruments which automatically dial into your system.
An extra button dials the access
tel number automatically. Give free telephones in countries like Japan where
they are extremely expensive.
Applications: long distance tel communication; information from mfh (weather,
news, entertainment); dial into
your mother/lover.
-They can also be produced cheaply and given as promotion.
-For people shopping for new phones, let them buy the instrument which comes
with a credit for long distance
or other services.
-Any other type ofdmm related service available via "tr".
ANSWERING MACHINE = Telephony Answering System.
66

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
OTD: ACCESS *(); %ARTIST (make art and leave such as messages; caller's or
receiver's systems may:
prompt user, offer the hardware/software for doing function); BALANCE *(); BVA
(); CID (); %CAMERA
(LENS) (); %CART (leave cart as part of U's incoming/outgoing message); CLAP
(); %COMPOSITION
(make music and leave such as messages; caller's or receiver's systems may:
prompt user, offer the
hardware/software for doing function); CONFERENCE (); FS (); % GAME (make
games (return your moves)
and leave such as messages; caller's or receiver's systems may: prompt user,
offer the hardware/software for
doing function); K(); MFH (); MIC O; MOUSE (); MP O; M ULTIMEDIA O; MULTI-USER
(for caller /
receiver, eg: key in code for type person wanted ("voice mail")); NOTIFIER
()'; NOTIFYING CALL ();
PORTABLE (); PRINTER (); PS; R(); S(); SCORE (); SOUND ANALYZER (); STEREO
*(); SYNTH
(); TDS *(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK (); VISUAL
ANALYZER
%(); VOICE MAIL (); VOICE MODULATOR (); VR %(); WA %(). Following are part of
the additional
possible examples: * I C-071 Multimedia Answering Machine:
Leave (video) messages for people in your office or home. Also has interactive
video feature, whereby user can
ask questions and get more information.
-Like a tel answering machine, leave multimedia (audio/visual) messages on
another's machine by transferring
data via wire or air waves.
-All operations also include standard telephone (audio only) answering system.
Outgoing announcement can be
received both audibly, or audio/visually on caller's device; receiving device
prompts caller with audio and or
visual signal to send their a/v signals (though only audio can be accepted as
well if caller's system is more
limited).
-Can work with the cruder current video telephones, and with more
sophisticated future models.
Footnotes:
Also acts like a fax receiving machine.
.-If caller's device doesn't allow visual transmission, or if there is
technical failure, system will work just in
audio mode
: Additional application: receive video clips at any time of (shows,
instructional nature [user can request from
manufacturer detailed instructions on how to operate, repair, etc their
product])
-Old Footnotes: display ("S"); "C"; pp; mp; uk; date; states the time and date
of incoming/outgoing messages
automatically; interactive; toy; all; entertainment; "mic"; synth; mfh; bp;
alerter; osc; vc; score (number of
messages); cart; tel; sp tel; tr; mo; FS; cp; mq; access; character.
-Makes it easier to decide who's message to answer; better way to communicate
yourself.
. 5A-5 > o Auto Call Back:
-H-should caller not leave their message, machine can call back number and
leave message in answering
machine owner's voice stating they wish they left a message.
-May store numbers of everyone who called and who then hang-ups (this is
already in existence)
-Also returns crank (obscene) phone calls with special statements recorded by
user and or manufacturer
67

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Tells person who has called in any selected past time period, "you have
called again and you're not leaving
your number, how can I make contact, please leave your message"
-[May or may not be legal]
. 5A-05I H o Beep: this sound should have psychologically arousing effect.
Makes listeners feel: happy, or
sexual, or excited, meditative and relaxed, soothed, advertisement, humor
(laughter can replace beep), animal
sound replace beep (maybe record your own animal), and or any other sound
giving caller the mood of wanting
to leave message/feel friendly/good
4A (before#l) o code each message by (person's name, topic...) then micro chip
files for future reference
. 5A-3 Answering Machine Features: outgoing beep and or sounds and or
conversions of outgoing messages -
all in frequencies, rhythms scientifically proven to enhance health, feeling
of well being, happiness.
-Machines might even state they are such a health product, making callers
happier to have called and feeling
less put off by the conventional impersonal machines, while they get their
healthy and or creative boost.
+Depending on caller's telephone number (via caller ID system), outgoing
message is pre-selected for them by
user.
-Interacts with caller's voice pattern to design psychologically fitting
sounds
Answering Machine With Outgoing Voice Synthesizer: select the type of outgoing
voice wanted with any
background sounds, and be other characters in your outgoing messages.
-Recording function of system allows user to record onto cassette tapes, etc
for insertion in any other sound-
creating device.
?- Answering Machine with Voice Synthesizer: Alter your outgoing message so it
is more appealing. People
will like you more (they often think about you objectively when listening to
your voice (from a distance), where
they have the choice of responding or hanging up.....}
. Exists: Language selection: press right number key to get instructions in
desired language
5A-4 H Answering Machine Game: caller is asked to play game. Game can include
any of the following:
trivia questions, questions about the person being called; caller must state
their preference for whatever asked,
eg: favorite color, food, famous person, country, music, musician, etc.
-Answers to multiple choice questions answered by pressing right number on tel
key pad; or announced verbally
onto machine
-Caller might only get through to live person, or be allowed to leave message
if they leave the type answer
machine/user wants to hear. Listener can hear in and scream call too. Machine
might say the following in
response to answers: very good; now you can speak with....; sorry please try
again on your next call; don't call
back until you .....; your answer(s) are being processed; etc.
-questions programmed/installed by user/manufacturer
. 5A-6 H Store certain tel messages in electronics. Can then listen to
whenever user wants without interfering
with future incoming messages.
68

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-retrieval process: key in request for old stored messages that have already
been listened to, then either give date
or person's message or ask date or person's messages in memory
. 4C-160-000000 Tel Answer Delay:
If person can't easily get to the tel in time, they can send signal which
tells caller "please wait, I am coming to
the tel".
The signal can be generated by: voice recognitions system; pressing of button
that is connected via wire, or
remote ("R") control; use of clap; or all calls are handled with such an
announcement when system knows user
is at home
-caller hears the live voice or recording
* 8B-310 upon entering dwelling or room, device picks up person's distancer
and will alert them if/when: I.
they have a message. The scream there could show and or print out message at
that time, if the person requests.
2. show their calendar for the day, week... 3. meetings they are scheduled for
4. events that could be of interest
to them
-the response person receives might indicate level of urgency in
communication, eg: less urgent; urgent; very
important. Person might be busy with something at that moment.
-marketing: get your messages more quickly and easily; be notified when you
have important messages instead
of having to wade through less urgent messages often. Helps replace need for
secretary.
-categories: door chimers, door tv, answering machines, software, computers,
pagers, intercoms......
* 5G: Tel Answering Machine:
Program the time(s) in which incoming calls are to be:
a] call forwarded to designated tel #(i 0-11am calls go to tel #1, 4-7pm calls
go to tel #2); b] tel answering
machine picks up calls automatically (user may or may not be "notified" of
incoming call); c) time of week
effects type of outgoing message. Also SCORE
-it's inconvenient to have your tel call forwarded to someplace where you
aren't; user might forget to reprogram
(pp) their TEL from remote ("R") location so this TDS controlled system
useful.
End Answering Mach
. Voice.mail and virtual secretary: identifies important incoming calls and
either takes a message or patches
call to recipient whether they are on the phone or at another phone elsewhere.
For details call 415 534-9453, or
800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. D: "answering
machine" = wildfire.
ARTIST ** = One or more users can make/design art/[mm shows/programs/games] by
interacting with each
other /"mfh", via "t" or other "tr". "Mth" can be programmed via:
UIP/PP/MP/CART. D: User's C-User's C
MFH (CART, T).
-OTD (Other Technical Detaiis): ACCESS *(); ANSWERING MACHINE (); BALANCE
*(design the sound
effects to accompany the U's mm presentation); BVA (each character/visual
element in mm presentation
69

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
responds/speaks with observer/u which interacts, differently according to
latter's uip); CID (); CAMERA
(LENS) O; CART O; CLAP Q; COMPOSITION ** O; CONFERENCE O; EDUC O; EXERCISE O;
FS 0;
GAME (); K(); MFH (); MIC (); MOUSE (); MP 0; MULTIMEDIA (); MULTI-USER 0;
NOTIFIER ();
NOTIFYING CALL (); PORTABLE Q; PR (mm show could be created using ' author
software'(from M/other
party)(via tr w another c)); PRINTER Q; PS; R(); S(); SCORE (); SOUND ANALYZER
(); STEREO *();
SYNTH (); TDS *(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK ();
VISUAL
ANALYZER %(); VOICE MAIL O; VOICE MODULATOR O; VR 10 (); WA %(). Following of
this
section are part of the additional examples:
BALANCE * = According to PD (GPS) location, tel's speakers and other functions
balance accordingly. PS
system can use the PD's location to do what it wants according to the software
used.
-incoming/outgoing calls transactable based on tel=pd's location.
Eg: users #10 & #40 can only dial certain area and or tel # from room #20.
-D: pd = remote ("R") = mm-c-t = osc
--OTD: uip (studies w5 of user) = mfh
-MM: Visualize user from their different angles according to your position in
relation to your video tel. The
position of the object effects the audio mode as well (humming instrument
shown on left side of S, has
speaker(s) towards the left humming louder than other (speakers/%vibrators/
fonotifiers))
-multiple cameras shooting from different angles
BASIC = Applies to all Telephony products. #1 Any portable unit (handset) used
by U is solar powered too.
(Just let it sit in sun.)
-D: telephony device (C) = tel line = receiver = signal converter = c= osc /
mic = signal converter = tel line =
telephony device (c)
BVA = Behavioral Voice Analyzer.
D:BVA=C=T
-OTD: ACCESS *(access is given to those people which exhibit behaviors/voices
meeting requirements (what
access has on U's UIP in its memory); ARTIST **(); BALANCE *(); CID (); CAMERA
(LENS) (the visual
effect in mm tr, is altered according to bva/uip of user); CART (each cart~:
seeks for different signals in
determining U's behavior / has different pr which takes and then processes
BVA's signals accordingly); CLAP
0; COMPOSITION O; CONFERENCE O; EDUC O; EXERCISE O; FS Q; GAME O; K n; MFH 0;
MIC
(); MOUSE (); MP 0; MULTIMEDIA (); MULTI-USER (); NOTIFIER (); NOTIFYING CALL
();
PORTABLE (); PR (); PRINTER (); PS; R(); S(); SCORE 0; SOUND ANALYZER ();
STEREO *();
SYNTH (); TDS *U; TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK Q;
VISUAL
ANALYZER %(); VOICE MAIL (while u is on hold / being call routed they hear
sounds/info tailored to their
behavior/uip. One party can designate what other caller gets while they are on
hold, eg; according to their

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
behavior/uip/what u wants listener to buy and or do); VOICE MODULATOR (); VR %
0; WA
Following of this section are part of the additional examples:
G. Voice Actor: System analyzes speakers' behavior (callers/receivers of
calls) (via "sound analyzer"). In tern
their voices are modulated in order to help achieve desired effects (boost~:
sales, work performance, improve
rapport,. make longer tel calls).
-System modulating sounds responds quickly and is controlled by C (UIP / uk
objective of communication),
which analyzes sounds and makes determined voice modulations.
G. "Speech" -"Sound Analyzer" (determ ining speaker's behavioral modes) = UIP.
Applications: if user is lying and which words tie to the lying behavioral
mode; boost sales
-OTD:
:~D: 1 uk(2pp/3mp) / 4**remote(2pp/3mp) / 5**clap (6 "speech"/* *pp/* *mp)
/%7[signal(s) tr between other
(related) product unit(s) / part(s)] / 8**mfh ! 9**mq / 10**uq = 11 [tr/rc] =
12+C = 13[tr/rc] = 14+applicable
product's description's desired function(s) are controlled / 15**other desired
applications / 16**"notifier"(osc) -
17**"score" - 18*"display" / 19**"cart" / 20*UIP /21 **"printer".
-D Notes: 1/4/5/6 (helps) control system (turns system on and of / controls
other functions)~:
-See Parts& for less crucial details
G. User accesses mth for desired 'effects' via "tel". Effects~:
type sounds / music. With UIP system is well able to design the desired sound
effects.
5A-880 Voice Analyzer: tells user the behavioral mode speaker was in while
leaving message.
-user can opt to have analysis at command of button(s)
-D: speaker-tel=mic=c(sound analyzer/UIP)-mfh=osc/notifier.
-tel call is routed in tel system according to caller's profile (UIP, valued
customer known via tel#, area code).
This function is in earlier N.
5A-910 Voice Analyzer: "display" shows the additional level of voice
modulation (inflection) needed to
achieve aim. Additional level needed can be based on what the synthesizing
equip needs to do, or how the
singer with only their natural means needs to make alterations
-aim can be determined via~: selecting from option in menu; PP; UIP
-ap: good for music education; useful in my computerized musical instructor
product too; teaches people how
to be more polite (on or off tel); analyzes if speaker is good enough to be
hired for job; analysis of speaker
useful for developing UIP.
5A-940 Voice Analyzer: recognizes voice's emotion and analyzes the feeling and
or behavior of speaker. This
is part of a larger product with other features.
5A-800 Voice Recognizer: transmits speaker's words onto scream. -converts into
language(s) of listener(s)
4C-090 Call Screener and Director:
71

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Based on the person's behavioral sounds on tel, eg: tone, system directs
caller to applicable person (eg: matches
caller's psychology with sales rep's (live or machine) voice and behavioral
pattern. Boosts sales. Also screens
out unwanted calls into the voice mail trap, etc.
-Related to: 5A-880-04200A Voice Analyzer: tells user the behavioral mode
speaker was in while speaking, or
leaving message on answering machine.
-user can opt to have analysis at command of button(s)
-related to 5A-940
CAMERA (LENS) *= Integrated into the MM T (Video Phone). Both person on other
end of tel line, and U
can see themselves and the other U.
-D: lens=camera=recorder= tr to S of all connected U
-C34 Remote ("R") Control Video Camera - moves camera into desired angle. 20
Dec 93 X. C34 ="tel"
(control via tel)-remote
CART = Can make the C-T system into a completely new product. One or more
slots in TEL take one or
more different CART. Examples of what CART can do:
-Dl : c/mth/tel = tel line = tr=tel=c--(display/uk/osc/printer/mth)=cart
-Otherwise, the TEL can become a CART into the systems mentioned below.
--D2: System (product category mentioned
below)=c-(display/uk/osc/*printer/*mfh/*mq/*uq/pp/mp/*uip)=cart(tel/*(radio
frequency tr/rc)/*mo) = tel line
= c/*mth/tel
-OTD: the merging/interfacing of category with tel is done either via CART,
and or plugging the systems into
each other via~: wire/wireless data tr; a "C" is located both in the "tel" and
the category product, each having
their softwares compatible/integrating with the other parts of the entire
systems.
--Why tel merged w product: The "tel" function serves many possible uses to
the category product, one or more
of the following may apply~: data from mfh (feedback/uip/database
access/memory storage and retrieval);
allows control of system from distant location ("remote"); convenience of
having a "tel" as well. At designated
time TDS, system will communicate the fact via "tel"ltr. "Score" is tr via
"tel". Two or more of these systems
can "interact" via "tel", with or without assistance of mfh.
--Misc: the C found in each unitlmain sub-unit of system allows for software
(CART) insertion.
-for *additional details on applications for each category product, see
filings showing how these products are
utilized.
CID = Caller Identification Systems (Caller ID, Ammie):
-D: Caller's tel = tr their CID = CID recognizer = C-T.
72

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Q 5A-900 In-coming Telephone Sales System: Caller ID determines how call is
handled within large
tel networks:
Incoming calls to large sales networks are routed according to caller's caller
id. Proven to increase sales.
Applications include;
I] Calls are routed to the sales representative handling caller's territory.
2) While on hold, callers hears news from a radio station broadcasting from
their area code; or (product / news)
information according to their UIP.
3] The speaker's voice is slightly modulated, proven to create greater
rapport, according to the regional accent
from caller's area code/caller's behavior (BVA-Behavioral Voice Analyzer).
4] Calls from telephone numbers with favorable past customer history are
routed to the most effective sales
people. Studies show some sales people are more effective with cold call sales
while others are more effective
selling to established customers, all depending on the sales person's
characteristics.
5] UIP / BVA determines if soft or hard tel skills are needed (for technical
support service) and: a] routes calls
to people w such skills; b] signals call receiver before call is answered as
to type skill needed to interact w
caller.
6] According to information being fed into computer ("C") (during telephony
interaction) system will better
know (possible) responses to be made by human / system.
7] Less desirable calls are: a] put / kept at the back of the cue of callers
waiting on hold; b] given lower quality
(sales) personnel. Especially conducive to nationally promoted telephone
numbers, where special customers
aren't given special numbers.
*Notes: .-speaker's voice is modulated. Eg: callers from southern USA have
different sound preferences than
northerners. D step 1: caller id=tel. D step 2: speaker=c (voice modulator
according to caller id) = modulated
voice transmitted over tel line
.-caller identified via~: area code; caller=id (uip (customers history)).
-"caller id" and related concepts can be replaced in this filing's
descriptions as any way via which to tag a caller,
including their: PIN, customer name (which might be typed in by recipient /
caller (when call starts)), area code,
% type activity (service/product) desired/being conducted.
* Psychologically adjust to type caller,: Voice synthesized for targeted
purposes (Caller's ID / UIP designates
type caller). Convert voices into those which create the feelings of: passion,
friendliness, energy, intelligence,
impatience and the expectation that the listener perform their work well
(studies show that speaking to people in
certain voice tones tends to create better work results from them)
-- eg: customer service department's synthesizer modulates sounds by volumes,
treble, bass (if above a certain
range)
-OTD: the sound change can be automatic(MP)/PP
-applications:
73

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--C decides type voice frequency desired for particular applications. 1] UIP
determines frequency (in sales, the
caller ID of customer labels desired frequency); 2] IC21 1-5A-890 - converts
typed words into sounds.
*-o-Modulate the sound frequencies of calls to induce both longer calls and
more repeat calling. Eg: eliminate
some of the unpleasant sound frequencies; synthesize in pleasant sounds. By
satisfying both sides of
conversation, calls can be increased, developing more favorable attitudes
towards the other party and the tel
itself.
-also: calls to/from particular regions can be modulated accordingly, eg:
calls from norther US (known for
sounding rigid) might be given a slight "twang"/other modulations to make the
calls appeal more to southerners.
Below is related to above or? Below was dev 3.94:
0 5A-900? Caller ID determines how call is handled:
-o- Caller ID can be incorporated into PS system too D: PD-Tel (caller id's
identifying transmission) = PS
(caller id recognizer) = c(analyzes/process/(forwards tel call]/uip]. Example:
both the user's location and caller
id are used to~: treat this party accordingly / develop uip or score.
OTHER APPLICATIONS FOR 'T (TELEPHONY): CALLER ID = C-TEL = TEL-C:
ACCESS **: caller id acts as one of the forms of an access code.
ARTIST *: multiple artists can make art together (multi-user) in real or step
time, via tr/tel line, system
recognizes callers and has UIP according to caller's/user's caller id and or
access code;
CART *:; CLAP:; COMPOSITION *: multiple composers can make music together
(multi-user) in real or
step time, via tr/tel line, system recognizes callers and has UIP according to
caller's/user's caller id and or access
code;
DATA BASE: Matched with caller's ID / their PIN / customer name / other such
taggable element. Uses~ key
word search to locate all applicable data on desired caller / customer.
Customer may have multiple tel #'s /
PINs. Use national databases too, eg: from Dunn & Bradstreet, telephone number
databases (from tel service
providers), etc.
DISPLAY ("S"): (shows: caller's tel #, and any other info about person user is
speaking with (either user called
them / they called user) such as their: address, how their tel number is
listed with the tel company / tel book,
advertisement by-lines and or descriptions about the other party (as provided
via UIP); ENTERTAM:; FS **:
attached to tel in diagram; GAME **:(each participant's caller id acts as one
of their possible "access" codes);
MFH: (UIP: develops analysis of callers (according to their call's W5)), can
be conducted by tel line provider
(US. Baby Bells));
74

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
a MORNING *: each caller id gets different type of interaction also according
to their UIP; PP/MP:; MQ/UQ
*:; IVIULTi-USER*:; NOTIFIER:; OSC:; PD/GPS: C(UIP) analyzes both user's
location (pd=tel) with their
caller id; PRINTER *:; Remote ("R"):; SCORE:; STEREO:; SYNTH:; TDS *:; TEL:;
TGH **:; TOY *:;
4-+- UIP : caller id helps c/mfh identify caller, and hence develop/provide
information pertaining to UIP, D:
caller's tel = their caller id = tr = tel = c-mfh = uip; UK: via C user can
pull up information about a particular
tel #/ user's name/function and get data on their: history and other UIP
information; WA's tel has caller id, D:
wa=te l.
a 5A-900 Related N. In-coming Telephone Sales System: Caller ID
I
Study customer behavior via (UIP) by merging following data~: items purchased
over tel line, purchases made
with their cards (credit cards, other member related cards) in other modes
too. This way marketers develop
detailed calculations about user / general market: what that person is likely
to buy; past, current and future
trends.
-in this manner, marketers can pin p'oint potential buyers without inundating
them with material they're not
likely to buy resulting in excessive advertisement exposure of=their brand
names and wasted costs; and buyers
begin to see such brand names in a more appealing light (that brand fits their
lifestyle).
.-this UIP data can be shared between some or many firms, the more sharing the
larger & more complex the
database system, and more accurate in determining customer characteristics.
o-"sound analyzer" also helps in analyzing caller's behavior to some degree,
and this can ad to the UIP's
databank of info.
0 6B-020 Caller ID Screener: Unwanted calls are channelled to the tel
answering machine mode. Exists.
-Caller ID system gives certain incoming tel calls (based on their tel no) the
tel answering machine recording.
Caller ID: system will respond to caller's tel number as user programmed:
-tel never rings when you receive calls from unwanted people (always gives a
message to those you wish not
speak with, so that you don't have to bother picking up tel or checking to see
the tel number of caller on display
("S"). lets user pick up tel at other times with less risk of speaking to
person they wish to avoid)
-gives different messages to certain tel numbers calling in
-has choice whereby user doesn't even have to hear the message from caller if
user wishes to program device
such. Eg: caller thinks their speech is being recorded; or device records yet
listener needs to use extra keys in
order to retrieve these less desirable messages (desired and undesired
messages are stored in different places)
-When receiving another call on telephone, radio wave, etc the first, or
second incoming call displays its tel
number, caller's identification, etc. allowing receiver to choose to answer
the call.
-Should call be undesired, receiver may opt to have incoming communication
handled by a tel answering
machine or related device. Or to keep things simple, any such unanswered call
automatically goes to the
answering machine.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Footnotes: Undesirable messages might automatically be erased after one hour
or after user picked up tel, which
ever happens later; Parts: all; display ("S"); pp; mp; uk; date; interactive;
"mic"; synth; m#h; osc; vc; cart;
access.
0- 4C-042-000000 Personalized Outgoing Recording:
~ Caller ID states whom call i's from. If receiver doesn't want to take the
call, they can pretend not to be at home
but to have created a special message for this caller. The important point is
that a beep follows the spontaneous
message spoken by user into "mic", so that caller thinks they received a
personalized recording only. Even the
audio message heard by caller could lose some of its quality to help caller
feel they reached a machine.
.-works with 4c-040, 4C-041
-OTD: display ("S"); pp; mp; uk; tds; basic; osc; vc; speech (tells who call
is for and from whom); vc; score%;
sp tel; cp; uq; pi%; multi-user; notifier.
.<>8B-170-083001 Advanced Tel ID: Know more about whom you are speaking with.
Example; their address
and to whom the tel number is listed, etc.
-applies whether other party called you, or you called them. Get more info
about party you called without even
needing to activate their tel's bel l; by just going into database using their
tel number
-Receiver's ID: know if tel you are dialing is *a cellular/mobile tel and or
if it is being call forwarded and or tel
number or type tel line to which call is being call forwarded.
-recipients may opt for such information not to be given out
-H [government regulations may not allow all aspects of the idea, depends on
the country]
83
-also learn above and the following about the tel number you dialed, or the
tel number that dialed you: the name
in which the tel is listed, their address, when the tel service started, any
major complaints against company,
status of the company - such as if it has filed for bankruptcy.
-also learn: how many calls they ever made from that number that day/wk...
-OTD: display ("S"); "C"; pp; mp; uk; tds; basic; au; mfh; speech; vc; score;
cart; sp tel; (also identifies tel
numbers for modems, and faxes); cp uq; mq; access; uip; multi-user; notifier
A2-3 ] 0 Tel Regionalizer: caller hears accent and music popular for their
region of country, according to tel area
code while going through voice mail or on hold. If available employee with
that accent will take call (perhaps
central number transfers calls to same region of country where employee there
takes call).
4C-040-103005 Caller ID Activated Speaker Tel:
System automatically puts calls from special people onto the speaker.
Answering machine takes call if user is
out or doesn't answer.
-When calls come from certain tel numbers, the speaker tel automatically picks
up the call.
.-works with 4C-041, 4C-042
-OTD: display ("S"); pp; mp; uk; date; tds; basic; caller identification
system (identifies caller's tel number);
"mic"; synth*; portable*; au; bp; osc; balance*; speech*; vc*; score%; cart%;
sp tel; cp; pi*; float (hand set
floats); multi-user (different beeps, etc are emitted depending on which
receiver is being called; 4C-041 Ring
76

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Identifier - if "multi-user" then prior to the speaker activation of caller's
voice, there is a coded beep or audio
announcement stating for whom call is for; cc*; remote*; notifier.
-user pp tel id of those people (who don't mind speaking via speaker tel)
8B-150-083008 Switch Board's Identifier:
Receptionist receiving call, encodes applicable respondent's tel instrument
(who call is for) with code /
verbalized recording stating information about the caller, eg:
.--caller's nature (client or supplier); level of importance, urgency; length
of time they have been on hold; if its a
local or long distance call; person and or organization; type personality
(nice...). -Receiver of call gets this
information on display ("S") of tel; or computer ("C") (can then store such
information with or without any
additional info put in by receiver (person who speaks with and handles call -
saves time keying in info, plus
receiver might not be able to key everything in time and or forget after the
call, especially if there is another call
coming soon thereafter). Receiver can hear or read this information before or
during the tel call.
-all this information can be relayed on to third (or any subsequent person)
taking call (perhaps prior person
wasn't right one to handle situation.
Footnotes:
Display ("S"); "C"; pp; mp; date; all; mfh; score; uq; mq; uip; character.
.-A2-310 TEL REGIONALIZER: caller hears accent and music popular for their
region of country, according
to tel area code while going through voice mail or on hold. If available
employee with that accent will take call
(perhaps central number transfers calls to same region of country where
employee there takes call).
4C-090 Call Screener and Director:
Based on the person's behavioral sounds on tel, eg: tone, system directs
caller to applicable person (eg: matches
caller's psychology with sales rep's (live or machine) voice and behavioral
pattenn. Boosts sales. Also screens
out unwanted calls into the voice mail trap, etc.
-Related to: 5A-880-04200A Voice Analyzer: tells user the behavioral mode
speaker was in while speaking, or
leaving message on answering machine..
-user can opt to have analysis at command of button(s)
-related to 5A-940
-Voice mail and virtual secretary: identifies important incoming calls and
either takes a message or patches call
to recipient whether they are on the phone or at another phone elsewhere. For
details call 415 834-9453, or 800
WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. D: "CID" =
Wildfire.
End of this CID Section
CLAP = D: clap = mm-c-t
77

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
COLOR ** = S's COLOR changes according to the frequencies (what "sound
analyzer" determines
voice/sound to signify (happiness) / UIP.
-D: sound = sound analyzer = C-tel = DISPLAY/TR = C-tel
COMPOSITION ** =
-see my jazz tel idea: user's can make music together simultaneously / in step
time. Useful to send data between
people to ~: hear their music; for educational uses.
EDUC: teaches tel manners (user's voice is too loud/abrupt = "sound analyzer"
= C = "notifier");
SCORE Simple version of video tel: option 1. caller transmits still photo of
themselves to other TEL; 2. kids
can see picture of their mother when they call her at work (such picture is in
memory of user's TEL being dialed
out from
--DI: user = dials = tel # ID system = C = Display ("S") shows picture.
--D2: composition = mm-c-t
CONFERENCE = Conferencing Telephony. Three or more locations/parties
communicate with each other. *
However these technologies might find applications in two party telephony too.
5G. Telephony Multimedia Conferencing:
Hook up w one or more locations. All parties on one display ("S") / each party
on separate display ("S") or
portion ofdisplay ("S"). Meanwhile parties can interact in unlimited modes:
ARTIST *:(); COMPOSITION
*:(); ENTERTAIN:(watch films simultaneously, enabling each to talk with each
other during movie (if
desired); play "games"); FS **:(); MFH:(); MORNING **:(); WA:().
.Q 5G. Conference calls - each speaker sounds like they come from different
region.
-manually set the balance for "sp tel" with two or more speakers in one or
more rooms
-in conference calling, each caller can sound like they come from different
part of room; or even the handset's
speaker(s) might create some stereo effect for one ear for conference or other
conversations.
-used for standard handsets/"sp tel"
.--if more than one speaker is in room, each's PD let's their voice be heard
from different region of room for
people on other ends of tel communication.
--in multimedia the location of the sound source as viewed on the "display" is
related to where the sound sounds
like it is coming from.
EDUC = D: educ = mm-c-t.
Hobby Multimedia Tel: System shows user how to do their hobby:
"Multimedia" "display" /"osc" shows/helps user do/learn/watch desired activity
(full presentation/UQ).
78

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--UK to "interact" w MFH/cable broadcast. User can select type
info/instructions/show from menu/via key
words (if food is the hobby: themes, countries, ingredients they like that are
used in recipes...).
-system will tell user where to buy/get/maii order needed ingredients; has a
separate advertising channel selling
food products.
-user can sign up for specific channels; tel can be placed near the type
activity of the channel: kitchen,
workshop, playroom... -including K206-5A-710 Laser Dialer option.
-type interests": cooking; horticulture; crafts & hobbies; psychology;
relaxation (how to; programs to help you
relax)
-D: osc/cart/printer/tel/display/uk=c=mih=c for bill collection
-OTD: "remote"; (system can even UIP (according to user's pp))); "balance"
EXERCISE: Exercise while communicating via TEL and ~:
--system monitors W5 of your exercising and TR it to other caller's
(TEL/Teal's C's DISPLAY) & so both can
see how each other is doing (checks heart beat, meters walked)
---for patients at home wanting to be monitored by their doctor
---SCORE
*-D: exercise = c = t
FLOAT **= Handset /* entire tel, floats.
FS = fs = c-t
GAME:
-interact with partners via TEL/REMOTE. SCORE
--D: player = UK = C-TEL = MF141C TEL = UK = player
-o-C1 ] 0 Video games linked to tel. AT&T, Sega. June 93 YD
D: remote/uk/display=c=Cl 10
INFORMATION RETRIEVAL %:
.Q Electronic dating service: UK info about themselves (UIP/mq). Then it gives
user: 'card'; *(list of tel
numbers w or wo names/addresses). 'Card' when inserted into special "tel" lets
user dial their blind date. User
might have limited information about the party they are calling (not know
their tel number, letting date call
them back)
-options: could have self imposed time limit for call, making it easier for
receiver; sender can press button
letting receiver get their tel number (receiver might/might not know) if they
are getting data (their te]#, name..)
on caller for some time - receiver can receive this data via: mail, mth can
call them up later and give it
79

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
audibly/tr info to receiver's c; if receiver is interested, they can uk info
about themselves so caller might call
them back again.
-Log into mfh to hear parts of desired show/play/film... "Display"
(touchscreen) interacts with user giving more
information too.
-tickets could be completely printed on U's sight
MFH "Morning Alarm": see in file other than 5G or 2K
- I C-07A (grew out of & includes I C-071)
For multimedia computerized tel sales. Potential customer receives such sales
campaigns via~: tel, videophone,
entertainment cable. User then touches key / touchscreen to get desired
details.
K = D: info +entry (uk/r(*clap)) = [s(mm)-=-+c-t] = mth
LOCATOR = User/1Vlonitor(er) can "locate" other's PD/TEL. SCORE
-Voice mail and virtual secretary: identifies important incoming calls and
either takes a message or patches call
to recipient whether they are on the phone or at another phone elsewhere. For
details on wildfire call 415 834-
9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. D:
"Locator" = Wildfire.
MFH = Analyzes company's calling characteristics:
Calling Characteristics Analyzer.
Tabulates how calls are made according to their W5 (W5 data for analysis~:
"sound analyzer" which seeks for
certain words & then calculates (mp/pp) accordingly; to where calls were made
and from whom and for how
long and any other information supplied (by user's UK (tel automatically
correlates that call to computer ("C")
activity made during the tel verbal/data transaction)).
-Applications: W5 of the company's current activities, which can also be used
to better forecast, and make any
needed changes. Catching illegitimate users of long distance calls (system can
alert investigator
(irregularities/strangeness/non-matchings), who can then look into matter
further). SCORE.
.-related for this description was developed earlier too
-D: m = mm-=c--t
-o-Tel # Database:
of people's and organization's telephone numbers within the country and or
most of the world. User can
"access"/"uk"=c=mfh for needed ~: tel #, addresses, co info such as their
products/services.
-useful source of information for my/other's products to compile: UIP / SCORE.
Or to detennine if "access" is
permissible; or develop questions for MQ, or answers for UQ.
-makes contacting people easier, hence increases caller volume
..-for letters differing one's own language, system can provide ~: an easy
automatic conversion / conversion
table / touchscreen.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
MIC: D: mic = signal converter = recorder-c-t
MOUSE: Use mouse to select the program(s)/tel # wanted/move or edit files.
"mouse"/"remote" ="c" ="t"
MP: The volume of user's outgoing call is adjusted according to type tel #
they're calling, eg: their grandmother,
or tel in country with poor tel lines.
-D: mp = c-t
MULTIMEDIA = Interactive Multimedia.
-D#1: u ( So"interactive" u)=k=c-s
-D#2: c="artist" (uk; touchscreen; remote) / t]
*-D#3: "composition" = c (edits via~: pp/mp (coordinates/combines/synergizes
(data/signals))) = tr =
display/mfh/other's system (c/tel)/osc/"remote" ("air pad")
-o-Video Phone: user's "tel"/system keeps in its memory information about its
user (picture of user(s); graphics
(logo); advertising by-line(s).
.--user can select from menu which of these they want tr to other "tel".
-C2 Electronic Blackboard: Participants share documents, images
and presentations. Shared via "tel" lines for simultaneous viewing and editing
by distant users. Graphics can be
retrieved and put on board from a file or electronically scanned on. Can
display ("S") video too. Sept
92? MF (Fuji, Xerox).
-Feel vibrations of music in seat.
Pioneer manufactured this before 1992.
-o-C116 Cable TV over tel line. AT&T 20 Jan 93
D: display/remote/uk=c-Cl 16 (other entertainment programs~: audio (radio),
%interactive.
MULTI-USER = D: multi-user = c-t
NOTIFIER = D: notifier = mm-c-t
-C6 Watch=tel vibrates instead of noisy audio alarm. For deaf, and radio DJ
people. Aug 93 X. -notifies when
"tel" is ringing. D: c5=tel/tr=remote
-G. Sound level & vibration level instruments: User alerted to~: incoming t
call / type of call (caller, nature of
call (level of urgency)) via~: vibration/flashing lights, or other "notifier"
modes. Useful for those who are
deaf/in recording situations/don't wish to disturb others.
: if deaf, use one of my other inventions to continue communications.
81

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Voice mail and virtual secretary: identifies important incoming calls and
either takes a message or patches call
to recipient whether they are on the phone or at another phone elsewhere. For
details on wildfire call 415 834-
9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996.
NOTIFYING CALL = D: Incoming call (CID) = C-T-"Notifier (Display/OSC)"
0 5G Automatic Outgoing Call:
-o- A TEL call/TR automatically made in certain circumstances,
upon alarm/actfcompletion of task, sensor makes call. Examples:
-setting timer PP (TDS) which~: alerts user to needing to make a call / then
dials out the call (and activates SP
TEL)
. Applications:
o If user hasn't risen from bed such call(s) can be activated. Determination
of having risen is in my past
inventions: 1] tripping of laser light shows person got out of bed; 2] sensors
(for pressure) in bed sense user is
still in bed; *3] alarm (located near/very far from bed) wasn't deactivated.
+-call goes to: wake up service (mth/person) who knows W5 modes of
conversation/sounds to wake up person
(what/when/how to say what (news station; "good morning, wake up")/why
(psychology));
--if someone rings your doorbell, and you're not there, the SP TEL there will
TR to user's location
--particular sounds in locations where user isn't located at the time (strange
noise), system in tern "notifies"
user/police via TEL/beeper/monitorer (police). "Sound Analyzer" is PP/MP for
certain sounds (barking dog;
breaking glass; setting off particular alarms; fire; water leakage; excessive
noise from baby/children; break in
and entry)
-D: user=sensor(mic)/uk/remote=c=te1(sp tel)/transmitter
(radio)=transmission=rc/tel/person=c-mfh
-OTD: simple/complex operations possible. Simple: activating (answering
call/getting line for dialing out).
Complex: dialing / making transactions available to any other sophisticated
TEL instrument.
3A-W20 Emergency beeper (portable/non portable): if alarm is triggered or any
other emergency comes up
person's beeper automatically goes on. Code/beeper type (eg: type signal or
light or word display ("S") shows
nature of problem, for example: three beeps means your grandmother is calling
for assistance)
-Application: for hard of hearing people (deaf); parents who want to know of
any loud sounds/crashes in
bedrooms (device may be designed to ignore loud child frequency voice, or
parents may want to know about
those screams as well - if they hear the scream as beeper alarms parent will
know nature of problem and may
decide on choosing to check).
-H-Bruce Dunn stated he knows of device that turns on lights when tel rings
: 8B-350 +? Notifier: if person's mobile tel, tel, pager, warlike talkie, or
like transmission-receiving device is
calling them and they are away, their watch or other smaller portable device
might alert them via sound, light or
quiet vibration.
82

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-device might notify them if there are any messages on answering machine or
voice mail, and or number of
messages. Such notice might take place with or without user's request for such
information.
-user might know caller's tel or ID number; then maybe user can let an
answering device take a message
OSC: states information about the incoming call via OSC/"notifier" via
caller's caller ID~: A] tel #; B] name of
caller (system remembers who each tel # belongs to according to a] receiver's
system which had such
information entered in; b] via tel cob's computer ("C"). C] nature of call
according to receptionist/info "uk" in
by caller.
-Headphones / Hearing aids: WA lets users speak/listen to tel conversations.
-D: t-c(pr) = osc
3A-360 Sounding Telephone: by pressing buttons create sounds that add to the
home/office telephone call's
creative fun! Great for teenagers and creative adults.
- Use for prepping up, energizing co-workers, artists, inventors, sales reps,
sad, sick or bored people with
cheers in background, etc. Get the healthy creative juices flowing.
- Devices for developing excuses to get off phone. Sounds: door bell (excuse
for, "oh i have to go now");
sound of another tel call ringing on second line; sound of click in call
waiting; record your own sounds onto
micro chip, [eg: mom saying "please come downstairs and help me"; dog/cat
barking so as to be walked or fed
or let out; fake sounds of tel trouble on the l ine .....]
- user records own sound effects
- can initiate in beginning of conversation to gain interesting start to
conversation, be somebne other than
yourself
H- Nature sounds: playful monkeys; birds; jungle sounds; rain;
-H- Joke sounds: silly babies; giggly babies; crying babies; short weird
sentences of laughter, etc; wild fat
lady's voice "well I got to get off the phone now, talk to you later!"' etc.
3A-361 Telephone Ring Announcer: unique sounds: music, church bells, bird
sounds, monkeys playing, baby
crying, verbal sound of butler stating "tel" or ..... '
-Key Words: telephone, decorate =(decorative and or decoration), toy, fun,
novelty
3A-362 Tel Ring Volume Accelerator: each succeeding ring gets louder. Alerts
those who might not hear the
ring. UP the feature into activation and selects volumes. Sound acceleration
might be on only one or each
succeeding ring.
-user can select alternative sounds replacing the ring
-continuation of ringing related sound might continue after any answering
machine picked up call
4C-041-000000 Ring Identifier: exists
Lf "multi-users" use same tel line; then according to caller's id #, there
will be a different ring when the call
comes in.
83

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.-eg: person #1 programs their desired tel #'s and when person #2 hears ring
for person #1, person #2 either lets
person #1 or the answering machine take the call. Caller is unawares of this
system.
-OTD: display ("S"); pp; mp; uk; tds; basic; osc; vc; speech (tells who call
is for and from whom); vc; score%;
sp tel; cp; uq; pi%; multi-user; notifier.
End of this Section of OSC.
PD = D: Pd = sensor = mm-c-t
PORTABLE = Wristwatch dials tel. Uses~: Casio's CMD-10/flip lid watch with
small dial pad; Panasonic's
wristwatch tel.
-wireless tr activate/deactivates tel ("sp tel"), dials tel #. Sys can also
remember certain tel #'s. a 4A-330
Jewelry Telephone Ring Alerter: Wherever you are in your dwelling, the
telephone ringing will activate your
jewelry/apparatus notifying you of ringing.
-great if you have friends calling you late at night and you don't want to
disturb others
-jewelry can vibrate as an alerter (watch, bracelet, ring, strap/contraption
on body)
-alerter notifies: doorbell; other alarms (fire, another person pressing a
medical assistance help request button
(on "remote") for system; when a fax has arrived (or any other
telecommunications data on home/separate line
(system will "notify" the type of tr received)); when someone is walking or
driving up the driveway/walkway;
clock (tds) alarm; when food (in oven/stove (as "notified" by tds) is ready);
--"notifier" ("display") shows the type of "score" (status) of desired
situation (as mp/pp)
-OTD: D: event=signal=c--remote-tel=tel line/tr
ACCESS ** (remote tr special code)
o BALANCE ** remote-pd = balance; CART *; COMPOSITION *; Display ("S"): (dial
by
touching/drawing onto touchscreen); ENTERTAIN
EXERCISE (monitors user's health "score" (heart beat; blood pressure; diet;
calorie usage); FLOAT **; FS
**; GAME ** (us as piece in game: remote ("R"), pd); INTERACTIVE %; LOCATOR *;
MD *; MFH;
"mic"; MO *; MORNING *; MOTION SOUNDER ** (in case of theft, "motion sounder"
can be turned off,
and if so it can alert incase of theft); MOUSE *; MP; MQ *; MULTI-USER *
NOTIFIER; OSC; PORTABLE *; PP; PRINTER *; SPEECH *; SP TEL
STEREO = remote-c; SYNTH; TDS *; TEL; TGH ** = tel=mfh-c
TOY *; UIP *; UK; UQ *; VC *; WA.
-OTD #2: For filing dates also see: A2-310 TEL REGIONALIZER
8B-350 +? Notifier: if person's mobile tel, tel, pager, warlike talkie, or
like transmission-receiving device is
calling them and they are away, their watch or other smaller portable device
might alert them via sound, light or
quiet vibration.
-device might notify them if there are any messages on answering machine or
voice mail, and or number of
messages. Such notice might take place with or without user's request for such
information.
84

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-user might know caller's tel or ID number; then maybe user can let an
answering device take a message
4A-34 Phony Car Phone: mobile telephone made not to look like phone,
minimizing theft potential. Eg: in car
made to like its a part of auto; for walking made to look like cosmetic case,
flashlight, etc.
Calls follow recipient: Voice mail and virtual secretary: identifies important
incoming calls and either takes a
message or patches call to recipient whether they are on the phone or at
another phone elsewhere. For details
on wildfire call 415 834-9453, or 800 WILDFIRE. See article in SF Chronicle,
p. DI, June 16, 1996. D:
"Portable" = Wildfire.
End This Section Of Portable.
PRINTER: t=c=printer, all in one unit; "portable"; "pd"
PS = D I: pd = sensor = mm-c-t. D2: pd-t
.Q 5G: GPS Analyzes users' tel calls:
-tabulate exact location from which call was made: many uses for th is
--user (person/his company/other monitorer) gets UIP for his own purposes
--UIP for one or more users. call from PD = GPS's analyzer = MFH = Tel Cox's
C. SCORE
---useful information: bill tel calls not by tel area code only but also by
the exact location of user; study W5's of
users' actions (know where there is more activity in undeveloped areas, maybe
land prices will go up there, drug
dealers, improving programs in human services/software by better tailoring to
actual situation); "sound
analyzer" seeks key words = C tabulates/correlates w W5 = UIP.
5G: According to location of user's "PD", the tel/tel answering machine
system(s) will respond/function
accordingly. Examples:
-If user is out of range/contact not wanted by user/wearer of "GPS's" "tr" (in
garden, bathroom, beyond range of
tel (mobile)), caller gets corresponding "PP" recording (I'm unavailable
now....; please wait a few seconds; ...I'm
coming). If user doesn't want to be disturbed, they "uk" resulting in
corresponding recording./ function (if caller
calls from desirable tel # (caller ID) user/system responds according to
"pp:'.
Voice mail and virtual secretary: identifies important incoming calls and
either takes a message or patches call
to recipient whether they are on the phone or at another phone elsewhere. For
details on wildfire call 415 834-
9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. "PS"
= Wildfire
R = REMOTE CONTROL. D 1: r= mm-c-t. D2: uk=c=tr
-o-C28 Yamaha's Miburi functions: sensors on both wrists, elbows and
shoulders. Wrist: controls volume, by
turning wrist in - changes vol. [Publicized in July 93]. Make movements to
dial tel: one type activity turns tel
on/off; another dials/ another adjusts sound modulation/ another memorizes and
or recalls memorized tel #'s /
another controls the "display" and or C
--D: C28=tel-remote

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ROUTER = Incoming TR are routed according to the PR.
-D: incoming call (CID, UIP (given by receptionist/via database of receiver's
system)) = t-c-mm
-0 1C-291-08300I Call Locator:
For people who spend much time in different parts of the office. Tel rings in
certain patterns, designating for
whom it is and how urgent. Calls for person only ring on tel they are closest
to.
Tel Follower: Tel rings for user at the tel closest to person's location.
.-Related to product I C-290.
-the system is simplified for easy use. For example: tel transfers are limited
to particular telephones within
office / locality; when incoming call arrives, it may state on display ("S")
name or person call is for
-Applications: this system is limited in usage to certain types of offices
where people are often away from their
desks within a general area. It fits particular office work styles, is not
meant for everyone.
+-saves time from having to have someone else get your tel
+-needed person is identified via:
--different tel rings may also apply as to who the call is for, or different
short melodies
--importance of call can result in louder ring or other signifier
--speakers might announce whom the call is for....
*--particular flashing lights
*--display on wall or other location near tel
-system can after replace the use of beepers, paging systems
Applications:
-receptionist is told who call is for, then they transfer the call by putting
in correct code which automatically
transfers call to the section of co where person works; in tern the designated
sound, etc is emanated designating
who call is for. The applicable person or anyone else can take the call (but
it interrupts fewer people if people
just got the calls themselves), if call isn't answered, then voice mail
records caller's message (existing
computerized tel answering system)
+-for office or home: tel only rings in room where person is, not disturbing
others. System recognizes person's
presence by their transmitter. This transmitter can have many other functions
for systems identifying where
they are within a dwelling, according to other features in product files A, B,
and C.
-Footnotes: remote ("R")a = display ("S"); = "C"; = pp; = mp; = uk; = date; =
all; = "mic"; = synth; = mflha = alertera = osc; = vc; = score; = tel;
a
sp tel; tr; mo; fs; rpc; uq; access; uip; character; clapper; distancer.
Option: only caller(s) with particular caller id's (according to receiver's
/*sender's UIP) will get their calls
channeled through this locator system; whereby other callers might go thru
normal channels (eg: receptionist ->
voice mail/answering machine if user is away from their main location)
86

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
3G050 Re(router) for T / C (M, Information Highway): 1] reconnects u back to
telephone number extension
they were transferred to but later disconnected from. 2] Acts as bookmark in
relocating where user was on
information highway or M.
S = D: s = mm-c-t
.-3C-370 Smell Telephone:
When the boss speaks with its subordinates, they want the people to be in a
state of mind of attention, etc.
Emission of certain smells when speaking in certain situations can be desired.
-System may best work within a special telephone network.
-Applications for types of smells being emitted when people are speaking in
the following situations, with:
clients; accounting; suppliers; morn calls son while she is still at work;
etc. Different behaviors are required for
each situation.
C100 Goggles contain miniature TV screens. Sony 23 Nov 92 NK
D: uk/remote=c(c100)-tel. Likewise, user cans see/hear who they are speaking
with; useful in "VR" too.
-user can make/receive calls while in virtual reality experience (the actual
software program for VR can be
stopped, so call= can be made / call conversation can be made while user
enjoys/is using the VR for other modes
("entertainment") simultaneously.
--user of VR can be "notified" (hears tel ring) when incoming call comes in.
Voice mail and virtual secretary: identifies important incoming calls and
either takes a message or patches call
to recipient whether they are on the phone or at another phone elsewhere. For
details on wildfire call 415 834-
9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996.
"route" = wildfire
SCORE * = D: score = c-t
-Cl Tel tallies phone charges, display ("S") shows how much the call costs,
before 92 MF. Probably Sony,
other manuf now too.
SOUND ANALYZER *= D: mic = signal converter = t-c
-Analyzes mechanical failures and anything else emitting applicable/unique
sounds according to a phenomena.
Use in remote ("R") locations, transmit via TEL/TR.
-G. Know what user is typing onto their computer ("C") on other end of tel
line via "sound analyzer" picking up
of signals generated as user types -> UIP. "Sound Analyzer" also studies
any/most of the other sounds
generated on other side of tr (at other parry's location), eg: cooking,
background conversations.
-applications: data about other party for the curious; for developing UIP
database.
-BVA uses "Sound Analyzer" to help understand the speaker (their behavior
profile).
-1 R-54 T accepts voice commands. Speak person's name, and system dials
person's tel number. [Sharp Corp,
22-22, Nagaike-cho, Abeno-ku, Osaka 545 06-621-1221 NK]
-OTD:
87
. . . ~ . .. . . :

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ACCESS **:(via sound analyzer (only certain verbal commands/person's voice
permitted); CAMERA:(control
camera: eg, lens angle via verbal commands (viatr/t) (for remote ("R")
camera)); CART *:(); ENTERTAIN:();
MFH:(); MULTI-USER*:(system recognizes different speakers, and will function
differently even if same
words are spoken by different people, eg: picks up on their regional accents /
male / female voices);
NOTIFIER:(); OSC:(); PR:(); R:(); S:(); SCORE:(tds); SYNTH:(); TEL:(tr); UIP
STEREO * = D: stereo = mm-c-t
.o Stereos: Speaker tel is part of veh icle/home/office "stereo" system.
-D: tel (microphone-main unit speakers (handset/stereo's speakers).
-exists?
SYNTH = D: synth = mm-c-t
TDS tds = c (pr)-t-mm
TRANSFERRING INTER-SYSTEM TELEPHONY = D: System 1- C System 2- C.
'8B-16 Tel Switcher:
Device transfers an incoming call from mobile tel to a regular tel.
-Purpose: save money. For those who started call on mobile tel. Listener need
not know the switch is taking
place.
transferring method possibilities: have regular tel line dial into the
cellular tel line at which time the regular tel
line will take over call; The receiving mobile tel must have special feature
to allow this.
UIP D: uip = c--t
-Information about how those user(s) speaks with/ about himseif, is collected
(over time). UIP gets info from:
"sound analyzer" = develops personality profile in C; what user "uk" = C.
oo-o-C=112 Computer ("C") predicts human error. Input UIP (working conditions
of person). System predicts
errors they're likely to make. 30 Sept 92 YD.
-Sends warning via "tel". D: C112=tel/tr=osc (alarm)/notifier
5A-720 monitors number of calls and lengths of conversation between certain
departments. A computer ("C")
database can show all types of graphs for diverse purposes, eg: which
departments might need to move closer to
another (during or without any corporate re-structuring), future plans, seeing
the values and flows of
departments, etc.
UK = D: uk = t-c-mm
-Hand written image input tablets: dial (uk) tel numbers by writing the number
onto the tablet.
88

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Bar Code Readers - Writers: data read/received is TR; C can tell writer W5 to
print which bar codes. D: bar
code reader/writer = c= tr/tel = c/mfh
-Image scanners: scan tel numbers/codes to get/compile tel numbers. Part of
needed info can also be scanned
and then matched with other data, eg: scan people's names, and system's memory
knows their tel numbers.
Hence user can then quickly develop desired tel list for C!"tel".
-Touchscreen for - television, computer ("C") training devices, virtual
reality, Intercoms:
User uk (touches desired numbers for contacting other party (via tel) (to get
more information, place an order,
friendly chat). -C32 Notebook computer ("C") with built in printer ("air pad"
OK too, but make sure its built-
in). IBM Think Pad 550BJ... Jan 93 release date X. D: C32 ="tel"-remote
-o-C99 Pancake music dial. Each disk controls different sound modulation.
Sony. 15 Mar 94 "Brutus", p.24
published in Japan.
D: uk/remote (C99) = tel. (Dial/receive tel calls by rotating the pancake
dials (not classic rotary phone dialer
with the 10 holes)
a 5A-710 Laser Keyboard: trip the light for the specific number wanted.
Invention has ten lasers (for 0
through 9)
-great novelty
-"tel" is one of the applications ~: great for wealthy people in kitchen who
want to make outgoing. call from
speaker phone with dirty hands; artists and clay sculptors; scientists and
doctors who shouldn't de-sanitize their
hands
Laser lights may also be directed out into open space (lasers are directed
(pp) so user can control functions of
any product from their favorite seat wo needing any apparatus (remote). D:
Laser transmitters =(person can
trip any lights here w the desired 'code') = Laser receivers = sensor = c =
control of desired product.
-'code': each laser can be struck like 'Morse code' generating 100 possible
type signals from each laser; the
combination of codes from each laser can be (for three laser lights 100 times
100 time 100). So the total code
(made from 1 or more lasers) makes the desired control, eg: on/off/change
modes/etc.
-"osc" (beep: same or different sound according to code/laser) is made each
time user: strikes laser / generates
recognizable code.
-partial list of products the laser keyboard can control:
Answering machines; etc.
-this product is described in my other files, eg: Parts
-D: laser diode(s) = tel-c = display ("S")
-OTD (tel applications):
ACCESS **; BALANCE **; CART *; CLAP; "Composition" = Laser keyboard (5a-710)
=*tel; Display
("S") (shows W5 of what's happening); EDUC** (can reprogram (pp) what each
laser represents (for signal
generation; EGH *); ENTERTAIN; EXERCISE ** (dial when wet: in sauna, where
wet, while on jogging
machine); FS **; MD *(osc); MFH; MORNING *; PP/MP; MQ/UQ *; MULTI-USER *;
NOTIFIER;
89

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
OSC; PRINTER *; Remote ("R"); SCORE (length/cost of call; tabulation of UIP);
SP TEL; laser dialer (5a-
710) = STEREO; SYNTH; TDS *; TEL; TOY *; UIP UK; WA**
5A-930 Get dial tone via "remote"/"clap", then speak person's name user wants
called.
-desired tel # can also be "clap" (make bursts of sound, eg: three beeps = the
number 3 of tel #)
Voice Activated Key Pad: by making clear monotones in single or multiple
bursts their corresponding key act
as if pressed on normal key pad. Sounds can be of certain letters to ease
memory for people in each language
group. For people who can't touch keys:
-scientists, doctors: can't desensitize hands
-artists, ceramic people, rich people cooking in the kitchen and others with
dirty hands
-activate system via foot or elbow triggerable switch
-system can beep sounds and or lights signifying that the key has been
activated {eg: similar to getting a click
when pressing a key in far enough} shows system accepts info. Each sound/light
response might be different as
with tel keypads
3C-010 Speaker telephone (incoming/outgoing calls; dialing (certain claps
designate digits of tel number)
3C-120-08300Q Tel Touch Pad:
Press soft pad and the manner in which you pressed it is transmitted to
receiver. This allows something closer
to physical contact while speaking with your friends. Only popular for open
minded cultures
-the surface hands touch is designed to maximize human pleasure, and reduce
any feel of moisture.
-if the other person presses, you can press .at same point too. This pleasant
tension allows the stronger of the
two people to force back the other person - just like two hands playing
together. -Footnote: mp; all; toy;
exercise; cr & cp; tel.
v see below section for pools---
5G Speaker Tel Activated By Other Hands free Means:
-Gen: Activation/Dialing/Deactivation UK/"remote" methods:
UK buttons separated/attached to: TEL (tel can be replaced by other
communication device (walkie talky, TR)
-Foot pedal(s): or use other instrument to UK activating tel line (answering
call), dialing, hanging up.
:~ code used to step on pedal represents each of the call activities:
activation; each # has different code
(dialing might even be done on one or more separate pedals); deactivation of
call.
-"remote"
-wall mounted buttons (by bed).
-buttons part of another system / activates other functions: eg: lights,
stereo, entertainment.
-o pool side (those w pools are rich and desire the luxury of being able to
stay in pool to handle calls)
--system's sound modulation handles splashing water so~: it reduces their
sounds; reduces any conflict in
audibility
--other: waterproof; portable unit (separate system/part can also go into
water
--for use in indoor pools; saunas too
-hobby area (person doing ceramics)

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.-kitchen, sauna, garden, auto, garage, industrial/hazard area.
-C: (don't leave computer ("C") to go and answer tel). Option: upon UK C, C
might record/tabulate score/UIP
of tel conversation. D: UK=C=TEL. Incoming/Outgoing voices might be
modulated/interpreted/translated
(simultaneously) as desired right on computer's DISPLAY/PRINTER.
-clicking button(s) on pen/watch/PD
-D: user=uk/remote=c=te1/sp tel=tel line
0-the volume of the speaker is controlled by the A. number of bangs/type word
spoken at the time the tel is
being activated (1 bank is quieter than 3 bangs)
VISUAL ANALYZER % = D: binocular/camera (lens)-recorder = tr = c-mfh--display-
uk-remote.
-Binoculars: viewed material is TR via radio wave / TEL. User controls
("remote") what is seen (camera
angle/focus) from his remote ("R") locations=.
VM / VOICE MAIL = D: mm-k-t-c = tr (telephony interaction) = t-c-mm-k
* 5A-870 Call Holding:
Listener requests type music/news they wish to listen (or none at all) during
their being on hold
-caller's ID (shows their UIP)/caller's city/country area code can help
determine type music they would prefer
-if desired, user can program from their tel to have the continuation of what
they were hearing/seeing
transmitted to them at their location (their tel) upon completion of the tel
call; or PP when the TR should be
made.
--user can even get the "mfh's" channel (its tel #) so user can 1] re-access
2] contact the vendor who can sell the
service for his own co's tel system
2B-250 Verbally input information (into voice mail) which is then
automatically routed to receiver either in
verbal or written form. Voice mail knows how to route message simply by
stating for whom message is for at
the prompt.
.-Verbally input information which is then automatically routed to receiver
either in verbal or written form.
Voice mail knows how to route message simply by stating for whom message is
for at the prompt.
All the inventions get people more interested in leaving a message, and leaves
less of the impersonal feeling.
Markets creative adults. Incorporates all standard answering machine
functions: date/time stamp...
- All reasonably available answering machine features can be options for each
invention
- All inventions applicable for tel answering machines too
.-2B-250 Verbally input information which is then automatically routed to
receiver either in verbal or written
form. Voice mail knows how to route message simply by stating for whom message
is for at the prompt.
.-6B-010 = 6B-1 (was 6A-1) if cal ler leaves message, recipient must return
call in order to get message.
Recipient who wants friends to feel comfortable will have to call back and
hence caller might feel more
91

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
comfortable leaving message. Recipient might then get caller and speak with
them directly if original caller is
at their tel.
-Touchscreen allows users to select from voice mail menu tr by other party's
tel-c. (This is done
simultaneously with voice communication (on same tel line)).
End Voice Mail
VOICE MODULATOR = D: sound -> signal converter -> k-c-synth -> signal
converter -> tr -~ t/osc
-Person who knows about voice modulation: Wendy Rocchi 303-488-5713 AT&T (Tu-
Fri 0600-1400 MST)
-each person might have own voice module because each person speaks
differently. Is used by lead singers
already. This could also be done on the trunk of the tel line (if user changes
locations, then their "access
code"/cid might match the needed voice modulations).
-Use vocoder (type of "synth" where person speaks into system), benefits:
voice sounds prettier (give voice
fuller sound, give some reverb, remove some reverb, make it sound more gravely
(sound is broken into bits)).
Though more difficult the voice's 'attack'can be modulated too.
--' Filter' (potentiometer and tuned coil) filters out unwanted frequencies
--'Noise Canceler': blocks unwanted frequencies, and or blocks out excessively
high decibels.
.-SB-330 According to type application, person's voice is changed accordingly,
eg: their voice for announcing
plane is ready for boarding, plane is late (frustration, or anger in voice of
speaker who is afraid of being
attacked with anger from passengers and who in tern is semi hostile in voice
as protection - this is bad), etc.
5A-950 Accent Alternator: change your voice to that of person with another
dialect of same language
+change sexes, sound more domineering, gentle, etc.
A2-720 TEL FREQUENCY RETURNER: caller's fq recorded, then music/sounds in
similar fq, stress,
happiness, level/type of feeling is heard by caller while they're on hold.
Purpose: makes caller feel at one with
other party. e m might make alterations to change caller's behavior.
8B-330 According to type application, person's voice is changed accordingly,
eg: their voice for announcing
plane is ready for boarding, plane is late (frustration, or anger in voice of
speaker who is afraid of being
attacked with anger from passengers and who in tern is semi hostile in voice
as protection - this is bad), etc.
5A-90 (Needs more work) Convert voices into those which create the feelings
of: passion, friendliness, energy,
intelligence, impatience and the expectation that the listener perform their
work well (studies show that
speaking to people in certain voice tones tends to create better work results
from them)
5A-91 the additional level of voice inflection needed to achieve aim.
Additional level needed can be based on
what the synthesizing equip needs to do, or how the singer with only their
natural means needs to make
alteration good for music education
5A-920 Modulate your voice on tel / intercom according to situations wo
getting up your own psychological
anxiety, eg: 1. up your volume, 2. sound more intense (create anxiety in
listener)
-many don't bother to sound upset on tel (form of motivation) because it
causes their own stress
for parents tired of telling kids to be quiet. Method #1: press desired button
for wanted verbal announcement.
92

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Volume buttons - select easily with one touch how loud you want to be heard.
UP outgoing statements.
Method #2: device makes your voice louder so as to reduce your stress in
yelling. Can be worn around neck
too, or kept on table.
-different news broadcasts are available according to UIP (tel area code) too
-there may be other N related to this
5A-94 Voice Analyzer: recognizes voice's emotion and analyzes the feeling and
or behavior of speaker. This is
part of a larger product with other features.
o Electronic translators: interprets/translates for user over "tel" lines.
-D: user=uk/mic=voice recognition system-clap-electronic translator-
display=tel=tr
-Examples:
--uk/speaks desired words/text, then system will print out and or osc to
party/c on other end
A2-140 TELEPHONE VOICE MODULATOR: mix w mind corrector, music selector,
personalized CD. Too
much or too little of certain fq need sound therapy. MFH listens to incoming
and your outgoing voice. Get the
therapies while you are on hold or when you ask for it or it kicks in (maybe -
if you want) when needed based
on your outgoing voice, or when co manager deems appropriate. Input personal
info to activate. Can also
increase feelings of seriousness, quality control, success...
End of Voice Modulator.
VR %= D: VR = mm-c-t
WA % = D: wa = mm-c-t. G. WA (walkman) which is mobile/cordless tel.
MISC: Octel Communications Corp can be designated developer of additional R&D
and manufacturer for any
KN Telephony invention. They're in Milpitas, California.
END OF THIS ' T SUB-PARTS SECTION
File: Features Intro / IMI * 5
TEL PARTS (FEATURES) *
Intro &: The applications / expanded additions of these Parts are found under
the #1: Part's main headings;
**#2: how the Part is used in other products and Parts.
ACCESS *~:
ANSWERING MACHINE~:
93

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ARTIST ** ~:
BALANCE *~:
BVA~:
-The 'Confidencer' telephony product may be placed in "mic" so that U's sounds
(voices) are more precisely
analyzed. Confidencer helps block out noise generated far from "mic" (street
noise, etc).
CID~:
-CID is not restricted to just the trunk line # when receiving calls from
companies (includes the specific # of
caller too).
-since multiple people can call from the same tel ("T") # / trunk, highly
sophisticated systems use BVA %[&
any useful elements from uip] to help determine / decipher who the speaker is
(from others using said tel ("T") #
/ trunk.
CAMERA (LENS)~:
CART~:
CLAP~:
-manner in which U "claps" (loudness, voice tone, speed of commands
(exemplifies IQ / knowledge of system))
effects how system will interpret U's UIP.
COMPOSITION **~:
CONFERENCE~:
EDUC~:
-educational programs are tailored to uip. Eg the following are altered in the
program: sound quality, graphics,
intellectual content (menu choices / order of presentation), length of
program. EXERCISE~:
FLOAT **~:
FS~:
-converts any MM image onto: paper, * stored electronic medium
GAME~:
INFORMATION SUPPLIER~: presentation utilizes EDUC modes
K~:
= 30 LOCATOR~:
MFH~:
-stores (complex) data / programs. Eg: EDUC, "information supplier", BVA PR,
uip
MIC~: Connectable to vocoder
MOuSE~;
MP~:
MULTIMEDIA~:
94

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
MULTI-USER~:
NOTIFIER~:
NOTIFYING CALL~:
PD~:
PORTABLE~:
PR~:
PRINTER~:
PS~:
it~:
ROUTER~:
S~:
SCORE~:
SOUND ANALYZER~:
STEREO *~:
SYNTH~:
TDS *~:
TRANSFERRING INTER-SYSTEM TELEPHONY~:
U1P *~:
-speed in which users k needed digits (as requested by voice mail / for
extension #s) helps determine u's
behavior. Eg~: fast smooth entry is intelligence / familiarity w co or system
, slow k being the opposite;
uneven flow of entry is being unsure.
-Incoming calls on major networks are tagged according to Caller ID. The
program routes calls according to
information tabulated on the caller. Diverse applications, when properly
utilized, are proven to boost company
profits.
Sales Telephony (UIP)
Nationally advertised telephone sales numbers automatically route more
valuable calls to appropriate sales
people.
-Programming's many options let incoming calls to be tagged as needed.
Examples:
-The caller's telephone number is matched against telephone numbers of past
callers, or databases describing
most telephone numbers nationwide such as by company size. Preferred callers
are routed to staff with better
sales skills, who may also be better trained in the caller's type needs. -
Northern Telecom already routes calls in
Canada to bilinguals according to the caller's region. In the US we can match
calls coming from particular
regions such as California or the South, with staff conversant in the caller's
dialects and mental outlook. This is
proven to facilitate rapport.
Tech Support Telephony (UIP)

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Calls from customers with a history buying upgrades of the software are routed
to better trained staff. Calls
from difficult customers, or regions like New York are routed to staff with
"hard phone skills". Verbal and data
communication may also be routed according to the user's registration number,
keyed in the beginning.
Difficult callers can also be kept at the end of the waiting que longer.
-Results from extensive research on Telephony User Information Programming is
available. Other systems
developed by Steven Kays are being used by the Baby Bells and NTT.
UK~:
VISUAL ANALYZER %~:
VOICE MAIL":
VOICE MODULATOR":
VR %A:
WA %~:
Telephony Q:
DID: direct in dial telephone number
Dead Air: no music while on hold
VOCODER: (type of "synth" where person speaks into system), benefits: voice
sounds prettier (give voice
fuller sound, give some reverb, remove some reverb, make it sound more gravely
(sound is broken into bits)).
Though more difficult the voice's 'attack' can be modulated too.
FILER: (potentiometer and tuned coil) filters out unwanted frequencies. But by
itself will make voice sound
like something is missing. This is part of vocoder.
NOISE CANCELER: blocks unwanted frequencies, and or blocks out excessively
high decibels.
Lingo Q:
-caller:
-receiver:
-while on hold
--put on hold
-call routing, according to: CID;isystem's database on CID; routing call
within office during same call
CONCLUDES THIS FILE: FEATURES INTRO / IMI * 5 FILE
MAIN FEATURES File: Features Intro / IMI 26
96

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Dec 2006 Version
OUR MAIN FEATURES FILE
For Updates & More Visit www.LicenseItToday.com. Tel (+1) 707-428-5000.
Introduction: This important file explains our features to a moderate level.
Later more details can be read in our
main features file. Features can also be viewed as parts or functions. * Later
see table of contents for older and
less used features.
THE FEATURES:
ACCESS = Gain access via a wide range of means to our electronic inventions.
Methods include
giving passwords, or having one's fingerprint analyzed. Like the word "access"
suggests, it offers forms of
Access include: Passwords, admission, having a license to use or produce an
invention, connecting, contact.
Having a license. Even visual scans of fingerprints, could be considered. For
details on this and most of our
other features, kindly visit the detailed features section listed in the table
of contents.
ADAPTING TM = Invention determines what is needed, and then automatically
'adapts itself. A
common example is when it 'adapts to the user's needs. It can also be called
Tailoring or User Information
Programming. Details in UIP below. Then more info in the detailed features
section=.
ANALYZER = An important feature. Like the word "analyzer" suggests, it thinks
about what is
needed, and reacts. In other words it is a system that attempts to match the
human brain in making decisions.
Decisions are made from a choice of preprogrammed possible 'reactions. It
makes the needed analysis as
designed. Using fuzzy logic, it takes on the needed functions of software, as
would be needed to handle the
applicable tasks called for.
. For Techies: Forms of Analysis: estimate, 'predict, figure out, inspect,
interpret, investigate, judge, resolve,
scrutinize, %test, think through [the menu options], dissect, divide, audit,
canvas, formulate, [try to connect] 'associations [between digitized files
representing real life matters], explore.
See our Artificial Intelligence related files.
ANIMAL *= Inventions adapted for pets in a wide range of ways.
Read Later: Things our features can do for animals including pets: 'Analyze
them, and their. 'behavior. 'Track
them. Their 'behavior modified via: communicating with them; 'interacting;
'educating them; keep animal away
from certain zones. See our folders for: pet inventions, 'behavior analyzers,
'tracking devices, etc.
97

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ART / ARTIST = Optional software can alter images. Tailor pictures to your
taste. A useful multi-
media tool. Can automatically edit images as programmed, or system can help
'guide user in altering images.
System's 'Visual analyzer with wide powers, determines the characteristics of
the image to be altered. Later
read more details in the detailed features section.
ASSOCIATION / ASSOCIATE / ASSOCIATED / MATCH =
Like a human brain, it makes associations between multiple situations. A form
of artificial intelligence relying
on fuzzy logic. Look at it like a clever system that can find commonalities
and connections between any two
or more things. How do you use the terms in your vocabulary? That can be how
we also define this useful
features.
. READ Later: Functions like how a human or *animal draws associations between
multiple things, people,
actions, characteristics [experienced by five senses ('sensor)].
. Associative Memories [Al]: Example steps: At Home: I.=Owner's dog barks too
loud ortoo long while owner
is home, while UIP system and dog are at home. 2. adapt draws auto-associative
memory, by matching what its
'sound analyzer hears. 3. adapt (UIP) slightly punishes dog. Out in Public: I.
System 'senses it's outside the
home. 2. adapt (UIP)'s 'sound analyzer determines some dog has barked. 3. Via
hetero-associative memory it
realizes there's a dog. 4. Via associative memory it determines it's the
owner's dog. 5. adapt (UIP) responds to
owner's dog barking differently than when at home.
, =
BA / BEHAVIOR ANALYZER /*BVA = Behavior Analyzer. This important feature uses
multiple means in
determining the behavior of who or what it is kindly observing. This
information is available to the system that
wishes to 'adapt a function for the user's tastes. See the detailed features
section.
BALANCE / BALANCER TM = Inventive way in which audio speakers balance their
volumes so you
feel you're still in the middle (sweet spot) as you move around.
C = See "Computer"
CAMERA / LENS = The system's electronic eye and visual recorder.
Read Later: 'Tracks and 'analyzes changes in its visual fields. It's 'visual
analyzer feeds information to:
'behavior analyzer; 'notifier; other' analyzers; activator of function when
'designated [visual] occurrence has
happened. Lens adjusts itself to best capture visual activity, e.g.: for
distance, 'tracking moving object.
CART / CARTRIDGE = Just imagine a cartridge that gives needed functions just
by popping it into
an invention. It can be software and or an automatic license.
For Tech ies: Any of'our electronic invention numbers / functions are [also]
[un]pluggable.
Connect/unconnected/activate an invention as needed. 'Cartridges are a[type
of] 'node in the unity of
98

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
inventions' system. Cartridges can be inserted/connected into the
[invention's] [sub] system. Can contain useful
software / databases / features.
-'Customization: Use cartridges 'customized to the 'designated function; and
or the 'cartridge has the
'customizing features built in. Can require 'access [passwords / licensing
privileges to activate].
CHARACTER *= Animated graphics used in software.
Read Later: Characters portray: "moods", personalities, facial expressions,
facial / body movement. See: -f-
"Edits" "Images"; See "S" for other details. A'game 'entity [normally not a
live person themselves in flesh].
CHARACTERISTIC = Facets that differentiate something. How do you use the word
"characteristic"?
Read Later: The distinguishing traits or marks [from other 'inventions, 'game
entity traits], idiosyncratic traits
are more distinguishable, what comprises the 'entity's or 'invention's
character, feature, disposition, unique
['mood, 'editing, form of 'education or 'guidance.
CLAP *= Clapper. Activate electronic features by your making sounds. Each
combination of sounds
from hand claps or verbal sounds/speech controls a different function.
. Read Later: Allows user to control invention without touching. E.g.: via
clapping or verbal commands -> mic -
> sound recognition system -> c(computer- in center of system) -> activates
function. Also: voice recognition
recognizes human speech (follows spoken word's commands).
COMMUNICATE = Imagine people and or electronic inventions communicating with
each other.
Read Later: When any two or more people, other organisms, and or devices
communicate with each other in
any way. Modes of communication include: 'OSC (outgoing sound communicator)
might speak words to a
human, Electronic 'Transmissions, Signals, Something experienced by any of a
person's or animal's five sensed
(sounds or flashing light-see Pet-Communicate sub-part), 'Notifier, etc.
Normally some 'reaction is expected
in the counterpart of the communication, as there could be a purpose to
communicating.
COMPOSE = What sounds might you like to compose? Or would you like an
invention that has
learned your tastes, to then synthesize something for your tastes? Do you
prefer having more or less than
normal level=s of bass or treble? It can even talk to you like a favorite
actor. Electronic Music Composition:
The product can. also be used to create interesting music or sounds.
+ COMPUTER / C= Computer. Central processing unit of this system and its
inventions.
CONTENT ANALYZER / CA =
99

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
System determines the nature of a substance. Think of a substance you would
like to have analyzed for its
contents. Remember the world has a wide variety of ways to analyze just about
any type of contents. They
range from X-Rays to soil test equipment. They also include our Sound
Analyzers (SA) and Visual Analyzers
(VA). Also: our Smell Analyzers, Motion Analyzers and *Taste Analyzers.
. READ Later Rest of this Central Description: 1] Physical content 'analyzer:
CAT Scanners, X-Rays, Scales*.
2) Database content 'analyzer: Types of 'databases analyzed include: ba-db
(database); track-db (database).
adapt (UIP)-DB development is a type of'Content Analyzer. Applications:
develop adaptation (UIP)-db
(database) or adapt (UIP)-tailor.
COORDINATOR = This feature coordinates different parts and aspects inside the
electronic system.
Human beings naturally coordinate themselves, like their eyes, posture, hands
and brain as they read about
interesting inventions herein. Feature examples: 1. If a music synthesizer's
volume goes up, it may refrain
from allowing the bass to get too strong, to avoid damaging the speakers. 2.
Windows close automatically
when it gets cold, but if a flowerpot or something is accidentally left on the
windowsill below where the
window is coming down; the window will only close far enough as not to cause
damage. 3. It determines which
functions are more valuable for the person, and 'tailors accordingly.
CUSTOMIZE = Same as 'Tailor, 'Adapt, and 'adapt (UIP) (User Information
Programming). The
terms 'Adapt and 'Tailor are better than 'Customize. The latter is used as the
term can shorten the text
descriptions, because they require fewer accompanying words, e.g. "customize"
is shorter than "adapt to the
user" or "tailors it for...". Don't get stuck on the word "customize", stick
with the "Adapt" concept.
D TM = Figurative Drawitig. See the Figurative Drawing file that explains the
easy codes
used in our drawings. Drawings were frequently called Diagrams up to 2006.
. Read Later: The term Diagram: May also be represented by "dia" or "diag" or
"diagram". Also see "Tel" part.
* Telephony is the old and rarely used abbreviation for "D". The old
definition for D was telephony. [Since "D"
for diagram is easily verifiable due to context, e.g.: it normally was
followed by a colon and then diagram with
parts lined together with the symbol.] Please see "T" for the definition of
telephony.
DANCE *= Things are triggered by how you move your body. A motion sensor
interprets how you
move. Imagine having sensors on your body's appendages; then a computer could
see what was moved.
. Read Later: Sensor 'guides user in proper body movement for physical
therapy, or for learning golf swings,
etc. Movement of body / device% generates sounds. Includes Yamaha's Miburi,
which copies KN.
DB = Database. Stores needed information: as short or long-term memory files.
Database is important
in the systems' 'analysis functions.
100

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
DESIGNATED = What has been selected. Refers to a scenario falling within a
specified range. It's
used much like the definition of "designate" in any dictionary.
-Examples:
--'Seek & react uses 'designate to 'seek some occurrence or state of being
within a[pre] defined parameter.
-"Access" allows designated passwords
-"Behavior analyzer": designated behavioral profiles
-"Education": system seeks designated information user needs to study (from
internet).
-"Visual analyzer" seeks certain images
.-The software 'program's parameters need element(s) within bounds of
designated characteristics.
-Diagram: input - electronic signals ->c (computer)- (designation criteria
analyzer) = next step: after
designation criteria are met following action can occur.
DIAGRAM = See "D" for Figurative Drawing.
DISTANCER TM = Signals or system responds whenever any two or more parts:
separate or touch or
alters in certain algorithmic domains of time or space. 'Notifies when certain
algorithmic functions have been
met, eg: separated by certain distance; for longer than specific time spans.
See +Positioning System, and +PS-
Zone.
EDIT / EDITOR = Alters text and graphics as desired. Can be done automatically
as programmed. Sample
alterations: insertions or omissions; highlighting; rearranging.
. Read Later:
-Benefits of 'Editing: 'Tailors data; Helps 'artist and 'education process.
-Toggle Multiple Cut and Pastes. Cut and paste the memory of several different
elements, without memory loss
after a pasting. Toggle between pasting/activating multiple elements. Toggling
controlled by 'edit, 'educate,
ADAPT (UIP) Tailoring. A separate function controllable by human user.
EDUC I EDUCATION / EDUCATE = Teaches the user what is designated. Can teach
user how to
utilize and benefit from features. Software based training.
. Read Later: Educational: also used as optional learning program or
experience. Teaches skills (via separate
software tutorial mode). Overlaps ',Guide functions.
-Educational: can also be used as a learning program or experience. Teaches
skills (software has tutorial mode).
(Helps) replace human instructor. 'EGH [Educational Gets Harder] is subset of
"Educ".
EGH *= Education Gets Harder: Compensates users for their improved
performance. System remembers user's
performance and makes itself more or less challenging accordingly. See 'TGH
(Therapy Gets Harder) and
'Education files for details.
101

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
ENTERTAIN / ENTERTAINMENT *= Users can also derives pleasure from invention.
ENVIRONMENTAL PROTECTION / E.P. = Our system hopeful can monitor itself and or
the
environment. It may adjust itself for greater EP. Analyzer uses sensors to
determine what's happening. It 'seeks
and reacts to designated situations.
EXERCISE ** ='Guides and allows user to use invention in a novel way for
exercise and good health.
Also might function as helpful companion, guide, or rule setter in physical
exercise. 'Score's person's
movements.
. Read Later: Also might function as helpful companion, guide, or rule setter
in physical exercise. Drawing: I ->
2 ->3
-For Techies [OTD (Other Technical Details)]: u (user) moves from body
posture/point I to 2 while user is
interacting with product both in I and 2; 3 person continues exercise
(123456...); system is good for person
moving about in at least a minor fashion, though not necessarily requiring
strenuous physical activity.
-"Billing": bills. *See: Access' Features for Motion and BA (Behavior
Analyzer) (behavior analyzer): type
motion= matches needed behavioral profile to gain "access".
-Type motions ("scored" (via "sensors")): "Dance"; Vibration (KN); PS-Zone;
Access' "Motion"; How object
(made (by u) to "Float".
EXPERIENCE = Person experiences part or all of system by their physical
senses. The joy of the
experience is one of the invention's many benefits.
GAME = Common definition of game. Videogames. Arcade, computer, electronic,
mobile and wireless gaming.
A(so potentially playable on [mobile and wireless] computers, NintendoTM,
PlaystationTM, XboxTM, and or our
'designated invention [hardware]. Inventions have additional 'game related
functions. See our many game
invention variations in the games folder.
GPS / PS (Positioning System) = Global Positioning System. Studies any
movement of one or more
objects/parts in relation to any physical or time grid. Movement is correlated
with other databases. See 'PS
(Positioning System).
Read Later: Receive 'guidance for what you do and where you go. For example,
our GPS Controlled
Headlights: 'notifies what's coming up, eg; curve in road. Tells users which
way to turn. Or communicate any
information as programmed. Light/sound/vibration can be emitted in any way [to
driverlpassenger(s)/back seat
drivers].
102

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
GUIDE TM / GUIDANCE = Acts as the user's personalized guide. Helps users learn
how to use the
invention, by 'tailoring the guidance to the user's interests. Helps users in
way they will better understand,
especially in areas they need more help.
. READ Later:
-Examples: 1] Suggest how best to use system to match user's particular
requirements, traits or preferences. 21
'Educates how to use system. 31 Knows when and how to prompt person so they
can better use and or learn
system.
.'Tailors itself to user's unique needs: each user and situation or task is
different.
-Suggests how users might proceed [when stuck or having other trouble (with
system)].
-System guides / prompts users for when / how (w5 (what, where, why, when and
how)) they can be "educated".
ICON = An image on a computer screen. It represents one or more features that
can be activated when clicked.
IMAGE = A graphical depiction on a'screen. 'Artist and 'edit can alter
'images. 'Icon is a type of
image.
INTERACT / INTERACTIVE / INTERACTION % = Interactivity. Interactive system.
How system responds to person. Useful interface offers multiple ways to
utilize invention's features.
. READ Later Rest of this Central Description: System's advanced alternatives
can approach virtual reality.
'Tailors itself to better interface with user(s) so as to: be easier, or more
exciting to use, or better help
accomplish user's desired task.
. Interactive modes of Activation: Activates a signal via one of the following
methods without touching a
button. User activates via remote mode, eg: user makes vocal sound, clapper,
activates a distancer), touches a
computer screen.
. Interface covers: How person and system interface 'seek and react to each
other, focusing on the system's
functions. Manner in which user interfaces with system. How system "reacts" to
"user" / how "user" "reacts" to
system.
K = Keyboard. Person inputs any type of information via whatever electronic
means. This feature (also viewed
as part) can be replaced with 'Remote Control part.
*"Interactive" Images: for computers or interactive screens: Can use
"interactive" keys or icons (on 'screen).
KN = One of our inventions in this or previous patent filings conceived by Mr.
K a y s.
* Invention shows that we have the same or similar invention. invention is a
subset of N (one of our inventions).
N Inventions in this or earlier filing, and or other's inventions and non-
patentable products.
LICENSE / LICENSEE / LICENSOR = Having 'access to 'designated features.
103

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
*'Billing: User/'Licensee is normally 'billed for payment, based on 'access
related criteria. Payment [can be
considered 'Royalty]. 'Tracks licensee [usage level (in 'designated
'zones/market regions)].
LOCATOR / LOCATE *= Locate what you seek, and it can be found. Uses GPS and
other
positioning systems to identify where something is based on its tag.
. READ Later: Shows object's location (or person its attached to): Correlates
an object's location in relation to
that of other set objects, eg: other 'positioning devices, (fixed) location
'sensors. Shows location. System's
receiver (A) identifies the location of its related electronic devices (B)
which can be separated.
M MFH = Mainframe computer is connected to system.
MATCH: See "Associate"
MIC / MICROPHONE = Microphone records sounds onto microchip or tape. Such
sounds can be
studied by 'sound analyzer and 'used as 'designated.
-Microphone adjusts itself to the direction and distance and type sound, to
maximize record ability.
MORNING * = Morning alarm system. Be notified in creative ways.
Also functions as a creative morning alarm.
. Read Later: Uniquely wakens up the user such as via morning alarm, next can
require them to act in some
manner to bring them to full wakefulness, eg: by requiring some intricate task
[on their personal computer] to
deactivate alarm. A common piece of hardware for the software is the popular
P.C. Can alert one at any time,
and might require a novel way to deactivate in a special 'order & timing.
Drawing: tds/uk/remote =c
(computer)= alarm.
MQ *= System asks person questions, enabling itself to be better adjusted to
person's needs. Is an
instructoriai'guide)for user; with help menus. MQ's analyzer studies behavior
of user so as to better enable
itself to gain information 'designated as being helpful for user interface.
This is a sub-feature of the 'Adapt
feature.
MM / MULTI-MEDIA = Exciting audiovisual effects. Great for the invention's
interface. Enhances
the user's experience of the invention's many features. Sounds, graphics,
typeface and other images are
'tailored to interest the user.
MULTI-USER = Invention adapts differently to each user, which is why it's
called Multi-User. Each
user can achieve a different benefit and experience, as those features, which
are needed, will be offered
differently on an as needed basis.
104

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
READ Later Rest of this Central Description: System is programmed to
differentiate between multiple (u)
users, and 'tailor itself to each different user's needs. Each u (user /
person) is differentiated from others via
their: physical characteristics, 'BA (Behavior Analyzer), 'access code.
N= Inventions in this or earlier filing; and or other's inventions and non-
patentable products.
NOTIFIER /NR= User is notified when something happens. They are alerted to the
occurrence of
any designated event. Determines the nature and degree of urgency, and how
best to alert the user.
. READ Later Rest of this Central Description: U (user) is nr (notified) via:
sounds, lights, information on
computer display, vibration (of device touching body).
-'Tailor or users 'designate what: occurrences cause the 'notifier to 'react,
and 'W5 (what, where, why, when
and how) are notified.
ORDER & TIMING / O&T TM = It analyzes patterns in the order for how events
occur. Different patterns are
interpreted separately from other patterns. For example a slow beat of drums
differs from a fast beat. Each
pattern triggers a different event. The world of events is filled with such
patterns. These patterns along with
what the system may pick up by way of its available sensors help it analyze
what is happening, so it can react
accordingly. .
OSC TM = Outgoing Sound Communicator. Audio function. System's speakers
communicate with
users in words or sounds. System tailors its communication to the user's
listening abilities and preferences, e.g.
offers higher volume when the Sound Analyzer determines there is background
noise.
OTD * = Other Technical Details. What can maybe be read later. Usually for
those interested in the
technological aspects. This term is simply a header used for the parts. "For
Techies" can be the same as "OTD".
Later read more about it in the introduction.
PD TM = Positioning Device. The element whose location is being identified.
GPS is one way to track
positioning. Portable unit(s), which broadcasts their location to PS
(Positioning System). See: PS.
PORTABLE *= Portable. The separate portable version can be half the weight,
and twice as compact,
and shock resistant as non-portable variations. Can be used as a Walk About
invention.
For Techies: Drawing: c (computer) = battery = protective casing around
product = handle
.'WA strap: use the product while walking about, since the strap will hold
itself in place on user's: upper leg,
upper, lower arm, waist (use by just turning head down), necklace, or shoulder
strap; bp. 5E090 Wireless
terminals connect to central system.
105

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
PREDICT TM / PREDICTION = Software predicts what will happen or how user will
act. Its analysis
of past action patterns, allows it to project future likely patterns. The more
information it has about past
patterns the better it will predict. Anticipating likely future occurences
better enables the adaptive system to
manage future situations.
READ Later:
In other words, likely occurrences, or behavior of others are anticipated,
better enabling system to respond to or
handle predicted situations.
-For example feature can predict: 1. what type of 'guidance user needs to
become better 'educated with the
feature's abilities. 2. Profitability from licensed inventions. 3. Ability for
this patent application to maybe stop
an infringer from using our ideas, e.g.: this application might show ten, one
hundred, a thousand or more
examples for how we describe our invention in our link structure.
-Prediction works via 'analyzing: 'order & timing; behavior; adapt-db
(database); ('scored) -rpatterns; other
algorithms.
. Prediction algorithm: Step 1] collects historical information. Step 2]
identifies (past) patterns, especially
searching for parameters as 'designated. Step 3] determines present and or
future (known) events or parameters.
Step 4] Fills in the missing elements of step 3 with multiple predictions for
each slot. Step 5] each filled in
anticipated scenario from step 4 is 'analyzed and 'scored for the likelihood
of its occurrence (as in steps 2). Step
6] each prediction is 'scored for likelihood. Step 7] prediction may opt to
use the prediction(s) with highest
'score(s). 8] Designated functions are altered accordingly.
. Likely behavior of others (in real life) is anticipated, better enabling
designer of (kn) system to make their
system respond to or handle predicted situations.
PR / PROGRAM = Program: User and or manufacturer program the product's
computer software.
PS % = Positioning System. A general term covering many of our features. It
uses 'Locators to
identify something's position. Locators rely on a'positioning device like a
mobile GPS unit to read where
something is located. Then this information can be sent wirelessly to the
greater positioning system.
PS-ZONE TM / ZONE = Studies moving things within a zone. Permission to use an
invention can be
zone restricted. For example one may have 'licensing rights for a wireless
invention in Munich and Silicon
Valley's Palo Alto.
Read Later: 'Analyzes the 'location of 'positioning devices, especially in
terms of when and what (w5 (what,
where, why, when and how)) they are doing in the 'designated zones. Limits or
allows 'access to 'designated
functions according to the zone of user and or what's attached to the
'positioning device.
106

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Q / QUESTION / QUESTIONNAIRE = System asks questions to get needed
information. System asking
person questions better enables adapting it to the user's needs. User can ask
system questions, such as via a
software help menu.
READ Later:
User / System asks questions to each other. See U (user asks system questions)
& mq (manufacturer asks user
questions to adapt it) functions for details.
R = Remote Control. User can control the system either via remote control, or
keyboard.
REACT / REACTION = Subset of "Seeks & Reacts".
REMOTE = See "R".
ROUTE / ROUTER = Imagine a phone call getting routed through an international
phone network. Users can
also be routed within a system so they can access its desired features.
Packets of data are sent where designated
within the system.
Read Later: Software Routing Method. System analyzes user's needs and routes
them to the designated points,
eg: on information highway, or to designated files or programs within system.
S / SCREEN = Display Screen. There is a touchscreen variant too.
Read Later: Machine displays data on display ("S") screen. Display screen may
also be "interactive"
touchscreen (screen can function as keyboard "uk").
SCORE / SCORES / SCORING = Imagine a soccer or tennis game. The software keeps
score. It
scores just about any event that can be quantified. Example scores: 1. Users
can score how well an invention
adapted for their needs. 2. The system can score the likely chance that a user
is actually hacking into the system
based on their behavior profile. More.
Read Later: Invention can score numerical quantifications of a product; user's
performance; or 'status of
situation. Definition overlaps function of "Status". System reacts according
to how good a score is, for example
it may consider something with a high score more important.
SEEK / SOUGHT = Subset of "Seek & React "
SEEK & REACTS / S&R = System seeks designated occurrences, which intern
triggers an automatic
reaction. There are two steps: First the software seeks a designated
occurrence, then it responds accordingly.
It's like having a friendly butler to handle matters as things come up.
107

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
SENSOR(S) = Uses any available sensor to determine what has or is happening.
Sensors can 'score
for the presence of certain chemicals. The motion sensor catches movement in
the area. Thermometers and
other meteorological equipment are also sensors. Many more sensors exist.
SA / SOUND ANALYZER / SR / SOUND RECOGNIZER = Imagine having your ears in
remote
locations. And imagine your ears could interpret what happened for you while
you are away. This is what the
sound analyzer does. There are many benefits, for example: the system can
react to an event based on what
sounds it hears, such as turning on the lights when it hears your hands clap.
Read Later;
. In other words it 'Analyzes sound. Database memorizes tens of thousands of
possible sounds. Analyzes type
sound by frequency, volume and or direction and distance of sound source. Type
sound generates a feature that
initiates corresponding function.
. Tagged Cascade Effect 7J08: System hones in on a frequency (sound), then
cancels other sounds making
tagged sound clearer. System 'reacts when the 'tagged action occurs. Hones in
on anything effecting man's five
senses. 'content analyzer, 'edit, 'seek & react, 'tailor, 'visual analyzer.
SEARCH & REPLACE* = Imagine a text editor's search and replace feature. More
specific examples
include: 1. A child reading a storybook online has their favorite color green
inserted into the text to replace red,
when descriptions of toys and other in'ventions come up; 2. Features in this
system driven by software, can
have its code edited; resulting in its being better adapted to the user's
needs.
Read Later: Aspects of database or other software elements are altered.
. People who happen to have dyslexia can have text 'edited so it is easier for
them to read. Each person
probably has different reading difficulties such as with specific characters_
So system adapts accordingly.
Kindly see our Search & Replace file that was in the introduction.
.'Edit or 'Tailor alters how sections of computer, DNA or chemical code are
'Searched & Replaced. The
suggested formula is 'tailored to the designated need.
SOUND VISUAL ANALYZER / SOUND VISUAL RECONGINZER %* = Imagine a laser beam
bouncing on a screen based on the music's rhythms. It converts sounds to
visual effects. Or conversely it can
convert visual effects to sounds.
STATUS = Would you like an automated attended to tell you the status of a
current situation? It is
cheaper than hiring a live person. The feature determines the status of
something based on what scores have
come in. For example: This invention can see if a factory in Viet Nam is
infringing on its inventions and to
what degree by scoring the volume of its exports. Export figures can be
obtained from customs houses in
Europe, or even from investigators in the local country.
108

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
SW = Software Program(s). This can control what features are offered to the
user, and how they are
adapted. One can 'license software that is inserted like a cartridge.
SYNTH / SYNTHESIZER = Sound synthesizer. Received sounds are altered. "PP" &
or "MP" selects
the synthesizing program and how it processes sounds; microphone ("mic").
Sounds like music and verbal
communication are "adapted to listeners based on their hearing preferences.
Useful feature in composing
music, etc.
T / TEL = Telecommunications in its various forms are available. Mobile phones
(called "cell phones" in the
US). Telephones, Internet. System and its features can stay connected
wirelessly or via fixed lines.
TAG = Would you like to know what is happening to something when you are away?
Tag it, and
have it tracked wirelessly by your system. Details in the 'Track feature file.
TAILOR T"' = See the 'Adapt feature, and discover how our inventions will
tailor themselves to they
adapt to the user's needs.
TDS = Time Date Stamp. Program memorizes, labels, and identifies timing of
desired occurrences. It
registers what happened.
TGH / Therapy Gets Harder *= Use can be psychologically therapeutic. Therapy
machine helping
people. Also, compensates for user's state of mind and or current personal
info, and or condition, based on: what
user keys in, are how well they scored in the previous physical therapy
session.
TILT TM ='Remote Control Joystick. Otherwise confidential.
TR = Transmission: sending / receiving via: air waves / wire.
Read Later: Eg: radio waves, infrared light, copper/optical cable, tel line
(whether wireless/wire). Drawing: *
electronic product/feature = transmitter/receiver = transmitter/receiver =*
electronic product/part. "Billing":
bills for time used /"accessed", eg: like tel bill. This 'TR feature can also
be referred to by the term
communication(s)' when used in the electronic context.'TR is a needed
component, eg: for 4E020 Registrar.
The equal sign in our drawings (diagrams) shows where the transmission 'links
can be.
TRACK / TRACKER = Tracking System. Tracks. System 'tags then tracks
designated: person, file,
and type activity. Can develop adapt-Database on what it is designed to
monitor / study as studied element
changes or moves. Software driven. Example: an intelligent monitor that tracks
what files a person accessed in a
109

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
computer; or other types of activity done by person. GPS follows where and how
a person or vehicle travels on
planet. Tracks a person as they try to gain "access", and what they do after.
TRAITS = Characteristics. Usually used as characteristics of a user,
especially their preferences.
What they want a system to do for them. See User Information Programming
(adapt) on how it tailors systems
to the traits of the users and or situations.
U = See User
UIP = See Adapt
UK T"' = User Keys In Infonnation. This combines the U(user) with the K
(keyboard) feature. Or
just call this feature "K" or "R" (remote control) as a user is needed to use
either access method.
U / USER = User can be a person using the system. Sometimes another invention
connects to our
system, in which case the outside (less central to the overall design) can be
considered a user as well. Usually it
is the entity licensed to use the inventions and their features.
VA / VISUAL ANALYZER / VISUAL RECOGNIZER. The camera can analyze what is seen.
Its
interpretation of the image is sent to the automated system that can react
according to what has been seen.
. Read Later: Studies image thru its 'camera. "Analyzes" images. System
determines what images are present,
then system responds to images as programmed. It's 'tailored to 'track
'designated 'images. Visually 'Seek
'Designated 'Images. A visual version of the Tagged Cascade Effect 7J08
invention.
VR **%= Virtual Realty. Future use with virtual reality technology possible.
User puts on goggles
and or gloves and or body suits that let them virtually experience what a
situation feels like.
WA = Walk About Portable version of the invention. Communicates wirelessly
with rest of system
and/or other systems. User 'interacts with it also as a portable way to
'access desired features (in main system).
Can have optional headphones.
W5 TM (WHAT, WHERE, WHY, WHEN AND HOW) = What are the five most commonly asked
basic questions in the world? This feature asks I. What happened. 2. Whe=re
did it occur. 3. Why did it
happen? 4. When? 5. How?
ZONE T"' = See PS-Zone.
110

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
FOR MORE INFO ON FEATURES SEE:
Table of Contents. Files with more details on the features include: Features
Appendix (often includes
important but less central specifications and diagrams), plus many files
devoted specifically to each feature.
Then follow the optional links to other parts of this and connected patent
applications. For updates and other
information visit our site www.LicenseItToday.com
(D CONCLUDES CENTRAL SECTION OF THE FEATURES / PARTS FILE
SECTION FOR COMMON FEATURES IN GREATER DETAIL
READ THESE CENTRAL DESCRIPTIONS LATER
File: Access \ Introduction
ACCESS FEATURE
Access's Table of Contents:
Introduction
Behavior Analyzer for Access. Files: BA+, BA, BA-Auto, BA-SC, BA-Tailor, BA-
1M1, BA-Pat, BA*.
. Common Features
Images Needed for Gaining Access
Patents and Keywords
Miscellaneous : Access *
Gain access to electronic product's function with the correct password or
creative input. Use Our
Masterminded Patent Application To Improve Your Security Control Ideas! Learn
about our quick and easy
licenses. Call (+1) 707-428-5000 www.LicenseltToday.com
There are many ways of giving access. Jump in and read how.
Forms of Access include: Passwords, admission, ability to approach /'interact,
connection, contact,
introduction - greater levels need greater passwords, perrnit, intrude,
infiltrate, license, sei'ze magic words for
entry, correct password / keyword, abracadabra, secret sign ['image].
Permission to: achieve, buy, catch,
collect, earn, gain, get, have, promote, secure, take, win [a 'game],
recognition, parlay, pick [from menu],
succeed to do something,
Any action a user can make and which is picked up by a sensor and intern
converted to signals, such
as: standing one meter from a heat sensor for 10 seconds, or blinking one's
left eye twice.
-Any occurrence can become an access procedure, whether in life form; or life
form that effects a "sensor"; or
electronically generated occurrence. Eg: any "R" or "K" or "Artist" invention
is also utilized for generating (in
111

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
unique a manner) signals, which are subsequently interpreted as passwords.
Examples of ways listed in Access'
Features (Parts).
-(The term Passwords includes: Accessor's Changeable / Common Behavior
Profiles)
+p--The untrained illicit observer may not realize there are actual signal
occurring functions designed
to gain "access", and even if it was noted, it may be difficult to log such
actions by accessor short of having a
motion camera. Required actions from accessor especially focus on those less
readily capable by observers and
hackers. Examples: body movement or behavior or work actions that may seem
somewhat ordinary or which
don't catch special attention. Password procedures may seem as slightly quirky
behavior by observers, but
possibly special notice wouldn't be made if the procedures are camouflaged -
see "Hide Access Procedure".
-The largest Features (Parts) of "access" (as of 9.96) were analysis of images
drawn, and analyzing behavior of
accessor. Details of most access Features expound therein as well.
-"Morning alarm" introduction: This is only one of the many applications for
"access". "Morning alarms" are
systems created to uniquely waken up the users, and then to require them to
acting some manner to bring them
to full wakefulness, eg: by doing some intricate task on their personal
computer. If necessary, "Morning alarm"
can be ignored only to better understand the general natures of "access".
3C292 Magical Building Blocks: Each combination has designated results. See
3CE file.
-A1-290-1 2 1001 Finger Print Reader: Analyzes a person's behavior by their
fingerprint. Also matches
couples with compatible fingerprints. Related to existing "C" systems based on
horoscope, blood type. Similar
products exist at least in idea form, see "Popular Science" new products
section for an issue in '94 - 4/96.
* The UIP (user information programming) of user can change from data
collected via "tracking" sys.
% "Camera" = "Track", % "Sensor" = "Track". Tracking by "C" originated signals
(eg: what u (user) is doing
on el (electronic) sys (u=k=c)) is favored tracking mode, and cheaper to
produce.
.-"Router": locates then= retrieves needed data= for this part.
ACCESS For Medical, & Biological Research:
** = Gain access to electronic product's controls with a correctly keyed in
combination.
Each subject (patient/element being studied/user
(human/animal/virus/%bacteria/ loplant)) has a separate code.
-Each subject has its own way of triggering the code. Examples:
-human keys in code
-characteristics of subject are determined (via sensors / uip), these
characteristics hence trigger one or more
applicable codes.
--Drawing #1: 1 characteristic (changes / identifies identity of subject) = 2
sensor = tr (transmits) (transmits) = 3
analyzer (uip) = c (memory).
--Drawing #2: D 1= tr (transmits) (transmits) = signals (electrical / commands
to control or change (electronic)
device which is designed to = effect / alter the subject = 4 change(s) in
subject = sensed via (D 1) sensor = D 1.
4: characteristic, eg~ = (physical state or change (chemical, color,
temperature / type and or quantity of viruses
present)).
4 function of viruses:~ speed of multiplying / deactivation / movement (speed
/ where to and from) /
112

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
4= characteristic of larger organism subject hosting smaller virus subject(s)
4 = chemical state of subject (larger host / viruses) ~: Ph / blood contents /
temperature / sweat contents
This and other password generations can be utilized for training
animals. Invention can cross borders of language, culture, age, intelligence,
physical handicap, and sometimes
even (mammalian/farm/pet) animals.
2B090 Sound Art: Convert sounds into interesting (two dimensional) shapes and
colors. Program how
a sound is converted into an infinite array of possible graphics. Images also
dance live to the user's tune of
sound generated.
-correct moving image= access: u (user) is able to see how their sounds are
generating the required ('images),
allowing better sound control: Visual representation of sounds is easier for U
(user) to gauge and make any
needed corrections.
-see 2B090 for details.
. PATENTS: key word search of US abstracts 1.74-1.97 www.qpat:
-(sound music) and (interact dance convert alter move) and (image picture
color)
A1-540 Touch Card: Matches people's finger prints with their credit and
identification cards.
-Checks the right person is using their card by matching fingerprints.
Applications: credit cards, ID card
systems.
-Can take fingerprints of those registered with (inter)national agencies, then
you might also type a code, which
helps "C", find your fingerprint more readily and as a safety precaution too.
It accepts those who are sending
their payments in time.
-use when using credit cards or other cards or other situations/products
-eye in machine can ask person to put their finger there and compares print
with its memory.
File: Access \ Ac-BA +
COMPUTER HACKER BEI-IAVIORAL ANALYZER & TRACKER
This file covers ac-ba ('Access- 'Behavior feature) elements labeled with "+",
then edited from there.
Abstract: The unique Hacking Behavior Analyzer catches hackers. It 'analyzes
how a hacker's
behavior deviates from what's expected from the legitimate password holder.
This software invention is a
defense against internal and external infiltrators with the [correct] ['access
requirements (passwords)].
When issued, each password is scored for the level of security clearance
permitted in each subject
category. The built-in flexibility of the software saves security's man hours
by occasionally allowing minor
transgression into designated files deemed slightly sensitive and of possible
use to the legitimate password.
Hackers are flagged ['tagged] and so 'notified to the security system when the
user accesses information [well]
out of their password's normally permitted usage. The level of permitted
flexibility to transgress is built into the
password. It can be the live or automated security guard that determines how
to handle!'react such a flagged
password user.
113

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Passwords later associated with minor deviant behavior (by the password user)
result in a towering of
the password's security clearance. More serious deviation results in
revocation until the password holder can
pass diverse tests to authenticate themselves.
'Customization: Greater 'tracking is made upon user's whose 'scores suggest
they're more likely to be
illegitimate. System can 'react by offering traps that suggest user is getting
information they need - as system
'tailors what they are fed. Links can be made to other 'tailored [patent
applications] iriventions/features.
Manner in which our features 'interact with [illegitimate] user is designed
to: 'tailor user's needs / entrapment/
'tracking.
-Data user gets/transfers is 'tagged [so that it continues to be 'tailored to
the user / what is perceived as the
user's belief for what the [stolen] 'accessed feature possesses. This data can
become legally authorized
software like virus [which leaves a trail] that can hopefully later be
deactivated if/when time is right [hacker
apprehended along with their accomplices]. This patent application need have
no mercy for deceitful
entrepreneurs.
Additional examples of deviant behaviors of password users include:
-the password's behavior (user utilizing specific password) in non sensitive
areas is found to be deviant (very
difficult for outside infiltrators to hide). In other words, the behavior
pattern does not match up with their past
behavior patterns.
-Caller ID doesn't recognize caller's location.
-Outside infiltrators may wish to reduce their risk of the system noticing a
simultaneous use of the same
password. They may seek access at odd hours. Hence unusual access times when
the correct user is usually not
on the system, drop the password's score for legitimate usage patterns. In
other words the number of
"suspicious points" is accumulated by this behavior.
-System scores hundreds of other subtle deviant behaviors.
Hacker Behavior Analyzer can be compatible with numerous existing security
systems, to both protect
valuable information, and free security personnel for their less automatable
tasks. The hacker's inability to
necessarily know that a required behavior pattern exists, let alone function
within its intricate patterns, makes
this patent pending software an essential safe guard.
End File: Ac-Ba +
File: Access \ Ac-Ba
"ACCESS - BEHAVIORAL ANALYZER"
Introduction: System determines user's identity by their personality profile,
in other words their
pattern of behavior on an electronic device such as a computer can be
analyzed. System replaces a human
sentry, which can permit access and determine if user's behavior is
appropriate. Also uses fuzzy logic.
Learn about our quick and easy licenses to access inventions for your use.
Call (+l ) 707-428-5000
www.LicenseitToday.com
114

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
The 'Behavior Analyzer Function: The software can automatically block
information from the
accessor. The differing behavior profile of each accessor, results in a
scoring for how pertinent sensitive files
are to the accessor, enabling the system to block information deemed less
pertinent.
The Sensitivity Rating Function analyzes the system's files according to how
it was initially
categorized by security personnel. Files are categorized by subject, level of
sensitivity, etc. This automatized
screening system can also analyze contents via: key word analysis, and how the
information is being utilized
such as by whom and for what purposes. The Sensitivity Rating Function tracks
changes in the file's content or
usage to automatically determine if an increase or decrease in the level of
security is needed.
+Do: Take material from U IP.
The task at hand previously required excessive man hours. However, since no
automated system is
perfect, any of the system's security features can be programmed much like
before, or overridden by the
designated system operator.
Values:
+-makes the access sys more mysterious for hackers. More hurdles.
-Requires considerably more knowledge about: legitimate holder of password,
how company operates. Nacker
must also play act well above and beyond what they would normally prefer doing
by pretending to use
password legitimately. Limits the scope of potential hackers to those closer
to understanding both the correct
behaviors and access' scoring system. Yet none of the above is good enough if
scoring system is tight enough.
+-potentially less cumbersome or annoying for legitimate users. Fewer access
entry hurdles have to be
consciously driven by user to continue access, if sys monitors their behavior.
+-Employers can more readily disguise their wish to limit access of
(previously) legitimate accessors by stating:
sys down failure, or the "ba" sys didn't work properly (due to incorrect
uip=db).
+ Censorship: Limit what accessors can read or "interact" with, eg: parents
limiting the "entertainment" and
"games" children experience, by their subject content. Other types of
"restrictors":
--By limiting sensitive material to area accessor is interested= accessor
becomes less suspicious that material
they view has been "edited" for them: Eg, customers, investigators,
stockholders and journalists seeking to
study organization's materials: cut out subjects that are sensitive / what
journalist via their password may
"seek".
++ Inversely:
Manner in which uip-tailor functions can also be a form of access control, in
that functions and material not
presented are also a form of uip-tailoring. ba ('behavior analyzer) can either
"seek" what accessor Needs or is
permitted To View; both being similai.
-In other words: access=ba can "seek" /"edit" information for accessor. This
is a form of UIP-Tailor. Saves
user's time.
-Also uses internet's sw ('software) that "seeks" "designated" news / other
material that appears later on www.
-BA knows what accessor wants to "experience" W5 = uip-tailor.
-See: "artist's" "cut & paste"; "edit"; "seek"; key word "seeking"; ++"uip-
tailor".
115

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
."Education": correct behavior taught to accessor= thereafter such (correct)
behavior required.
Needed "education" determined by accessor's behavior.
.--Morning alarm: "designated" "reactions" from u (user) are "educated"= so in
future u: more readily responds
to alarm (in positive manner); teaches them new skills.
. Tamper Alert: System "seeks" unusual / unauthorized (re) programming of sw.
W.
:-morning alarm: legitimate user can't readily deactivate alarm so they can
continue sleeping. Eg:
reprogramming not allowed during wake up time period.
. Multi-User: Each accessor has differing access procedures, and safety
protocols, and "access' ba".
--morning alarm: each user required to deactivate alarm in their own uip-
tailored way.
. OSC (outgoing sound communicator) is used to elicit "designated" responses
(behavior) from "accessor".
Additional Applications: See *"Game". Likely hackers= trigger (closer)
monitoring= from "tracker".
+ Learning from behavior of previous hackers: The system protected by "access"
is statistically more
likely to get future hacking behavior= related in style to previous hacker
activity.
-The behavior of previous hackers= is watched more carefully by "track". In
other words: score is tighter for
such behavior /"routing"= if its seen again.
How "Artist's Writing Instrument" is used = access-ba. deactivate morning
alarm:
Material that is deemed restricted (for "designated" password) can't be:
copied, transferred, printed, *viewed,
*"experienced"=wo (without) higher level authority.
A computer system's table of contents has sensitive information blocked from
"designated" accessors.
'Behavioral characteristics and or'user's security clearance'score can be
integrated with a [private co's
or credit rating agency or government] data base of people:
-employer helps determine.safety in issuing security clearance to'designated
users.
-employer's info shared with the data base service can:
--help determine employer's and database's 'analyzer in determining the'user's
new/changed security rating
score.
'--help data base bureau's data bank, like Dunn & Bradstreet which sells
credit info, but also collects it from the
same clients.
Spell Checker: the same people often make identical spelling errors. Helps
determine if correct party
is the accessor.
The language interface requested by user can also be useful in matching the
correct user. Eg: A French
accessor's password states their language of preference; and a'notification
will be made should a'Spanish or
'Russian interface ever be made [and then actually utilized [for 5 minutes -
need to maybe give allowance for
the curiosity seeker]].
Issue is there are two Features to KN, one scoring accessors, the other
scoring the information.
3E061 Motion Tutor:'Guides users to improve their movements, eg: the correct
level of movement gains
'access. System assumes user's movements will either change or improve over
time.
END AC-BA FILE
116

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
File: Access \ Ac-BA-Auto
FILE AC-BA-AUTO
6B240 Driver ldentity System: driver with key can only activate car if their
body weight matches
car's memory. Owner programs car for one or more driver weight settings, or
changes in weight.
-integrates with any other 'sensor or related 'password function needed to
activate a device/vehicle. EG: 'va,
'sa, finger print sensor.
-'notifies U (user) of weight gain/*loss; motivating them into better health.
U ip/Bad/increased/any
weight/health-condition might have device suggest user walk (more) (to
[nearby] destinations instead of
driving).
.-physical dimensions (eg: body weight on driver's seat matches car's "C"
memory): uip, access.
-"PR": 1] Car owner can easily program a change should they wish to add or
delete a driver. Eg: stop allowing
your son to use car during school hours (access = timing device).
*- should driver's weight be changing and edge closer to the set permissible
parameter, a warning sound and or
"S" or light goes on to notify them of a needed change.
*- changes can also be made via keying in special difficult to crack secret
code
.-The system measures driver via one or more of the following: approximate
weight range, and or general
physical appearance (eye, hair, skin color, height while sitting, etc) match
car's "C". "Visual Analyzer"
: if weight is the measuring device, it will limit the degree to which a
person can experiment by adding
additional weights. That is the weight can't keep going up a little at a time
with the ignition then starting. Real
driver(s) must be in normal sitting position to activate car, thereafter their
weight change by moving, etc does
not effect car's ignition system.
--should u gain or lose weight, they'll need bypass password / key to
reconfigure ("pr") their new weight or
other changed physical feature.
.-security is designed for up to 20 or more
drivers.
* For Techies: All; "S"; "C"; pp; mp; uk; user behavior; alerter; ose; va;
cart; access; uip.
-access = human breath "analyzer" (each person's breath possibly being
different). Exists: can't activate car if
alcohol on breath. US Patents: 5519260 using driver's license number.
6G241 GPS Tracker: 'analyzes travel patterns, and 'reacts accordingly.
'Designated patterns can be
good/bad/other. Vehicle/device is deactivated in 'designated 'zones / w5
criteria. [details of this feature in
'zones].
-Only certain u/passwords can enter 'designated 'zones. Applications:'car
rentals; employee use of
vehicles/devices.
CONCLUDES FILE AC-BA-AUTO -
File: Access \ Ac-BA-SC
+ "ACCESS' BA = SCORE"
117

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Introduction: All accessible 'multi-media have a'score rating. Media are
Desired files and functions (type behavior needed to deactivate "morning
alarm"). Their scores must match the
scores of Accessors if access is to be granted. Any number of criteria can be
used to develop a score, with more
or less or no weight given to possible criteria. Bad behavior can be similar
to what access controller thinks is
that of a hacker, hence a lower score is given.
How 'multi-media is 'scored:
-Multi-Media = what user wants or needs, namely: desired files and or
(kn) functions.
-Media's level of sensitivity to: hackers (damage to company); inconvenience:
loss of access due to= access
controller's distrust= resulting in inconvenience; number of people who need
information (the greater the
number the wider the score tolerance?)
-Pertinence to accessor and or their department and or their function (for
certain time frame, or via usage of
certain
password).
-Media's usage: media's frequency of usage by (all / "designated") passwords.
The greater the level of
importance or
applicability= maybe the less strict scoring sys would be. UIP-Tailor.
-"Coordinator": the score for one form of media (when its changed) can effect
the score of other related media.
-Sophistication: eg, a secretary's password accessing PhD level material is
cause for suspect.
-"Morning alarm's "Notification" system: its level of pertinence to user's
needs. Eg: how effective is it in
waking user, based on user's uip-db (ba).
How accessors are 'scored:
-Time spent: the (percent of) time accessor might be utilizing certain files
and or subject groups. Are they
under utilizing something= in which case maybe a hacker is simply going for
what they want. Are they over
utilizing something? Hours of operation (after accessor's normal working
hours)?
-"Routing": are accessor's steps through sys normal?
.-"track" and "score" "analyzes" accessor's behavior.
-Normality of user defined: 1] Based on user's previous history, with greater
weight placed on more recent
activity. 2] What other legitimate accessors are doing; maybe less important.
3] UIP-DB of user's behavior
created by user / sys /"questionnaire" I"access controller". 4] Employee job
function's domains.
-Accessor's "Caller ID". Is their originating telephone number in system's
records? Accessor required to have
caller ID active if they seek access.
+-Peculiarities of user's hardware: special (secret) Configurations in sw
('software) or hardware better label
accessor correctly. Accessors (are required to) have "tags" on their hardware
/
software.
-H: invention "Sensors" = Analyze = match (behavioral / bodily) profile of
accessor. See other Features of
"Access".
118,

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Typing pattern on keyboard - See invention in A or B directory.
+--How "R" is utilized, eg: way joystick is moved.
.-Sys "analyzes" why accessor is doing W5= then conclusions are analyzed by
access controller.
-Lie detectors, and (ba) "questionnaires" accessor must answer
correctly.
+-Accessor's activities outside password realm: sys not only "analyzes" what
accessor is doing within (its /
main) accessed system. BA (behavior analyzer) also "tracks": other "accessed"
systems; W5 accessor does
what they do %;
+?--system must connect ("coordinate") accessor's functions when they are on /
off (main) access system. Eg:
other "track" systems are connected, and these log when accessor enters /
leaves office / computer room;
(digitized) reports / results they submit, sys/supervisor analyzes if they are
pertinent and or have reasonable
quality (something harder for a hacker to do)
+-Accessor's history prior to gaining (any type of) access to said system.
Their: criminal record, behavior as
somewhat determinable by their curriculum vitae; facial analyzers %; intuitive
reports written by others at work
place (about their
behavior / deviance / potential to hack).
-Accessor's errors: the more frequently accessor attempts access into files
where accessor's legitimacy is
concerned, the lower the accessor's score becomes. The greater the breach, the
greater their drop in score. Eg:
system allows three errors a day, maxing at five consecutive days.
-How accessor "reacts" (to system's "prompts" / "questions")
.-"EGH" (Education Gets Harder): Is accessor's learning curve normal? Based on
media user "interacted" with
previously. Eg: the portions of tutorial programs accessed should normally not
go from very sophisticated, then
months later to less sophisticated too often.
-"Morning alarm": user's wakefulness before* and after the alarm; their
behavior= as matched against the
notification mode.
Subject group "designation": Media is scored also by its type of subject
category. Also, accessor is
scored for how likely they're a hacker by the subject matter they address.
-How often does the accessor access material in our outside their permitted
subject area? For material which
can be "tagged" under multiple subject categories, how important is the actual
subject category in the material -
this would be measured by the frequency of the "designated" terms used in
classifying the
material's category.
In other words: Frequency of "designated" key words (found via saw's search
function) of files, or functions
(their labels, command codes, instructions, "q").
-Accessor is assigned a list of key words, these and their related words
(found via saw's thesaurus) can be used
in scoring.
-The system may (not) seek a limited frequency of these terms used in the
material (files) accessor "seeks"= and
uses.
119

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
The one or more "tags" assigned to each set of data (within a file), file,
directory, group of directories, other
groupings: web sights, particular "mainframe" computers. Multiple labels give
a value represeinting different
scoring systems, each scoring system is applicable for same file. In other
words, each file
can be rated differently according to what rating system is used.
. How material was used: Who I W5 used the files -> "edits" the label= of said
files; updating of files can "edit"
the file's label(s); if hackers accessed material previously, or "access
controller" determines a higher / lower
security rating is needed.
-"Morning alarm": it's levels of: effectiveness, "entertainment", "education",
user friendliness.
+ Subject categories that may have tighter scores:
-finances; company's planning department (new products, future trends);
anything that can financially help
hacker, and or hurt owner of system being protected by access; file on the
access system, eg: information on
how hackers are caught; information risking the organization or country's or
world's peace; information on
criminal behavior (of potential hackers), eg: police records; any other
information commonly protected as stated
in encryption software articles and patents.
-"Morning alarm": those with more difficulty in waking.
Composite factors: W5 composite of factors used in determining
"accessibility":
-Any one or multiple factors determine= "access": one or multiple scores; the
type score most applicable
carries greater weight; system "merges" multiple "scores".
-Fuzzy logic: when accessor does not quite meet the needed scoreof file or
system: The "access controller" can
be stricter; or for better user friendliness, more flexible. All dependant on
one or multiple variables.
-type (deviant) behavior(s)= "results" in= "designated" scoring system(s). Eg:
sys "analyzes" 7 positive, 3
deviant behaviors=scoring system for the 3 negative behavior "tags"= goes into
operation.
+ different scoring systems applicable (Irrespective of accessor's behavior).
Diverse screening systems can be
an additional safe guard, since accessor may not know the "order & timing" of
the access system's requirements
at any moment. What can trigger differing scoring systems: time of day, month,
year; stock prices; excess
number of accessors logged into system (a way to reduce congestion); accessor
behavior; legitimate accessor's
behavior ("group behavior"), eg: their "order & timing" or subject matter or
w/ (with) that they are "interacting";
type "hints" or "prompts" used; at the mercy of (human) access controller.
--Roulette: random process= w/ (with) almost no detectable pattern for
selecting= the scoring or other access
protocol.
-Example: u accesses two out of three files, which match his "score" and the
third file is beyond his range by
30%= sys may permit access. Reasoning behind this: the score matching of other
files helps determine
legitimacy of accessor; system can narrow the level of tolerance for deviant
scores for each file if other factors
are taken into account as well.
120

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Composite of factors especially useful when: access is during same session
(as the behavior being analyzed), *
or near each other, * or when accessor is known to be at facility / work site
/ "access" gateway. Known via:
"track", having "accessed" into building.
-Compares UIP-DB of accessor with= "scores" of what's accessed.
. Multiple scoring systems operating within same system.
-Differing external factors. Examples: If hackers are a higher percentage of
accessors after working hours,
scoring system becomes stricter then; There's some crisis in the organization
or system; System is overloaded
with accessors, hence needs to limit access to those with highest seniority or
scores.
-Hacker is thought to (possibly) be in system. The perceived interests of the
hacker (eg: via the subjects they
seek)= analyzed= "designated" scoring system enacted.
-Something like a computer virus is thought to be in system. This virus needs
an anti-viral or related sw
('software) program.
.-"Designated" scoring / screening system enacted according to circumstances.
"Seek & React".
-"Morning alarm": requires different access mode for morning wake up
applications.
Changes in "Score" of accessor (one who (seeks to) gain access:
+ System can automatically (slowly) alter accessor's type score. In other
words: as user's behavior changes=
the needed behavior profile to gain access changes slowly over time.
--In other words [third re-explanation]: Due to the inconvenience in needing
to have access controller
frequently
alter user's password= as accessor's functions change= uip="analyzer" can
(automatically) "edit" the accessor's
"score".
.-Scores tied to accessor's password(s) changes with their natural changes in
the work place (as their job /
company /
economy changes). UIP-Tailor.
.-one or more scoring criteria can be utilized. Criteria can change by the
password / accessor's (changed)
behavior. If one criteria isn't suitable W5= then another is (automatically)
adopted.
, Negative accumulated scoring shortens lifetime of password: '
+ passwords can have limited active life= measured by amount password was used
while there was a (semi)
negative score for the accessor / material they accessed.
+--also measured by: calendar or usage time; "group behavior"; suspicion that
hackers have penetrated (in
past); other scoring criteria.
.-User must keep password alive by just activating (part of) password if they
aren't using; after disuse, access
controller
needs to be "interacted" with= reactivate ("edited") password. Unwatched /
unused passwords more prone to
hacking (without notice by sys or accessor), eg: "scores" can be changed by
hacker, legitimate hacker may not
note unusual activity on their password account.
121

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Miscellaneous:
-when needed= accessor's functions can have differing passwords, better
allowing sys to permit user's behavior,
which may alter from accessor's normal role.
-D1: accessor's (changeable) "score" = k (keyboard entry) = c (computer)
(access sw) / "Correlator" (compares
scores of accessor w= file "sought") = material (file).
-D2: accessor = [password w= score / cart] = access controller = c (compares
scores ("coordinates")) = elements
(to be) accessed.
-can have one or multiple password(s) "designated" for applicable functions.
-can only utilize passwords a maximum or minimum number of times = tds (time
date stamper) / Score (of
(type) usage).
-Irregular usage? Sudden excessive usage= might drop the score.
.-files can be "tagged" / "designated" by: 1] actual files; 21 directories; 3]
subject groupings.
+-(Access') scoring system also scores itself for: ability to keep out
hackers; user friendliness; how good it's
uip-tailoring; user happiness. Also uses "questionnaires" answered by
accessors in determining final scores;
these ask accessors their: intuitive suspicion; user friendliness; how to
alter scoring; W5 of scoring needs
adjustment. System "merges" / "analyzes" answers (w/ (human) access
controller).
-System sorts through different factors to= "designate" which are better /
worse / applicable for lowering or
raising score.
Drawing: [ "Access" = "BA" = "Score" ] =
"ANALYZER" = Compares scores of password over time.
"CHANGE ACCESS PROCESS" =
.-One of the causes are when sys questions legitimacy of accessor= serving as
excuse for user to go through
(security
checks and) process of getting new password (=via automation).
-"Morning alarm": new interesting ways of waking each day, versus repetitive
actions.
"GAME" = *Scores accessor's performance. "Morning alarm":
"HIDE ACCESS PROCESS" = * 1] Fact that "scoring" system is in operation. 2]
"Questionnaire".
"HINT" = Hints to accessor that their behavior might need alteration to get /
maintain access.
"Prompts" suggests: alternative files, W5 for behavioral functions. "Morning
alarm": when user stalls
"MOOD" = Accessor's level of: (happy) "entertainment". Their "mood" is
used as score. Mood determined via: key word searches of what accessor
inputted /*"experienced". "Morning
alarm": uplifts user's mood.
"MOTION" = Level of motion's deviance from the best path /%"route"= is
scored.
-Deviance types / levels. Too: big or small; fast or slow;irregularity (of:
speed, shape).
-"Morning alarm": requires user's physical action, eg: run treadmill,
physically get out of bed.
122

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"NOTIFIER" = The degree of urgency= as measured by score= results in different
type of signal
generated from notifier.
-"Morning alarm": user is jolted more greatly when: they're exceeding the time
limits to act; that day is
"designated" as more important.
S "ORDER & TIMING" _
-Timing: scores are given to different time parameters / durations.
-Order: The ordering of events comprises a string of blocks.
Placement of blocks can be measured by the block(s) preceding and following I
the *number in place as
measured from the front or back.
-"Morning alarm": creates the "designated" "mood", eg: jan: ing "mood" created
by OSC (outgoing sound
communicator) to awaken user frorh sleepiness= followed by more civil
requirements if user has actually arisen,
so they're also mentally more awake.
"PROMPT" = User's score / their uip-db much determines type of prompt they'll
get.
"PS-ZON E" =
-bulls' eye: Like concentric circles, the closer to the bulls eye representing
the best location, the higher the
score.
-beehive: different sporadic spots might be the best locations.
.--in which case the central cells have highest ratings, the neighbor cells
may have 50% of the best cell's rating,
the next tier out having 25%, and next out zero, and next out, minus 10%, and
so forth. Different central cells
can have differing scores.
-outer ring donut: higher scores for "designated" distance from centrally
measured point.
-altitude: measured in mm or km
-angle: eg: 45 degrees from centrally measured point. This can be combined
with "designated" distance.
-depth: must be below or covered by something (of designated substance /
thickness; or be covered and of
certain distance from the covering). Eg: "seeking" buried material.
-multiple zones: two or more "designated" zones must be active / activated /
occupied: simultaneously / in
designated "order & timing" (path accessor physically walks).
--each "k" (key) can represent a zone. The "order & timing" of their being
activated= creates a pattern. "Key"
is a very broad area of applications. See: "compose", "route", "track".
"QUESTION" ="MQ". "Morning alarm": creates "mood" /"entertainment" to awak OF
= ACCESSOR'S
ACTIONS: What Influence Improvement:
Accessor is work'ing with material versus stealing:
-Hackers want to take material, and are often less interested in doing other
things beyond sabotage: Is action
simple stcaling? If accessor is "editing" material, they're more likely to be
legitimate.
-Is material being shared w/ other password holders, if so W5? Sharing can be
form of "interaction" /"editing".
-Accessor is bringing in (legitimate (pertinent, virus free, non-sabotage type
material) and "merging"
information w/ system's db.
123

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-accessor erases or junks all / part of files accessed. To reduce detection,
they might simply download
material= then "cut & paste" what is wanted on their system?
-accessor re-accesses same portion of file again (if they didn't save or
transfer it earlier).
. Psycho-Sociologically nonnal: Form of user "interacting" w= other accessors
(is (sociologically) normal):
-One employee (leader) accesses= then followed later by others (subordinates).
-(Most of the) mistakes accessor makes are of a less intelligent nature that
smart hackers wouldn't make, eg:
guessing at publicly known software functions- until they get it right.
--BA can't "correlate" any abnormal patterns of accessor= with its (uip) db
('database) of abnormal behavior.
Eg: unsteadiness in using mouse /joystick ("tilt").
0
-accessor "interacts" with (answers)= behavioral "questionnaires" /
"educational" (tests). Especially when
accessor's score drops. Subject material also "seeks" from accessor=
information about their identity= which
ties with= access controller's uip-db of legitimate accessor.
-miscellaneous: (frivolous) material sought by accessor= isn't of type sought
by the more mentally ill.
-"Morning alarm": form of user's actions w/ computer system, or other co-
workers is normal= otherwise
implies not functioning at "designated" levels. System might be more tolerant
during other parts of day if
"morning alarm" is the main desired function.
Legitimate accessors (helping) catch hackers:
Different people are learning from each other, possibly implying the parties
really know each other; its also
hoped that
legitimate parties in the "interaction" have other (intuitive) ways of sensing
hackers= that "access" might
otherwise not have. Eg: One password human user= "educates" another accessor=
while they're on the system,
as evidenced by "track".
-system "prompts" accessors to "interact"= in manner the legitimate accessors
I access= can catch hackers.
Legitimate
hackers might be "educated" in catching hackers (w/o risking (too much of) how
"access" functions.
-If legitimate accessor is suspicious of another accessor: Confidentially
anyone can "tag" potential hackers=
resulting in: their lower "score" / system "tracking" such entity more
cautiously / access controller confronting =
accessor directly /
cutting off access (if access has other reasons to believe the human suspicion
could be correct).
-"Morning alarm": co-workers "score" other user's functioning. Eg: tardiness,
speed of action.
. Miscellaneous good behavioral characteristics:
Accessor's frivolous activity: Accessor is "drawing", or playing computer
"games" (when they should be
working), or accessing portions of internet outside access' domain. Its
important system finds accessors being
frivolous since hackers are on a serious mission or afraid to get caught
wasting time doing such. Other activity
by accessor would in most likelihood not be what a hacker would (risk)
"seeking" or doing:
-Accessing of information that is (readily) public knowledge.
124

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-"location" of accessor is from good "zone", eg: good postal code or prefix of
tel number, or where there is less
crime, or fewer college students (more apt to be hackers?)
-good interpretations (via "analyzer") of behaviors= receive a positive "tag"
/"score".
What Elements Influence Worsening of Scores
Worse score is anything that is opposite or *different from desirable
behavior.
-Asking the system to do or give something that is not possible (w/ or w/o the
best password)= can be
indicative. Hackers might be less able to gain "access" to "educational"
material on how to use system= since:
such instructions require (additional) access procedures; access to such might
be suspect.
-(communications / access) software used by accessor is different from: what
is standard / know / assigned (to
employees).
-difficulty in pinning down who accessor might really be: eg: their caller ID
doesn't match up; their behavior
doesn't match password.
-accessor is running a (large) "bill" payable by owner of accessed system.
-accessor uses protection to help hide accessor's true identity, eg: accesses
via strange tel numbers, or from
outside office.
-takes psychiatric related drugs
-when material is transferred to or accessor "interacts" w password which: is
w/ (with) lower score; outside
company; or to unknown location; or sys doesn't know what happened to
material.
-when accessor seeks to "interact" w= other accessors= who don't choose to
respond /*"interact" in full manner
(as requested by initiator).
-accessor doesn't care about negative effects of their actions: they mess up
files (they've=accessed).
-Hours: if accessor rarely comes to work before 9 am but as can be usual stays
occasionally until 10 pm= score
is tighter on access at 8:30 am then at 10 pm.
-material accessed was questionably for accessor= then sys= can't "track"=
material any longer.
-"Track": material movement is "tracked" via: identifying "tags" "hidden" in
material; keyword searches (for
"designated" aspects of material (less likely to be subsequently "edited" by
accessor)). E-Mail (between
password holders).
-Loss of traceability drops accessor's score.
+ Accessors might be instructed / required to keep data w/in system. Trying to
bypass this rule is very bad
(without permission from access controller).
Miscellaneous Good & Bad Behaviors:
Accessor's behavior outside the system= which "access" is protecting /
carefully monitoring:
-Does accessor give indications they are hacking another company's system (as
well)= as determined via
"track".
-Other DB: Criminal records; accessor's school or university records.
. Accessor's importation from outside domain protected by (main) access:
-files or software from outside domain protected by access.
125

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-connecting to other systems or ("interactive") products.
."Multimedia": Sys seeks unusual behavioral elements of user in following
parameters: How accessor (re)
programs sw; types of mm options u selects, eg: color and "osc" option
selections.
"Entertainment": Accessor must make access (gate point) happy to "designated"
level.
-Methods: "Game": letting opponent win; stating correct words; "drawing"
"entertaining" "images";
"interacting" w/ (with) "interactive images" in "designated" manner.
Interaction can occur at entertainment's
' Electron ic Meeting Place'.
"Interactive": Sys "analyzes" for unusual "interactive" behavior from "user".
"K" / "R" = User "interacts" via = "Access' BA"
."Locator" /"PS-Zone" / "Portable" / "PD": User's unusual or un-programmed
locations are used in "scoring"
if "accessor" is permitted continued usage of system.
--See KN (invention) (pre-1996?), especially PS-Zone.
What accessor "interacts" with or has outside of the main system:
-What's on accessor's computer: System "analyzes" (all) the files of
accessor's computer, whether accessor does
or doesn't choose to permit them to be accessed by access controller. These
other files helps develop uip-db of
accessor.
-What accessor does on world wide web: web sights accessed /*created; type E-
mail sent and received.
-is accessor receiving tel / fax / other telephony (at work) (of nature not
related to sensitive material)? "Tracks"
incoming/outgoing calls based on: CID of other parties; key word analysis
studies word content.
. Grammar or spelling checked: System compares the accessor's language
proficiency (tested earlier) with=
their actual ability on system. Eg: checks if accessor is or isn't a native
speaker of the language used, hackers
might more likely be native speakers using a non-native speaker's password.
. Familiarity of system= to accessor: The more familiar the better. Eg:
Accessor's behavioral speed in gaining
access. Hackers are more likely to be unfamiliar with non -publicly available
facets of the access process or
related software.
-"Morning alarm": lack of familiarity is sign of not being fully functional.
. Exists: "Tracking" of airline passengers based on their behavior profiles,
eg their: country of birth, travel
history. Consider comments about how terrorists can outsmart the system.
1G22 Reward Generator: Reward Generated By Usage Level.
END ACCESS BEHAVIOR SCORE SUB-PART
File: Access \ Ac-BA-Tailor
FILE ACCESS-BA = ADAPTION (CUSTOMIZATION):
* Intro: Below is copied and improved from UIP section of the file IMI&8
before the document was upgraded.
'Tailor is also called User Information Programming, 'Adapt, or 'Customize.
For Techies: Drawing: data input = analyzer = memory (M, cart, recognizes
multi-user) = analyzer =
data output = function.
.-5A-810-042003 Advisor: compiles and analyzes user's information.
126

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-For Techies: fd-hdd; both pp and mp program how they want the system to
collect, retrieve and analyze the
data in database; uk; tds (when and how elements occurred); educ /a; M%; score
(score information can be
processed for the UIP database; and UIP can help generate desired scores);
cart('software cartridge) (for
additional data for the database; and or software's for processing the
database); uq (pi database is used to help
generate answers about, eg: about user's past preferences and or activities);
mp (the database and or software
can help prompt questions, eg: to expand the database, guide the user in the
right question if the system first
gets the right information); access (limits access to sensitive information
within all or part of the database to
people with the right password).
-Article in "Scientific American", p.64, April 1995. Article title: "Machines
that learn from hints". Its about:
Machine learning improves significantly by taking advantage of information
available from intelligent hints;
discusses the algorithm process in general terms; gives differing examples,
eg: computers judging how much
credit to give to credit card applications based on other similar people's
past histories.
-UIP formerly titled "Pl".
-For Techies Part #1: Electronic device obtains information about the user by
one or more of the following:
remembering user's previous performance, eg: their abilities and or
difficulties on this, or related devices (which
transmit uip data to other units via wire, or %wireless); asking questions
from user, or "M"; user takes one or
more test(s), the type and quantity are determined by the desired application
of product; another person or
device (M) gives information about user; etc. Device recognizes more than one
user by multi-user, eg: their
codes used to gain access into device. Personal information is stored in
memory and used by device to more
intelligently tailor itself to user's particular needs. The manner in which
invention tailors itself to user's needs
can alter according to: small or big changes in uip database, pp.
-FOR TECHIES Part #2: D (UIP) "Billing"; User can take their cart (their
personalized uip for all identical or related products) from machine to
machine, eg: % existing card used to both activate and select desired
preferences in car stereo systems; different
cart ('cartidge for software) effects user's uip differently with the
correlated changes in functions; type
"character" changes according to uip (if a display ("S") is used); date; uip
data can be viewed on display ("S")
and or printed out; uip is used to increase the user satisfaction quotient,
eg: entertain, (~possibly by: way in
which function operates, sounds, lights, words are used to better create the
type of electronic effect uip indicates
is more likely to increase user's positive reaction to using product [test
studies are conducted to see the reactions
of people in test case studies of 50 - 1000 people]); "C"; % uip can support
interactive (by giving the
additiona) data needed to better tailor invention to user; % data obtained for
uip's memory from microphone
("mic") (voice recognizer); mouse; mp; multi-user; uip's database guides
system's functions (determines the
type, manner, timing, whether or not to notify, mq, osc, synth; pp; u ip
database influences printer's print out
parameters, score, speech, vc, manner in which it functions as a semi-toy, it
prompts - accepts - processes uq;
tds; uk. Data is also obtained via~: "uk", "cart", "tel", "mo", scanner; UIP
can be programmed/understood with
the help of: psychologists, sociologists, marketing experts; U's city (tel
area code/zip code) / caller id / location
based on pd effect how system interfaces w/ (with) U.
127

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Drawing: data input/output=tr/arc=c
-o-C85 Electronic translator speaks out desired words/phrases. Fuji/Xerox 29
Aug 92 NK. Drawing: C85="tel"
%-o-C112 Computer predicts human error. Input UIP (working conditions of
person). System predicts errors
they're likely to make. 30 Sept 92 YD.
-utilizes fuzzy logic
-Sys analyzes u's actions -> database (behavior). Eg, Ubiquitous computing: u
carries (tiny) "c" that
communicate with other "c" embedded in: appliances, t, cars, walls, K a y s'
N. Eg: Xerox's Park Tab, and
other products mentioned in "Popular Science" Feb 95 from p.47.
2D-021 Sys reacts to external products according to w5 they are:
Eg: Incoming-Call Identifier - Screener / External Element Identifier.
Calls from desired tel numbers have a different ring. Hereby caller knows
whether to pick up the call or not.
-(Designating different type connections /(incoming) calls related to another
of our ideas?): sys responds
differently depending on which other N/sys/existing product wants to
"interact" with it.
--sys knows identity of other part/sys via its: "access" / code / tel #/ uip
(behavioral characteristics of N, or U:
how it moves / functions / responds (to stimuli from central "C" or "M") /
visual analyzer / sound analyzer.
-If user walks over to device, the caller's tel number and or name... appears
on screen ("S").
-Drawing: Central Product / Sys = c (computer) = sensor / analyzer / uip
analyzer / caller ID sys part = tr/arc =
External Product / Sys.
-For Techies: ACCESS *; BVA ; CID ; CAMERA (LENS) ; CART (type uip or senses
or data sought);
CLAP ; INFORMATION RETRIEVAL ; K(keyboard) ; M; MIC; MOUSE ; MP ; MULTI-USER ;
NOTIFIER (when desired contact has been made with part or organism); pr
(software program) ; PS (location
of external product is a determining factor in deciding if any/type
connection/contact is to be made); R (remote
control) ; ROUTER (routes external product by their type nature); S (screen)
(shows status); *SCORE ;
SOUND ANALYZER ; tds (time date stamper) *; TRANSFERRING INTER-SYSTEM
TELEPHONY ; UIP
*; UK (user at keyboard) ; VISUAL ANALYZER %; VOICE MAIL..
-A sensor that connects to u (human body, eg: finger wrap; animal*) to read
electromagnetic signals generated
by the skin. Proprietary software interprets those signals and translates them
into actions. Being researched by
company: Other 90% Technologies Inc., Sausalito - See Wall St. Journal 1995
(maybe 6.95) article titled: Mind
Games: Soon You'll Be zapping Bad Guys Without Lifting a Finger. Finger wrap
version will sell for $100-
$200.
-4E020 Content Date Stamper: Registers and organizes previous occurrences.
-See "Brain".
% US Pat # pertaining to helping U (user) develop new N, eg: for "D" directory
KN: 5153830 Method and
apparatus for providing assistance with respect to the development, selection
and evaluation of ideas and
concepts.
-US PatNo's: search str in Bib 9.94: (adaptor adapts) and user*: 5324021%;
5208898 Adaptive knowledge
inference method and system; 5313532% Recognition of patterns in images;
5212821 % Machine-based
128

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
learning system; 5092354% Cosmetic kit: make-up; 4700295 Forecasts bank
traffic and scheduling work;
5321626 battery performance / forecasting system; inventory control: 5237496 &
5287267 & 5128861;
5136502 "analyzing" health care liabilities; agricultural forecast 4837146;
compatibility forecasting 4711632;
4197854 patient danger forecasting; game playing involving forecasting
3473802.
--search str: 1] (adjust or.adjusts) and user* - barely skimmed; 2] forecast
(did only'Bib 6.94 disk).
UIP-Tailor and UIP-Suggest:
UIP-Tailor = SW: For: (automatically) suggesting how sys can better tailor
itself to u's needs / helps get
product ideas / helping User brainstorm.
Introduction to formulae generation systems:
Software used in developing / analyzing / evaluating formulae for food,
chemistry, indicators, etc.
-uip of desired function is matched= w/ (with) uip of differing elements /
ingredients / chemicals / food
elements = resulting in formulae of ingredients that may (best) achieve
desired goal.
--the characteristics of goal are tied= via uip = to characteristics of
available / known ingredients or * (KN) sys.
+ Important Features: UIP-Tailor, 7G050, PR, Track-Analyze (analyzes for what
is best to track = db),
Brainstorming SW, 2E010 20 30 40 50 Recipe Softwares.
. General Examples:
1] develop an nr ('notifier) for desired application = alerting presence of
salts / acids / hazardous elements =
in/for: liquids / powders / surface contact.
2] Other applications for 7G050.
3] SW ('software) sys may simply help u by offering suggested possibilities:
formulae / equipment / sources of
information (reference material, on-line sources) / type experiments.
4] UIP-Tailor = UIP-DB: adjusts to u's needs. Gives ideas to U (user) = from
which U (user) can choose = then
sys reacts accordingly by offering such tailored functions.
-Example: u using information highway software often requires more than two
minutes before u requires M
(mainframe computer) to act = resulting in SW ('sofl.ware) asking u if they
still want to stay connected =
frustrating u by requiring them to respond to such petty questions. It may
also be problematic for u to locate
where in the software they should go to stop such prompts, but if sys were to
offer such a suggestion as, would
you like the default mode to give you 10 minutes before such prompt (after sys
has determined ("status") 80
percent of the past 50 interactions between u and mth (mainframe hookup) were
at least 10 minutes w/o
(without) activity).
--Result: sys tailors itself to u, by first giving u a choice in matter -
maybe u wouldn't want the change to occur
w/o (without) their acknowledgement. Manufacturer determines to what degree
uip-tailor will suggest or
bypass former and simply alter itself to u's need.
5] Constitution needed in plastic resins / metals / product casing ("cm",
"ep") or Features, for = tolerating
designated levels of: stretching, bending, pulling = within designated
environments of varying (extreme):
temperatures, light, abuse, excessive wear, time period of element's use (age
of N). 7G050 related.
129

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
6] Patent search strategy for idea suggestion generation sys: software* and
(formulae* or recipe* or
ingredient*)
7] Pharmaceutical: developing ingredients for drugs; ideas for research.
-KN: medical prognosis sys that studies all the characteristics of illness in
deterrnining type of illness = 2E
suggests possible medications.
-Suggesting possible combinations for drug to solve designated illness /
problem: file for each aspect in
situation (uip-db) matched w/ (with) = files of existing / potential future
drugs or chemicals.
8] Brainstorming: Software simultaneously designed to help researchers
increase their (sociologically,
psychologically related) creativity: KN
9] Nutritional recipe generators based on needs.
Indicator Examples: 7G050
I] Indicator type Suggester: Researcher anticipates they will be coming into
contact w/ (with) 7G050
related: diverse (hazardous) chemicals / harsh environments -> Those chemicals
/ environments are keyed into
computer -> c (computer) "analyzes" for type indicators that may nr ('notify)
more than one of these (unrelated)
chemicals / environments [sw tries to find indicators that can be compatible
in seeking diverse chemicals /
environments] -> suggestions are made to u -> u may next need to do additional
research via: this same SW
('software) / other references sources / do experiments testing out the sw's
hypotheses / stated facts.
2] Body protection device Suggester: Researcher keys in that they wilt be
working with three differing
chemicals (of differing acidity) -> SW ('software) suggests which 7G050 type
gloves to use for all / each
situation / occurrence / type activity (eg: working with sharp objects in such
liquids requires thicker gloves) ->
Designated gloves can be identified by glove's manufacturer / model number /
generic type. Sys may also
suggest other protective gear used in hazardous situations, eg: aprons, body
suits, masks, goggles, gas masks,
shoes, (replaceable) filters for HVAC [Heating, Ventilation, Air Conditioning
sys].
-sw used on case by case, day by day basis, or planning future tong term
projects, or + designing new research
laboratories, eg: type surfaces (paints, flooring, counter top materials, air
filters....).
3] UIP: Characteristics of u (user) are "analyzed"-> sys makes suggestion:
User will be having likely
designated occurrences (outlined in 7G050) = SW ('software) suggests: types of
protection (protective gear);
methods of (cautious) research (protocols) already determined to be safe via
reference manuals on the subject or
SW ('software) (db).
"PR": SW ('software) (re)programs itseif = as controlled by UIP; programmer
can help guide / control
SW.
_
. FOR TECHIES Drawing: User = This N (invention) Sys (sw suggesting formulae) -
c (computer)
ACCESS ; ANALYZER ; BILL ; cart('software cartridge) ; EDIT ; EDUC ; MULTI-
USER ; pr (software
program) ; Q (asks questions) ; ROUTER ;+SCORE (given to each aspect =
attached to each element of goal
& potential ingredients); SENSOR (7G050); STATUS ; tds (time date stamper)
(scores time delay in getting
nr ('notifier) effect); TRACK (history of previous (chemical/food) experiments
conducted by: u, organizational
body, db, m); User (researcher, student ="educ"); UIP .
1_30

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
D (Drawing) Overview - How Features might fit:
For Techies: Drawing: User / Other (KN) Sys = This N (invention) Sys (software
used in developing /
_
analyzing / evaluating formulae for food, chemistry, etc.) - c (computer)
. PS (positioning system) - R (remote control) - Tilt:
Zones - Monitoring:
Zones - Utilization:
Access: u (user) needs to usually continue to develop formulae that match
those u (user) developed w/ (with)
sys before. Villains w/o (without) most proper knowledge can be noticed (nr).
Access allows for normal
percentages of cases w/ (with) negative results (caused by human error).
-4E020 Registrar:
-4E030 Image Input Access Sys:
+ Indicators: 7G: hazards, novelties, el (electronic) monitoring of events:
formulae for developing needed
indicators developed.
Technical:
How files in db ('database) = match / compare up w/ (with) / relate / score w/
(with) = data provided to begin
search by: u (user) / another sys. Steps in Examples:
Salt Avoidance Recipe Generator Steps:
Suggestions on replacing salt in bean soup:
1] User may normally prefer the saltiness taste to equate at 0.5% of soup
volume to be real salt.
2] This preferred percentage is determined via: what u (user) K (keyboard) /
nr ('notifier) placed in soup.
3] User K (keyboard) 2 liters of soup will be made, and lists volumes of
ingredients making up 2 liters *(both
before combining, then after coming (and evaporation) - though latter can
somewhat be calculated by sys).
Example: 1 liter water, .4 liter kidney beans, .3 liter potato.
4] User lets system to recommend other ingredients (if no real salt were
actually to be used).
5] System's db ('database) "analyzes"/shows (s/printer) other non salt
ingredients shown to statistically satisfy a
large percentage of population (in u's zone) who are on salt restrictive
diets. "Score" for each of those
ingredients on salt replacement value. 6] Those ingredients that came up in
previous step are next "scored" for
their compatibility w/ existing ingredients u already (fairly) decided to keep
in soup. Each food ingredient in db
('database) has many sub-files, each sub-file being the type application /
situation / type food such ingredient
may be used in = and the corresponding "score". Example: carrots get high
score for soups in general, yet a
higher score in sub-sub-file: western vegetable or meat soups, but lower score
in sub-sub-file in Japanese miso
bean type soup.
7] The differing "scores" are= "coordinated" / "analyzed" -> suggested
ingredients are grouped into differing
sets / files of ingredients. Compatibility'of ingredients with each other in
designated sets (including ingredients
required by u) based on db ('database) of past statistical taste studies for
how such combinations (may) satisfied
people.
131

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
8] S (screen) / Printer shows = Suggested recipes = to U. The order in which
they are shown might be those w/
(with) higher "scores" for the set, or by other means, eg: cost, "score" for
how all the ingredients are commonly
available in u's zone's supermarkets, uip - db ('database) for what u(user)
liked in the past, etc.
. Indicator Development Idea Generator Steps: S W('soflware) will suggest what
u (user) can use / do
/ replace / alter in their (research) plan / strategy / process.
1] All type materials in situation are entered into= computer, eg: type
hazardous materials (acid, pH level,
7G050 chemicals listed). Eg: type + gloves, type + containers holding
chemicals, + acids and where they are,
where acids might spill, environmental effects (temperature, time span (in
which acids will be in contact), other
circumstances.
2] The files for characteristics for each of these elements is either known by
sys (uip-db). If the db ('database)
exists it was compiled by: "analysis" of research material, surveys of
chemists %, developed by u (user) (or
their company) for future applications (by other researchers of the company).
-Each element has different files, according to the circumstance of its usage.
"Analyzer" determines which sub-
files are applicable via, eg: label of file, % key word search, "status"*,
uip.
3] Files are matched. Examples: only 2% of glove/container types are suitable
for working with acids = next
SW ('software) determines three best gloves/containers for said acid, listing
best first.
4] If u (user) is unable/unwilling to make changes in glove / container, sys
can suggest differing acids, or time
period during which work should be completed.
5] If all suggestions by u are good, sys can "score" what u planned to do /
still give other better / good but worse
options / precautions (whether using products or not, and if so, how they
should be used) = S/Printer.
6] While research is taking place ="sensor" = "analyzer" = NR: when sys
determines there is or could be (based
on score) a situation needing special attention (danger, loss of money,
inability for u to get desired results).
Large Diagram Begins Here: The following 'Diagram Insert #I' is for the large
diagram below it,
titled:'D-# 1'. The For Techies: D below ' D#I' is a subset of the latter. All
Features converge in the central
computer in 'D #1'.
'Diagram Insert #1': For +D-#I
Type suggestions made by sys to achieve needs stated by u (user) (so suggested
future N (invention) or sys
functions as needed in future situation / environment and able to handle
designated occurrences as envisioned
bysys/u.
Suggestions are made by sys: for one or more of following: nr ('notifier) type
- 7G050. Protective gear type
suggested: against (chemical 7G050) hazards. PVC Resin / metal constitution.
Formulae: pharmaceutical, food
recipes, pvc resins.Other Formulae. Likely scenarios:
--how to prepare for: fire and other natural disaster drills / preparedness.
--accidents: (chemical) accidents; vehicle; building (collapse);
-Desired effects: any (el) %KN, any (el) %N, as prescribed by UIP-Tailor
*
-1J0.10 Body Movement NR: how sys can adapt to different: sized people /
applications.
132

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-2E010 20 30 40 50 Recipe Sofl.wares:
-3E020 GPS Record Keeper: what records might want to be kept, which zones are
important, drawing
boundaries between zones (based on uip of situation).
-3E060 Interactive Morning Alarm: what Q (asks questions) sys should ask =
matched w/ (with) uip of u (user)
/ what u has to do later that day [sys puts u into mood for predicted
occurrences/work]
-3E061 Body Motion Instructor:
-3E1 50 "PS-Zone": which zones=are important, drawing boundaries between zones
(based on uip of situation).
-3E151 GPS Circumstance correlator and Controller: which zones are important,
drawing boundaries between
zones (based on uip of situation).
-3E180 GPS Locator: suggests wher.e to begin looking or what needs to be found
and how.
-3E190 GPS Billing Systems: which zones are important, drawing boundaries
between zones (based on uip of
situation).
-3E040 & 41 Tel Noise Canceler: what environmental sounds might be semi-
canceled (at the risk of impairing
listener on other end from part of speaker's natural voice).
-3E210 Indoor GPS Extender: where / how extender could be used / placed.
-4E010 Alternator: which activities offer greater battery power build up
-4E030 Image Input Access Sys: what images sys may use to trigger designated
functions (access).
-5E020 Magic Wand:
-3G410 Tel Ring Delayer:
-4G 190 Insulated Scoring Ball: how to play / develop new "games".
-4G200 Fruit Encapsulator: how to adjust itself to cut in ideal manner. Other
methods for peeling, cutting,
processing, cooking, canning the foods.
-5G061 Dyslexia SW: how u (user) may wean himself off the software; how sw
('software) may help u (user) -
eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer.
-5G070 Speed Reading SW: how u may wean himself off the software; how sw
('software) may help u -eg:
tests u first -> "scores" -> analyzes -> suggests -> s/printer.
Drawing #1:
For Techies: Drawing: User =(-+- See: 'Diagram Insert #1') - c (computer)
ACCESS: Access restriction strategies suggested: db ('database) of past hacker
/ villain activity = matched w/
(with) = db ('database) of known / existing / available remedie.s or traps =
suggested "access" control strategies
= [security manager's suggestions = K (keyboard) = access - analyzer - sys]:
sys analyzes any input from
security mgr during the multiple steps via which sw ('software) w= mgr
together brainstorm for strategies.
ANALYZER ; BILL ; CART ('software cartridge) ; EDIT ; EDUC ; MULTI-USER ; NR
('notifier) ; PR;
PS-Zone ; Q (asks questions) ; ROUTER ; SCORE ; SENSOR ; SOUND ANALYZER ;
STATUS ; tds
(time date stamper) ; T(tel) ; TILT ; TRACK ; UIP; VISUAL ANALYZER ; VR*; WA
(walk about) .
UIP-Tailor & UIP-Suggest: see suggestion sw ('software) (being) developed from
2E files.
133

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+ Five senses are altered to match user's tastes: Senses: images (see "edit");
sounds (see sa);
"vibration"; odor releasers (see smell "analyzer" details mixed throughout
files; *taste (see A dir KN)
+ "Game" application: UIP Game Effect "Editor": User is requested to
experience different effects like
sounds and type images. The U's response is "scored" and intern the game's
effects are tailored to get a more
desirable response from the players. Each game's aspects have multiple
"editable" choices, and sys utilizes
those best matching player's preferences.
-images: see "edit" = images; colors; textures of skin or objects; size
-sounds: sys "synthesizes" sounds (in its memory); sa scores sounds.
-"scoring": to match u's tastes: human body "sensors" are placed on player
(skin) to gauge reaction levels; u
(user) personally K (keyboard) in their (multiple choice) preference of
effects.
-What's scored: user's "mood" reactions "scored" / "analyzed": pleasure;
excitement; passion; fear; relaxation
(between episodes, type of break for player, so they don't over exert and
tire= in tern playing game longer).
-How sys utilizes player's preferences: User asked which of 12 effects elicits
greatest: passion. Then when
passionate encounters occur in game, that "edited"/"synth" version is
utilized.
-User generated effects: players can program / create / record (mic) sound
effects into the game itself.
-Related to A or B* dir KN (invention) where games are sold via vending
machines and tailored to buyers.
"Synthesized" music / sounds altered.
End of ACCESS-BA = UIP
File: Access \ Ac-BAIMI
COMMON FEATURES FOR ACCESS'S BEHAVIOR ANALYZER: FILE AC-BA-IMI
"ANALYZER"% = System "analyzes" the (criminal I access related) behavior
characteristics of "accessor". Methods include "analysis" via:
uip; "analyzer"; *"access"; frequencies of user's voice ("sa"),
eg: voice lie detectors. Cheaper systems can simply seek high
frequencies representing stress.
-sa: "mic" -> "analyzer" (system analyzes person's voice) ->
system responds according to PR (software program) /*U's control.
-Drawing: Voice = "Sound Analyzer" ("mic" = sound to signal converter)
/ **M = c (computer) = function (application) / osc
"Coordinates" between different behavioral characteristics (of
accessor).
-Coordinator - Score: Score: sys coordinates/juggles different
Features/files behaviors according to "accessor's" "score" =*
coordinator-importance / coordinator/corrector; the score of
occunence influences how coordinator coordinates that occurrence
134

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
w= designated protocols/sw of sys.
"ARTIST" =(Method in which) images generated = BA.
See: Artist's image analysis systems. Manner in which images
are generated / something is "edited" = is unique like finger
prints= as determined via ba. The level and types of narrow
scoring on "drawing" is unlimited.
-"Character" = "Image": 1] Designed to portray "designated"
mood. 2] Accessor= selects a"character"= which is connected
with= diverse characteristics: behaviors; levels of access;
moods.
-"Morning alarm": create required "images" in "designated"
"order & timing".
"BEHAVIOR ANALYZER" IN GENERAL =
+ SEE LARGE FILE TITLED C:\K\BA
-User's Behavior includes. Their: feel, style, commonality of
actions over time, rhythm of movement, preferred movements, and
thought patterns (as "analyzed" by their key words).
-"Morning alarm's" "Work motivator".
"CHANGE ACCESS PROCESS" _
(Behavioral) parameters for gaining access can be changed /
"edited" (according to w5 / uip (how accessor behaved, eg: they
were determined to be a hacker) / creating additional hurdles).
-These parameters change (gradually) as uip "analyzes" accessor's
(work) functions are changing accordingly.
+ "Score": Access procedures= become more or less strict / are
altered= according to accessor's= behavior.
-'Customizes by [giving greater/lesser tolerance for deviation from expected
behavior /'access requirements of
user].
"EDIT" = BA=UIP-Tailor determines what ("entertainment") u (user) (subject)
should experience. The type experience "designated"= is designed
to fit (uip-tailor) accessor= via use of "edit".
-H: "edited" "images"= entices hacker-- into "trap". Material
most compelling to hacker is more likely to pull them in.
-forin accessor= selects material to be "edited"= studied by ba.
% data "edited" for "morning" application.
"GAME" = Games: How user plays computer games: where in game player
takes their character, like to the secret cave or by touching
135

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
highest apple on third tree. See "Game"="Access".
--How a user plays a game determines access: 1] sys studies u's
moves via = uip, eg: u (user) prefers using rook in chess game, and u
might accentuate their playing styles accordingly (if access
denied). 2] access provided if/when u wins/loses game (in /
within designated number of moves. 3] U's (designated) piece
arrives at designated square / point 1 stage in "game".
-"morning alarm": play game correctly or to win and deactivate
alarm.
+ "GROUP BEHAVIOR" = How accessors behave within the context of
their organization. The greater the positive level of their
"interaction" with fellow members (seen by their password /
"track")= the better the accessors' scores. System judges for
normal behavioral modes (based on organization's / department's /
employee's history or "program"). Large systems are
representatives of major sociological "interactive" systems:
access-ba must seek out the dangerous deviants (much like how
people intuitively judge other's honesty in real life outside a
computer system).
Examples:
-each password is labeled w: seniority; their relationship with
other employees and degree and type of importance / closeness to
each other; newness to company (hackers more likely to be new
infiltrators). Every accessor is tied to: password, their
history, and normal behavioral profiles. See access=score.
What accessor does w/ what was accessed:
To whom do they transfer the files? Does accessor have traits
that can be harmful or the opposite? The traits of accessor
include both group and non-group oriented behaviors.
"Morning alarm's" "Work motivator": requires "designated" group
behavior.
"HIDE ACCESS PROCESS" _+ Hacker that knows about "access-ba" and avoids its
"traps". What
hacker may attempt doing= and how access can try to deal
with them anyway:
-steering free of files that it knows definitely will set off
"nr". Hacker may want such files but stays with safer files.
-blends in activity that makes hacker appear more normal, eg:
136

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
accesses files "designated" for the password they're using.
-see "Trap's" mirror section.
-this is a difficult area, and one which requires closer
analysis, and or may be "routed" to the human version of access
controller for closer inspection.
HTNT" =
-UIP-Tailor: what passwords are / when (w5) they should be
entered.
-Helping accessors w/ (with) scores only a little out of line: "Prompts"
u to alter their behavior= if ba= finds accessor's score is
improper.
-"Morning Alarm": what actions user requires.
"MANEUVER" = How accessor: "motions"; "merges"; + "routes" himself through
system or main access process; functions as scored by= "order and
timing"; "repeat".
-each facet of maneuvering= has a different "score"= later merged
with accessor's= other scores.
-movement patterns needed for: "r", "draws"%
"MERGE" = Scores that are mergeable:
-those tabulated over time (w preferential weight given to the
latter).
-one or more scores= generated via any method= are merged.
-other accessors in "group behavior"= to which accessor is
"tagged". If other accessor's behaviors are changing= each
accessor's scoring system can change accordingly, eg: via the
averaging of this and or other group's scores.
Miscellaneous:
-material accessor "merges"= W5 -> score
-examples ofwhat's mergeable. Accessor's: "artist", "group
behavior", "mood", "motion", ps-zone, "scientific signals",
"sensor", "track", "visual analyzer", "uip-db", W5 of accessor's
other behaviors.
-Manner in which files are merged= based on= ba.
"MOOD" =
Sys matches its characteristics with that of whatit determines
user's behavior is like.
"Hint": the mood created gives cues /"prompts" for u (user) to
137

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
answer "questions" (needed to help determine accessor's
authenticity).
.-This is an example of a subset of "Mood". And this "mood" is a
subset of "Access"" = "BA", which is a subset of "Access".
-Manner of hints are "editable" (according to "order* & timing"
as guide / accessor's behavior).
OSC (outgoing sound communicator) = ("Prompt"): System's' OSC (outgoing sound
communicator)
matches / mimics the user's
voice so as to solicit the desired response (emotion/feel
rapport/make them want to act in certain manner (purchasing /
work productivity, behavioral modification). Psychologists
established which type of voice / sound frequencies are most apt
to achieve the desired effect according to: circumstances (UIP /
U's state of mind (at a particular time)). *TDS: osc's sound
modulation might be effected by the time of the day (U may need
more energizing in early A.M.).
.-In similar manner, sys generates a "mood"= matching user's
behavioral profile.
.H "Trap": hacker is made to believe they are a legitimate
accessor via many methods including "mood", "hint".
"Designating" what is best "mood": develop uip=db of
accessor's behavior.
. Creating the desired "mood": "Edit" (effects the visual
appearance / wording utilized); See "osc" above.
-% odor release = smell analyzer; vibration emitted = vibration
analyzer.
. Drawing: Accessor's (behavior) = c (computer) (designated mood generated for
accessor according to: u's behavior / below Features) - Access =
W5 // CHANGE ACCESS PROCESS // HIDE ACCESS PROCESS
HINT !I NOTIFIER II ORDER & TIMING (how "edited" material
is shown to accessor) J/ PROMPT // SCORE.
"MORNING ALARM" = Manner in which user does access process= deactivates the
morning alarm.
+See: "Morning". Has much information.
:"Morning alarm" introduction: This is only one of the many
applications for "access". "Morning alarms" are systems created
to uniquely waken up the users, and then to require them to act
in some manner to bring them to full, wakefulness. If necessary,
138

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"Morning alarm" can be ignored only to better understand the
general natures of "access".
"MOTION" = Human movement about premises:
Parking lot outside working hours:
-"visual analyzer" /[motion]'sensor = "tracks" license plate numbers.
-hackers might park elsewhere and walk to premises. Hence sys is
more suspicious when someone enters building= w/o (without) triggering
entrance "sensor"= signifying accessor= drove onto parking lot=
thru "sensor" gateway. The number of cars in lot should match
number of people / users in building / on system.
-see KN: sys "tracking" employees whereabouts (in a building)
. Motion / Vibration: Access' "Motion": type motion= matches
needed behavioral profile. Form of User causing "vibration".
-"Motion Sounder": "sensor" "seeks" unusual (body) movement.
"ORDER & TIMING" = the "order and or timing" in which the user utilized
different software
programs is 'tracked.
"PS-ZONE" = Score judges= point of access= by u.
"QUESTION" = "MQ". UIP generated questions:
-System "prompts" "accessor" to "react" to questions or
occurrences.
-Occurrences - General: Without knowledge= accessor might not
recognize / know the presence of "occurrence", and or= what the
needed "reaction"= by accessor is.
-Type occurrences = Any sw ('software) change / potential "prompt" that
accessor should keep their eye out for.
--Eg: any "interactive image" creatable by "artist" / "artist's"
"edit"; any occurrence= that can be "sought" by= "seek & react";
any text or "image" that directs / "hints" accessor to: another
"location" in "c" (sw, file) / physical "location".
-"Questions" posed to "accessor":
User is required to answer questions about their history, or what
and why they accessed system previously.
. Sys generates questions which require correct (near correct)
responses to gain / maintain access. Randomly selected
authentication challenges.
-DB uses file of questions= chosen at random= then "seeks"=
correct "reaction" (answer).
139

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--Exists: access system that shows what accessor previously did.
: Drawing: Questions come from =sys studying u (user) = creating / delineating
information in question / true-false statements = which u must
respond to.
. "Morning alarm's" "Work motivator": requires "order & timing" of
computer work by user.
Answers are 'customized.
"REPEAT" = One of the many manners ofjudging if accessor is who
they claim to be. Files accessor accesses and or the * order in
which they're accessed is normally repeated.
"SCIENTIFIC SIGNALS" = Body signals of accessor studied= and
matched w/ (with) accessor's earlier signals.
"SENSOR" = Body Movement: way u (user) moves its body / objects on "s" or in
hand
= access "analyzes" its uip-db to see if there is a match. Other
movements: drawing, walking around.
"SMELL ANALYZER" =
"SOUND ANALYZER" = Voice command systems judge people's stress
levels= lowering score for: higher stressed / lieing behavior,
since this can signify presence of hacker.
-system takes into account: differences in stress levels for
male and female voices (password shows sex); deadlines accessors
must meet; accessor's general level of stress is compared w=
stress level at time of access.
"TEL" _
"TRACK"
1] U's behavior monitored to see if their behavior matches
system's profile of their behavior: uip-db.
2] Identifying villains: Similar to immunological Anti-body
recognizer. Commonalities of villains "analyzed" -> uip-db of
villain; next time someone tries to gain access w/ (with) designated
degree of common characteristics (from previous episodes) sys
hones in on them. 3A205 Tampered Alert. Villain usually is
unawares they've been identified by sys.
3] Sys monitors U's activities. Hidden (computerized) codes:
embedded in stolen data: easier to "track" where these codes go;
eases court prosecution. 2E251 Intelligent Monitor
[Sys "tracks"="analyzes" u's behavior] = ba ('behavior analyzer) = Conclusions
140

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
(Score) utilized by "analyzer" / UIP-DB.
. Miscellaneous:
-information used to monitor and determine who user is and W5
they are doing.
. "Track": System identifies via a third party's list of
potentially bad people. This list includes those who are
suspected, indicted or convicted of: any crime, hacking,
deception, etc. The main "access-ba" system can also funnel
information about accessors to this 3rd parry list. This system
is quite certainly illegal as of this time.
"TRANSMITTER" = Magnetic Device
"VISUAL ANALYZER" = fingerprints; face; pictures.
"UIP" = Learning about Accessor: Info learned about User is fed into UIP.
Existing UIP data may be: considered more or less important than
the BVA's analysis (at that time of U's interfacing) according to
PR. System may adjust to U's fluctuating moods. Also see:
"Questions"; ba; sa; uip=db; "track".
-results from behavior "analyzed" are compared to a reference
level (for applicable access=ba function / uip). Eg: US Pat
5461231
"UIP-DB" = "Score": "seeks" what elements needed= for
compilation= then organizes data in usable form= for UIP-Tailor.
--Notes: Seeks: via "questionnaires", "ba", "track".
Organization of db's files: collected information on user can be
inserted into one or multiple files according to which files can
use the information. Then UIP-Tailor seeks which files they need
to better tailor. Or more work can be required for UIP-Tailor to
find the needed information. Example: "Access' BA's Score" - db
compiles data to show how accessor is rated= intern if accessor's
changing rating stays good= uip-tailor / "access controller"
permit access.
-if system determines this user's usage of a sophisticated
electronic system matched their normal behavioral profile, by
utilization of certain (confidential) files or functions and not
others.
-see Access' BA's "Question".
People User knows: u (user) reads or hears voices / information =
141

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
then u responds accordingly = and if correctly u (user) has access.
Examples:
-_User must recognize designated voices (such as their co-worker's or
mother's) and only respond to their
commands. After
such voices, questions must be answered to the satisfaction as if
they were being critiqued by said voice. Hackers may not know
which is the correct voice, nor attach the voice with the needed
answers. These voices may not have tags such as boss or wife.
--u hears three voices, and one is their wife's/co-worker's = u
selects the familiar voice and access continues. Voice induces u
to work harder or have better moral (tgh) / induces humor, eg:
says 'work harder', 'get to it', 'make lots of money honey...',
'you lazy bum'.
--"order& timing" of such people's actions need to be made
correctly.
-_accessor might not know what sys will ask him. Sys may have
received input from others (knowing accessor) w/o (without) accessor's
knowledge (about their input). Such information might not be
made available to anyone except under designated circumstances
such as time (w5). See "Hide".
"UIP-TAILOR" = Manner of use / access controls product: correct behavior not
only permits access= but it can control products as well. This
is a merging of the fields of access and R. Results in= uip-tailor adjusts to
accessor's behavior.
"W5" = Access at right time: designated temperature, weather,
certain news in mass media, when another "designated" u (user) also has
"access".
End of Access - Behavior Analyzer Features 4L
File: Access \ Ac-BAPAT
ACCESS BEHAVIOR ANALYZER RELATED PATENTS
This section is a copy of what was sent to files: Ac-ba, educ, score, ba.
9/1996
-Pat search strategy: (behavior* or psycholog*) and (software* or computer* or
%program*)
DI:
BA / Access=BA / Educ (ba) / Score (ba) / Track / *Game =
US Patents:
-4571682 System and method for skill enhancement and behaviior modification =
"education" /"ba"
-Miscellaneous *: 3944796 5533093 4569526="game"=4666160 5349539 5493185
5473537="scientific
signals" 5111413 5485600 48182345434788=gps5524176 5260867 = 0 (computer) used
by accessor
142

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-4751642 "Interactive" sports simulations (vr) system with physiological
"sensing" ("scientific signals") and
psychological conditioning ("mood" / motivation I "educating")
-4796194 Real world modeling and control process = seeks deviant behaviior on
factory floor
+ 5123045 Comprehensive "software" protection "system". Patent works with I/O
behavior.
-5507649 = "images" are "designated" to= match accessor's behavior. Eg:
children receive different images
from adults.
54831 12 1 5377258 = Method and apparatus for an automated and interactive
behavioral "guidance" system:
"interacts"= w/ (with) user via= T (tel) / mfh (mainframe hookup) / r; "educ";
uip-db; "questionnare"; sa
(patent's voice stress analyzer); requires user's "reaction"; access' password
= patent's PIN; "Trap": motivating
hackers
-this patent number mentioned elsewhere in KN (invention) filing.
DI: ["Access" = "BA"] - 5377258 =
"ACCESSOR" lI "ANALYZER" II "ARTIST" !I "BEHAVIORAL ANALYZER" // "CHANGE
ACCESS
PROCESS" // "EDIT" // "GROUP BEHAVIOR" (how employees "interact" w/ (with)
each other / system) !/
"HIDE ACCESS PROCESS" // "HINT" // "KEYS" /1 "LIGHT SENSOR" // "MERGE" //
"MOOD" (motivating
accessors) If "MOTION" 11 "MANEOUVER" II "NOTIFIER" Il "ORDER & TIMING"
(patent's mention of
time duration) Il "PROMPT" // "PS-ZONE" II "QUESTIONARRE" lI "REPEAT" //
"SCIENTIFIC SIGNALS"
/I "SCORE" /1 "SEEK & REACT" // "SENSOR" II "SMELL ANALYZER" lI "SOUND
ANALYZER" !I "TEL"
11 "TRACK" Il "VISUAL ANALYZER" // "UIP" II "UIP=DB" I/ "W5".
5515270 Technique for correlating purchasing behavior of a consumer to
advertisements:
How functions described in abstract of patent are replaced with KN (invention)
Features:
-buyer behavior can be replaced with: how accessor functions in other manners
described
-advertisements and promotions consumer has been exposed to can be replaced
with: "promts"; "hints";
"guidance"%; material accessor was exposed to or "interacted" with (on
system);
-monitored replaced with: "track"; "analyzed"; "ba"
-montitored together replaced with: "merge"
-readable record: uip-db
-subsequent behavior replaced w: "track"; "order & timing"%
-consumer = "accessor"
-information combined to analyze*: uip-db; "analyze"
-cash register: "billing"
-consumer* inserts this record: "cart" / password / uip-db
-promotion type classified: ba ('behavior analyzer) of advertisement;
organized by subject; uip-db
-only portion fo collected data needs to be analyzed: portions are "tagged"
Search Strategy: (score or scoring or scores or measur*) and (behavior* or
psycholog* or personalit*)
14.3

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Scoring of behaviors / Predicting behaviors (for uip-db) / "Track":
-4971561 Apparatus and method for learning about the relationships and ...
-5424945 System for evaluating a psychological effect of a document
* 4481593
File: Access \ Ac-BA *
File: ACCESS-BEAHAVIOR ANALYZER *
Repetitive information: Any (set of signals) "analyzed" by "BA" from which ba
arrives at a conclusion can
achieve "access". The conclusion from ba acts as a type of gate - one must do
something or act in some manner
to gain "access". This is a very broad area.
-Example: "BA" determines if u/ viewer had good/undesirable behavior (w/in
parameters of system's ba of u) -
> level of access afforded matches accordingly. Eg: limits kids watching
excessive TV (violence).
Patent search str (strategy). Abstract 1974-7/96: (password* or access*) not
accesso* and (behavior* or
personalit*).
-str: (behavior* or psych* or personalit*) and (software* or computer* or
access or accesses or accessing or
password or security or guard*)
-US Patents: 4854877 5343871 5465729 5470235-Child behavior improvement system
5250946 4741320
4013294="game" 5469506 4533244.
-Pat search strategy: (behavior* or psycholog*) and (access or accesses or
accessing or password*) and
(software* or program* or computer* or electr*)
Existing systems used to analyze a person's psychological profile can be
utilized, requiring similarly correct
responses.
Any "designated" signals generated by accessor's behavior = "access" / nr /
track. Manner in which any
passwords are triggered = needed passwords = can be generated or altered
according to: UIP or BA.
OTHER: * Each accessor has differing hurdles to pass= and gain access. Needed
passwords (are uip-tailored)
to each accessor= better helping accessor remember password(s).
"Changing Passwords": Needed passwords may need to be altered ("edited") each
time in different manner
within the profiles of accessor's = ba.
Below is altered version of IM124's "BA" Section. Adapted to Access = BA:
* lntroduction: most of the original IMI20's BA was moved'to Access' BA's
Parts Section.
144

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
* Product's "access" functions +might be (slightly) altered according to U's
determined (via: BVA/UIP)
behavior.
*-The OSC's sound quality (might be) is so excellent / similar in vocal
characteristics to u/listener it sounds like
the real person speaking to U. The sounds also have such color, they: make the
U's ears feel like they can
visualize the speaker / function (whether there is or isn't an S).
--Sys "analyzes" type (sound, behavioral) files targeted person better matches
= then communicates w them to
create maximum psychological impact (sales, "mood") as determined via
"analyzer" / K / pr. D: mic = bva / uip
= c = osc.
. For techies: D: Organism being studied (human, *animal, other) = This N Sys
(BA) - C
ACCESS (sys upon "access" monitors (2E251) organism); ANALYZER (); AP=Access
(% scientific, %
psychological, % medical, % business research projects); BRAIN (); C(); CAMERA
(2E251 Intelligent
Monitor="track"); CART (sw, db, differing cart for type organism or ap); EDUC
(); GPS (); K (); M (db,
brain); MIC (sound analyzer); *MO (); *MOUSE (); MQ (); MULTI-USER (differing
"accessors" (u),
organisms being studied); NR (w5 required parameters have/haven't* been met
(via "score" = "analyzer"));
OSC (); PR (); PS (); Q Q; R(); SCORE (); SENSOR (motion); SOUND ANALYZER ();
SOUND
VISUAL ANALYZER* Q; * SPEECH (); STATUS (); SYNTH ("analyzes" for sounds that
better influence
organisms (per pr/u/k)); TDS 0; T* (); U (researcher /* organism being
studied); UIP (uip of organism /*u
(studies/tests objectivity of researchers)); UQ O; VISUAL ANALYZER O; VR* O;
WA (use outdoors).
-Sub-Parts: BA-UIP; BA-BVA; BA-Tag: tags (then tracks) designated people
according to certain profiles.
Other: * "Router": locates then= retrieves needed data= for this part. A code
(access, el 'water mark') encoded
in sw/data* limits how sys / program can be: utilized (to operate device)
/"edited" / copied. See: "Access",
"Edit . Billr"
. Drawing #1: Improvement on US Patent: "Accessor" 5377258 Method and
apparatus for an automated and
interactive behavioral guidance system: "trap"; "hint"; u receives
motivational messages (osc) to improve
behavioral patterns; includes client db (uip); voice stress "analyzer"; client
response required j=
=C=
= ACCESS Q!I ANALYZER Q 1/ EDIT ="Seek & React" = (sys edits out less needed
input from:
determination if accessor is legitimate) // NR (penalizes u when u acts poorly
(undesirable behavior) = electric
shock to body / "entertainment" sys N usage is limited (see KN)) // OSC
(penalizes via harsh sounds = synth)
// PR () // PS-Zone (u trained where its safe / u is not needed for work, eg:
home, coffee room, recreation
room, tv room) II Q (to build uip-db = needed by sys to train u) // R() //
SCORE (how well u's (user's)
behavior is altering) I/ STATUS (of u's behavior) /1 TDS (w5 u behaved ->
builds up UIP-DB) !{ TRACK ()
UIP Q.
145

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
[UIP = DB collection] !"Question" to determine authenticity =
Example of source that "analyzes" behavior: "Who do you think you are?", a CD-
Rom published by Harper
Collins Interactive. Also read its book version and bibliography, and speak
with the developers of this and
related books (as found in Library of Congress or Bowker's "Books in Print"
subject section) for type formats
depended on each KN application.
+"REMOTE": Manner of User's usage of "remote" control device is a pattern that
falls within or out of
"designated" behavioral patterns. The pattern of movement might be "educated"
to user, and or "ba" may pick
up on u's (fairly) unique movements, like analyzing a person's movement to
generate their signature.
+ Correct utilization of "Remote" -> "Password". See "Remote" part's details.
. Examples:
-"Tilt" (joystick); "Dance". Laser switch, Clapper, Interactive Projected
Display, Remote Control Mouse, etc.
-Each squeeze generates signals to control device. Eg: 4G010
-See 3C-290 Bouncy: How object is played with.
-Activate, deactivate any electronic device and or control its operations
without touching the main unit (unit's
buttons).
Interactive Lock: Correct dialogue activates lock. Applications: students pass
test before being able to activate
desired systems like tv's and stereos; different and changing information can
be required from special people
seeking access into premises. 3A-891-042005
Magic Air Pen: Remote pen's movements are transmitted to computer. Make
strokes in the air or on any flat
surface. Each different stroke creates a different signal. (PD) 3A-790-042004
-Camera "Sensor": Changes in what's seen can represent changes in behavior or
other (needed / likely)
occurrences.
% Light Sensor: Senses changes in light measured by: presence or lack of
light, or more precisely the amount
of light; frequency of light, eg: color; duration and or time in which light
was generated.
Breath Sensor: Blow your breath into sensor in desire combinations. Works with
smell sensor, not allowing eg:
garlic or alcohol breaths; or can only be activated if system can
differentiate between different people, eg:
chewing certain type of gum or food. Judges also for pressure from mouth and
or wind speed.
Laser Switch: Activate any function by only blocking the switch's laser light
with your finger. 3A-7 5 1-042003
5A-460-042004 5A-710
The term -media- is for files or desired functions.
Below is altered version of IMI8c10's "BA" Section. Adapted to Access = BA:
D2: "Analyzes" = W5 of Accessor's Actions =
1] 4A09 Behavior Analyzer: (future product) Judges region ['GPS] of speaker,
and maybe social stature - all
based on word choice, accent (sa), etc. Can seek all the possible questions to
behavior and type psychology of
speaker currently able to be done by human ear (as in over "T" conversation).
146

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
2] 5AI090 Sounds & Music & Verbalized Words and Creature Sounds "Analyzer": it
observes changes in
behavior according to such being emitted by "accessor" and or caused by what
accessor is doing (to (any)
system). "Sa".
3] 5A1100 Smell Analyzer: observes changes in behavior upon emissions of any
smell (smoke, flowers, sex
smells, etc) or matter being studied.
4] 5A 1110 Sight Analyzer: what does "accessor" see and how they respond to
visions from displays, pictures.
"Images" created via= "edit".
5] Manner of changes in accessor's keyboard behavior = access:
A 1-320 Activity Identification Software: senses fingers on keyboard and blips
if you aren't writing. It senses
when you are lacking in creativity, clarity, confidence by manner of key
stroke rhythms. Mix with Therapy =
Machine, Taro Machine.
.-"Tilt": controls sys' functions. If "tilt" not used (correctly) it nr too.
6] A3-13 EMOTION WATCHER: tells you how unrelaxed you are by how: product
(ball, top, doll, coin, etc)
spins in container, on CRT. Can output words, suggestions, slogans. Checks p
by: u touching a pad measuring
your temp; sensing stress in voice (product exists) whenever speaking (and
hence operates whenever machine's
on).
7] A2-170 HANDWRITING ANALYZER: sw studies what p writes onto special display
("S") or paper (then
read via optical reader).
8%] This aspect repeats other information:
A2-610 BEHAVIOR SCALER: like "mainframe" detecting if person is lying by
stress... in voice, detect how:
a] sexual another person feels. Even try it on yourself to see it works. Know
if you should pursue another for a
hot date.
b] reliable and or constant and or organized and or committed and or ability
to follow o lead
9] R132-1 Behavior - Medical Symptom Analyzer: System correlates patient's
behavioral with their medical
symptoms. Patient's graph for changing emotional state is matched with body
symptom graphs, giving
researchers additional needed analysis. Invention is the software's merging of
data.
10] R132-1-5 Biofeedback - Body function analyzer: User can look at their
medical analyzers and see how
they are/were performing (psychologically) intern user gets to know themselves
better, intern user is better able
to (intuitively) psych themselves up in the desirable manner. Use with
sporting equipment. Portable version
with wireless transmission. Also can develop database of user's physical
profile.
Notes for D2 Diagram's above parts: This focuses primarily on the type of
behavior access-ba= analyzes=
accessor as exhibiting (in response to any stimuli= created by sys). The
person or other entity mentioned is the
"accessor". The desired functions of accessor are what is controlled by
access. These parts were copied and
altered from IMI&9 in 9.96. See full description of these parts in IMI&'s BA.
Access = Fingerprint: A1-290 Finger Print Reader: Analyzes a person's behavior
by their finger print. Also
matches couples with compatible finger prints. Related to existing "C" systems
based on horoscope, blood
type.
147

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-finger Match(ing): dating service matching behavioral types associated with
genetic finger printing. Genetic
Finger Match(ing)
If security lacks the funds, they can pretend to have such a hacker behavior
analyzer by giving out false cues to
[all] users, eg: occasionally asking 'designated questions, according to
user's behavior; although such
inforination is not [always] [fully] analyzed.
END AC-BA*
File: Access \ Ac-Features
ACCESS FEATURES - File: Ac-Features
Examples for Access features organized by category.
"ACCESS CONTROLLER" ="Access"' Gate Controller is notified about the good or
unusual status
of any accessor's functions. The form of notification is via "notifier", eg:
an alert signal. Any one of multiple
people or systems can be notified via one of multiple modes. What decides the
type access permitted. This can
be a (fairly) automatic algorithm and or human officer who (helps) "designate"
the level of access permitted.
The "Access Controller" function sat or with the gateway point (where access
is or can be given or denied).
.-Access controller can be: (senior) employee; security guard(works on
computer and * physical entrance way
to building or system); police; government intelligence system or employee;
anti-hacker entity; one who
controls "tracking" system (against hackers).
-Automatic mode drawing (diagram): locks all / part of the files / system to
"designated" (multi) user; triggers
"nr" -> (human) access controller.
-Drawing: Accessor -> Access' gate (Access' controller =
k/(ba)analyzer/"score") = Electronic system that can
be accessed.
. System checks how good it is itself: Access=BA: analyzes=access controller
because: it may be
fraudulent / dysfunctional/ a poor screener of hackers / causing excessive
problems for legitimate accessors.
-BA analyzes the score access=ba gets in: catching hackers; being inconvenient
for legitimate accessors.
"ACCESSOR" = Accessor. One who seeks to gain access.
-Legitimate user with privilege for accessing system; or the opposite can be a
criminal, namely a computer
hacker.
. User: Anyone trying to utilize a function or feature of (electronic) device
or system. See library and patent
literatureon: encryption, passwords, security control (of el systems). This
anyone can be:
. Person: One with required security or usage clearance; "Bill": one who has
credit line; employee; friend;
family (over certain age); one who has won usage credits (via "game" or
"bill"); owner of system.
-A person with / lacking needed skill / training / password can(inadvertently)
(not) cause damage, including:
use of medical equipment, other expensive or dangerous machinery (in chemical
laboratories), damaging other's
research test results. -
148

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.a>.:..aw,..>.s,..vtc66655FdCCtit48YUkYEYYYA6'6$syYEYvbYfY>~.I
Animal: Keeping animals in and or out (at "designated" times). Eg: training
animals to behave in certain
ways by= having 'ba determine desired behavior= and if so= allowing access.
See: KN's animal "tracking" and
"analyzing" systems; systems to motivate and or control organism's behaviors.
- Another electronic system: "Computer" on WWW; "M". A system or KN utilized
to gain access. The other
system may be designed to work in conjunction w/ another system that requires
access procedures in order for
them to "interact", eg: computers on a network.
. Hacker: they're unwanted, but may try disguising selves as a legitimate
user. Spies: they may seek sensitive
or confidential information. Their usage might cause greater wear & tear on
system. One who seeks to
sabotage the: system itself, another system tied to system they try hacking,
or sabotaging something or someone
not tied to system= but can be attacked after getting something (information
or function) from hacked system.
It's a person who is or should be incarcerated. Someone posing as someone
else; hence sys' access "analyzer"
needs to be very good /cautious / meticulous / detailed in its access
procedure requirements. Another system
can be utilized to hack.
-Anyone who can't correctly (re)create password is probably a hacker= hence
probably treated like one.
System(s) may consider allowing accessor to subsequently prove they aren't a
hacker via generating correct
passwords.
"Access = BA" identifies not only hackers but (similarly) also any
"designated" type of -incompetent
employees / mentally ill people / terrorists /legitimate accessors who (might
be too curious wondering beyond
their "designated" "locations" on sys) I access controller ("tracks" W5 it
monitors= punishes), since it can't
always be trusted either.
-Determines such type accessors based on their: performance or work results
"score"; errors they make;
psychotic behavior; keyword searches.
Drawing #l : Accessor = Seeking Access to utilize / control /"program"/ "edit"
- C: Access functions:
ARTIST BEHAVIORAL ANALYZER () II INFRA-RED SENSOR KEYS () I/ LIGHT SENSOR Q II
MERGE O II MOTION O I/ MANEUVERO lI PS-ZONE Q/I REPEAT O lI SCIENTIFIC SIGNALS
Q/I
SMELLANALYZER () II SOUND ANALYZER () // TEL () // TRANSMITTER Q/NISUAL
ANALYZER ()
lI W5 O II CHANGE ACCESS PROCESS HIDEACCESS PROCESS O Il HINT O !/ NOTIFIER (}
lI
ORDER & TIMING ()// PROIVIPT () !I SCORE ().
. Drawing 42: Accessor = Seeking Access to utilize / control /"program"/
"edit" - C: BILL* ();
CART (retrieve info from cart); EDIT (); EDUC (); MULTI-USER (); NR (); OSC
(); PR (); PS-Zone (); Q
(); R(); ROUTER (); SCORE (); SENSOR (); SOUND ANALYZER (); STATUS Q; TDS ();
T(); TRACK
0; UIP (); VISUAL ANALYZER(); VR (); WA ().
"ARTIST" = Method in which images generated permit "access".+ See main
"Artist" section,
especially it's "access" sub-section.
. 3D-010 Tilt Alarm: Tilt alarm in correct position to deactivate. Required
angles can change daily, requiring
user to discover the right position by looking at optional display which shows
angle at which device needs to be
deactivate.
149

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Applications: deactivate morning alarms, burglar alarms, gain entry, or lock
or unlock anything else practical.
-Drawing: alarm = [activator/deactivator] = "tilt" -For Techies: "Access"
(failure to deactivate alarm / turn on
System(s) correctly -> alerts security personnel).6.96-Like 5A480 Laser Lock,
both require designated motions.
-play "game's" joystick (tilt) to win game, hence gain "access" or other
desired function.
+ Required motions: Generating the path / algorithm / image of actions. Eg:
they can be those u made at some
previous task within narrow time parameter, eg: how they controlled a vehicle;
joystick from earlier "game"
they played; replicating (joystick)motion made by character seen on "S"
(nearby).
--if the actions are not made or repeated, accessor can generate a (moving)
picture / "image" of the scenario.
Or, simply k/generating the SW (Software) codes for the scenario in the
correct "order &timing". These codes
mentioned are those generated after the accessor correctly hurdled the
obstacles to gaining access.
-pat search strategy: (tilt*) and (password* or activate* or access*).
. R45 'Dynamic Signature Verification': Write in your password. System
identifies user's handwriting style too.
[Communication Intelligence Corp, Redwood Shores, CA / Riley Design
Associates, San Mateo, CA 4.94 PS]
. For Techies: ACCESS: (also permits access with (additional) one or more of
following~: visual analyzer
(user's face, finger print), other" access" modes, (in tern serving as
additional test barriers to entry));
ARTIST:(behavioral analyzer studies images made); CAMERA:(); CART:();
K:(stylus; r*); MFH:(database
for visual and behavioral analyzers); MULTI-USER:(); NOTIFIER:(status, score,
alerts when access denied);
OSC:(); PR:(); PRINTER*:(); Q*:(); S:(); SCORE**:(tds); UIP:()
4C210 "Artist" Access: Duplicates 4E030 Image Input Access, but this is older
KN #, hence kept for priority
date.<1 (signature analysis aspect is 1, excludes pictures), 3 or 4>User must
electronically draw needed picture
to deactivate alarm ;or draw picture onto paper and have scanner check if
image is near enough to the needed
picture (machine is the final judge)-display can show the picture needed to be
created--system's judge
compensates for differences from needed and actually submitted text (given by
human). --very similar to
4E030-may be any text (signature) can be given by person, system just analyzes
it for: complexity; and or how
well the brain is alert(by using database with psychological analyzer), etc.
-sys judges for uip (calligraphy analysis) ="analyzing" ('visual analyzer)
identity-similar and compatible w/
"Sound Lock" Invention in C Directory, 4C190Smell Lock. Existing Invention
which analyzes finger prints /
eye's iris for "access"
.-patentability?: signature analysis by computer exists, thumbprint analysis*
.[o-Sys displays an image, u must draw as closely as possible. I fits within
right parameters, System(s)
analyzes user is fine physically. Eg: they are in space, and oxygen
deprivation is judged. Or draw picture fast
enough - KN, within certain time pattern.
--for drunk drivers. If drunk, user can't type combination quickly enough to
enter car.
-Above (for this sub-section) mostly from Mark Rossi Mar 1995,703-739-0220.]
Drawing: System(s) prompts u u responds (writes/draws/"artist") =sensitive pad
= analyzer = access.
1.50

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Changeable password elements. "Order & Timing" of: image generation. Correct
"artist" functions
deactivate "Morning alarm".
"CHANGE PASSWORDS" =+ For added security, system requires differing passwords
for user.
These newly needed passwords are those that accessor knows or can guess, but
difficult for hackers to
determine. Subset of "Generate Passwords".
-Value in changing passwords: u may not force themselves to change their
password on a timely basis; keeps
out: hackers, those who may have copied or. illegitimately gained passwords
otherwise, users who have expired
or exceeded their "access" privileges; makes accessors appreciate more highly:
need for security, value in
accessing.
--.May require accessor be more on their toes / alert / kept up to date (on
business or sys) since changes in
passwords can be related to what and how and w5 accessor does their work -
hence newly generated passwords
can be uip-tailor related.
-Methods of gaining access change according to any (random /"designated")
criteria, making additional hurdles,
eg: should an illicit person gain the password. Altering responses to access'
questions based on cue when such
alterations should be made. -"Hint" / Cue determines how passwords are to be
altered. Eg: 1]if u receives tel
call (from machine) stating word 'Apple' = u (user) knows variation version
#35 of password is used until =
next such incoming tel call. 2) uip generated cues based on: what u did
earlier, their history / hobbies / what u
should know based on their work. If statement is correct / of certain topic
designated variation of password is
valid.
-Other cues: day or week or month; weather (yesterday's high temperature
reading); stock quote for particular
company; type music played (listen for second word in song (which could even
be one of needed passwords)); +
pat 5442342 User inputs wrong answers based on cues, eg: days of week. 8.95
Hughes pat awarded.
-Patents: 5365587 self-modifying access code for altering capabilities.
+ Camouflaging passwords accessor entered / How system alters passwords: -
Drawing: How u/sys =
changes/"edits" inputted password(s).
. See "edit": any text / signals entered (kn, "artist", password)into system
can be altered as "designated".
Examples:
-reverse the signature or images drawn. See "access=artist".
-Altering typed or spoken responses: "edit"-Reverse the order / "order &
timing".
-skip sections: first/middle/last digit(s)/words/sections.
-speak in different tone ="va"-utilize "synth" to alter inputted sounds-
respond in different languages (with
different meaning, or(near) identical translation).
-Combination / Order altered. Eg: changes typed password while substituting
flashing lights for inaudible
sound, and doubles waiting time between typing password and touchless access
process.
-Fingerprint of different fingers / people. One or multiple people enter their
prints / other images in altering
"order &timing".
151

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Multi-step Alteration - Scrambler: system's hw (hardware) or sw(automatically)
alters inputted passwords
after entry. Password only effective after altered as designated (within
designated time / w5):
-Makes harder for those w/o (without) this scrambler (accessing System(s) from
remote location). -Alteration
made more complexicated: each u's passwords scrambled differently; + password=
entered into sys/k= shows
up on s/printer/etc= as being different ("edited") from what was entered.
Purpose: fool onlookers / hackers
(who see history of accessor's activities namely what passwords they entered).
-altered differently in different circumstances (w5 of password entry):
minimizes ability for hacker to get code
for how password was altered. Multiple step alteration: System(s) alters, then
re-alters password numbers of
times prior to concluding altering process.
.-Access needed to change or do anything. Eg: password "edit": Alteration mode
has barriers to access from
hackers, eg: can't access from remote location; has minimized points of access
from anywhere. Presence of
alterator hidden.
-Pat search strategy - USPTO Bib disk -6/96: ((change* or changing or alter*)
near9 (access* or accesses* or
accessing or password* or verifl")) and (computer* or electr* or software*)
not alternative-User must meet one
or more differing (creative) criteria prior to gaining access. Each criteria
can change, eg: being are requirement
/ duration of criteria's activity / which u of several should meet which
criteria(s) / rhythm in which criteria is
met. Any one of the criteria's can be the controlling factor for other
criteria.
-"Edit": u's signals may need altering as "designated". Such editing may be
w/in System(s) or "cart" (carried
by User (as a key)).+ Causes of change in needed passwords: "ba" "scores"
accessor's behavior (during
accessed session) as falling out of (their)typical usage patterns. System
"prompts" accessor during this/later
access procedure for differing password.
-"Access" = "Visual analyzer": need to change "designated" aspect of image.
Eg: third line from left of right
index finger needs to be erased or otherwise "edited": to achieve 95thdesired
function.
. "Access Controller" or legitimate accessor can alter needed" passwords" for
themselves or other users.
Limitations may include: Accessor can't alter passwords for those his senior
(w/higher access privileges); other
accessors can override initial change of password via: additional more
powerful passwords /after "designated"
time period or other criteria.
."Morning alarm": different tasks required each (part of) day=make it both
more challenging / uip-tailored to
user's needs or situation.
"GENERATE PASSWORDS" = System(s) generates password / access instructions /
type hints. See
"Change Passwords".
-sys studies uip-db / behavior (ba) and gives password more readily remembered
and difficult for others to
guess.
--examples: "maneuver": "route" u walks from their private office to access
point must be redrawn by u to gain
access: a]'from' location can change, hence System(s) "tracks" u (where ever
they're (in building)).
-Pat 5398285 generating passwords using public key cryptography.
152

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
One or Multiple sources generate password: If any one System(s) /person is
incorrect / uncooperative = access
denied. The order in which parties cooperate may be essential. Option: the
effect each source has on password
generation is geometric, eg: it puts a twist / alters /"edits" / re-"pr" what
sources before / after enter = to create
password. Things that cause "change=password" can also be used to "generate
passwords".
-Size of password generating devices: 1] might be large enough so as not to
escape detection by building's
entrance security guards and scanners. *2] smal l enough so u can h ide it
from others apt to steal it.
-Drawing: accessor = uip - score - analyzer = access - c.
-Destructibility of password generating device: difficult to dismantle / upon
dismantling designed inoperable
thereafter. Reasons: limits hacking / dismantling for theft or study of parts.
"NR" activated by destruction.
-UIP / BA = utilized / "analyzed" to= "generate password"(changes).
+ Passwords System(s) generates (usually) easy for accessors to remember and
hard for others to guess.
Hopefully replaces need to write down password or process. But the passwords
if they are needed to be written
down, are those that can more readily be written down in abbreviated or other
disguised way so others who find
it can't readily understand / utilize the information. Eg, laser lock requires
hand motion in hexagon. User
writes word laser inside a hexagon.
--sys may keep passwords in such manner as well= with a decoder down the line
to possibly interpret w5
necessary.
+--uip-tailor chooses easy to remember passwords for accessor's human memory.
--Nature of behavioral process accessing is such that it can be easier to
remember than other types of locks, eg -
Laser lock: move hand in shape of hexagon = blocking multiple laser lights in
designated order.
Changeable password elements. "Order & Timing" of: how passwords are
generated.
"HIDE ACCESS PROCESS" = Makes it more difficult for unwanted people to either:
know an access
procedure is being utilized, and or for them to document it. See: "generating
passwords" and how generation
process kept secret; "changing passwords": camouflaging passwords.+ Hackers
may not realize accessor is
accessing: -Examples: When accessor: "Maneuvers": hackers may not realize what
accessor is doing is actually
accessing. Reason - access process doesn't look like access process. "Motion";
"ps-zone"; "repeat"; "ba";
"artist"; Touchless passwords: smell; motion; transmitter from u; Order
&Timing: Mix password entry
process with non access modes, eg: multiple access procedures interspersed
with more normal activity, eg:
maintain connection to System(s) for maximum 3 minutes until all 4 passwords
entered. Repeating Past
Patterns To Gain Access: Less likely u will write down password.
-US Pat: 54997421 Protects confidentiality of passwords.
-Need a password to get your password. Upon entry (by u or sys)to this "c"
file, u must know w5 to find
disguised password(s)designated for differing functions.
-password entered by u differs from what shown on "S": Differentiating factors
include: slightly altered picture;
showing letters typed by finger to be one key away, eg: u typed'2' but "s"
shows '3'. Additionally, the password
transmitted from u's point may first get scrambled to be what showed up on
"s". Later down the password
access process, System(s) can rescramble password to: originally typed / other
code. "Edit". See "Changing
153 =

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
................o..a......sES,..~~ ra~z~~~a;~.~~~~
Passwords"-* 6B790 Barrier hides hands keying password: put hand into
compartment or glove from which
they can key in codes (eg: one per finger) in order to keep codes
confidential. For cash machines requiring:
personal identification numbers; entry into house, office, etc.
-depending on applications and quality of technology, system can" hand cuff"
one hand of an individual who
was attempting an illegal activity; held until police come (system calls for
police) and releases person upon
correct code by police and or other source. Discourages hackers and others
attempting illegal activities.
Replaces needs for guards saving thousands of dollars per location.
-hand cuffing may be illegal-cash machines are probably used by most people in
the wealthy countries-the
handcuffing might occur, and then simultaneously the majority of the machine's
exposed parts might have its
strong screen come down. There might not be enough time for the handcuffed
person to think about grabbing a
weapon to strike the computer ("C"), since they'll be in shock about their
hand being trapped and will focus on
getting their hand out. Just the presence of this on some machines can greatly
reduce cash machine theft.
-obvious? can also catch villains by emitting red ink onto them(washable)-Pat
search strategy - USPTO Bib disk
-6/96: (hide or hides or hiding or hidden) nearl l(camouflag* or access*or
accesses* or accessing or
password* or verif*) and (computer*or electr* or software*)-Certain files can
be kept closed or virtually
unreadable (even to system's chief operator) except when an "access" criteria
has been met, eg: time in future.
Examples of such files: those used to generate future passwords; information
about legitimate accessor's such
as those needed to analyze if their behavior matches.+ "Sensors" can't be
easily replaced:" Sensors" that sense /
"track" access procedures can have their own methods to keep hackers from
getting their own related sensors to
gain access. Eg: the correct "sensors" can have additional needed codes
transmitted w/ accessor's created
signals; or correct sensors can encrypt / "edit" the codes generated by
accessor.
Hiding Presence of Password From Accessor:+ Passwords can be something even
"accessor's"
are unaware of. Passwords can be something they may habitually be doing
anyway. By not giving them the
password, "hide" is strengthened. -Such password generations= need to study
(ba)= accessor's.
25, -Example passwords: --subjects they commonly access or are authorized to
access=access' caution "analyzer" is
triggered when behavior is out of the ordinary.
--typing in one's name--accessor's location: ps-zone--typing style / rhythm /
speed. See typing style analyzer
KN.
--normal "order & timing" of accessor's actions.
--finger print: u thinks they simply need to press button (and warm it up)--
sa: accessor thinks System(s) needs
to be verbally controlled (without realizing voice must be of "designated"
people's).
-other benefits: makes users feel more comfortable in not necessarily needing
passwords (they must remember
or even know were required).+ "Hint": System(s) can ask u questions w/o
accessor realizing correct answers
are the password.
. Passwords can't be transferred out of computer: system= "keyword" search=
"seeks" access process digits=
then blocks / nr when= such is being "transmitted" (via modem). . Drawing:
Accessor's (behavior)
(presence of password hidden from accessor's knowledge) = C ("Analyzes" if
correct parameters were met) -
154

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Access = ARTIST BEHAVIORAL ANALYZER 0// INFRA-RED SENSOR O Il MERGE O !I
MOTION
Q/1 MANEUVER PS-ZONE () // REPEAT ()// SCIENTIFIC SIGNALS () !! SMELL ANALYZER
() //
SOUND ANALYZERO // TEL TRANSMITTER O // VISUAL ANALYZER W5 () //HIDE ACCESS
PROCESS () // HINT () /! NOTIFIER () // ORDER &TIMING () // PROMPT SCORE ().
"HINT" = what passwords are / when (w5) they should be entered. -Sys hints
what passwords are /
when (w5) they should be entered. US Pat 5425102 Password hints; 5345549
Multimedia based security
systems give cue based on strong personal recall ability. *5454091-(accessor
receives / requests hint) = (for)
need password= to get hints foi= subsequently needed passwords(s).
. Manner of hints are "editable" (according to "order* & timing" as guide).+
How System(s) determines how to
"hint" ="uip-tailor": see:" generating passwords", and other access sections;
what accessor previously (see
"repeat") used to develop questions'for'accessor to answer to gain access;
access' ba's hint.
-"Morning alarm":
"INFRA-RED SENSOR" / Heat "Sensor" = Infra-red Sensor: Senses body heat of
User and or any
number of people required (nearby). Limits ability of hackers to pretend to be
at access point. Infrared: body
heat / Iight.
-movement(s) of people must be in designated pattern. See" artist's" image
generation mode for "access".
US patents: + 5406261 Computer security apparatus: accessorizes wireless
infrared transmitter.
pat search strategy ofUSPTO bib disk -6/96: infrared* and(access* or accesses*
or password*)-Any signals
generated=by accessor's (infra-red related) behavior= "access". Changeable
password elements. "Order &
Timing" of: emissions.+ Indoor / outdoor weather meters must "score" weather
at" designated" levels, eg: room
thermometer would limit hacker during non working hours when temperatures
might be less controlled.+
"Designated" objects: shapes / size / type of heat emitting elements:
appendage: accessor's right index finger /
hand; pet(dog) in vicinity; any other four legged creature; (cold
blooded)animals seeking to access water gate
(keeping out human scuba divers seeking (natural resources)); (sun) light
reflector; heat emitting objects (heat
from power generated source or solar power); pens / pencils / computer stylus
/ "R"; 101 insect scrawling in jar
(in random fashion / collected at or * moving toward food source); their
temperature can be above / below (via
cooling agent) room temperature w/in "designated" parameters.
--password generation objects: create objects via clay, plastic molding...
Insert any needed temperature
effecting agents (into slot).
-BA / Motion "analyzer": studies W5 objects are presented: in moving manner;
"laser lock" type motions.
"Drawing" "images": "artist's"="images" generated on "interactive" s by finger
/ other object. Use of finger
nail or other room temperature objects (won't) access (according to W5).
--"sensor" seeks image drawn via: heat / pressure "sensors" on tablet; laser
movement "sensor" - see "laser
lock".
-infra-red / (sun) light = "sensors": way in which light shines into room
needed to gain access. Eg: light
angle(s); level of warmth emitted from light (above room temperature); what is
lighted W5.
155
. . .. ,

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--"order & timing": light must have occurred over set duration prior to access-
"Morning alarm": user's body
movement= getting out of bed /doing "designated" task.
"KEYS" = R113 <*origin date?>Intelligent hotel room key goes beyond old
magnetic card keys, has
circuit chip. Can be programmed re data pertaining to user, billing, etc. 18
Dec 92 X.
-For Techies: ACCESS **:; CAMERA: is activated at check in/out point; CART*:;
CLAP: for additional
codes (to gain "access"); Display("S"): touch-screen (uk for access); %GAME
**:; "M":; PP/MP:; MQ/UQ
*:; MULTI-USER*:; NOTIFIER:; OSC:; PRINTER *:; REMOTE("R") ("R"):; SCORE:; TDS
*: time of
each action; TEL:; UIP*:; UK.
-Keys: metallic key; magnetic entry card; "cart" (w needed software /
passwords, pat 5475839); other standard /
bank(combination) locks. 9G190 "Cart" only functions when the sensor on it
receives correct stimuli, eg:
fingerprint of designated persons; "access".
+ Cart is a key for access. Enter whatever changeable codes desired into the
cart. Cart can be a microchip
placed into a(metallic / magnetic strip) key; whereby cart's codes are needed
to gain access, as well as other
characteristics of the key. The key portion can be any type of possible or KN
type key or %access procedure's
object (triggering hard object). Cart might be invisible, eg: key can get
copied but won't function; it could be
buried or hidden by material by which key is composed. --Repeated explanation:
cart also acts like a key to sys'
lock: eg: (reprogrammable) card key (w/ password code). cart - key =access.
Cart can be microchip built into
key.~
-"Cart" = "Access's" "Infra-Red" Object (Key).
-"Access": need (recent) fingerprint / bar code = scanner /"sensor" / "camera"
[for reading images] "analyzer"
UIP-DB = Lock (U is given or denied "access").
Drawing: Accessor's ("Cart" / Object (whose movement or presence triggers
"sensor" / behavior) () = C
("Analyzes" if correct(movement) parameters were met) - Access =ARTIST (its
movement) // BEHAVIORAL
ANALYZER () // INFRA-REDSENSOR () //. LIGHT SENSOR () // MOTION () // MANEUVER
() II PS-
ZONE () // REPEAT () II %SCIENTIFIC SIGNALS () l/ SMELL ANALYZER(object emits
odors) // SOUND
ANALYZER () II VISUAL ANALYZER(studies shape of object or shape of its
movement paths) II
W5(moved) // CHANGE ACCESS PROCESS O /I HIDE ACCESS PROCESS O //HINT () l/
NOTIFIER Il
ORDER & TIMING // PROMPT (when to insert key) // SCORE (key used to generate
correct score, eg: key
="tilt"). Changeable password elements. "Order & Timing": which "keys"/
"carts" were utilized.
"LASER" = +p <3> 5A480 Laser Lock: Activated by tripping laser lights in
designated patterns. See
KN's Laser Harp & Tel as signal generators.
-Safer from others learning the combination person is keying in. Multiple
lasers activated in designated order by
u making motion of certain shapes.*-Eg: run finger through light back and
forth three times, wait three seconds,
then ruri them two times more, wait three seconds [or longer - can have
variable minimum waiting times, with
flexible maximum waiting times] then easily {quickly} swing back and forth
twelve times.*-system locks for
certain duration without allowing any access if attempted entrance code is
[wrong] or very different from
correct code. Helping to eliminate illegal entry.*-applications: put on back
of any electronic device (computer,
156

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
door handle of car, of specially designed door handle of building*-electronic
guard/lock device*-has multiple
lasers to increase complexity of cracking codes*-Easy to change combination. .
-this function like most other User Behavior Process Functions is such that it
can be difficult for casual outside
observer to see combination being programmed in, as with other combination
locks.
-doesn't require security cards, keys, etc which can be lost or stolen.
-upon gaining access, user has choice of not requiring combination for re-
entry (if their combination) allows
them this privilege. Useful with car and building doors.
.-lock activation, deactivation feature can be turned on when motion sensor
senses an oncoming person (eg:
infra-red sensor in combination with sensors for changes in vibration, sound,
camera image).
-4C020 (sound lock) = 5A-480 (laser lock's old KN #)--the remote control
device to unlock car door exists, yet
may not stop this patent.
For Techies: #1: +access; access: each type access (made) -> database ->uip;
access = r (tr/rc fq); artist: manner
in which Frequency to (gain)access is tr is done in artistic / creative
manner: "compose" sounds / lights / other
Frequency - %(sys's (behavioral) "analyzer"(helps) determine entity (trying to
gain access), according to type
creative work, eg: similar to determining real composers /painters by
characteristics in their work; balance: u
must create/ hear sounds in certain (non perfect) balance; access=bva (sys
seeks certain audio Frequency /
words / rhythms / decibels); c=access; camera: visual analyzer (determines u
(via uip / matching current lens'
input w/ database of u)); cart: c(cart)=access; cart=(magnetic) card / S
W(Soflware) (w u's encrypted codes);
clap; date: access only possible w/in certain times / different times require
differing methods for gaining
access; display: System(s) offers u one or more choices for u's selection from
larger menu -> correct selection
by u -> access; *educ: u learns skills while learning access methods: answers
to history / math / science /
security /organization's (protocol) questions; gps: access only possible w/ in
limited geographical zones / when
u (their portable gps)traveled a limited (path / zone / manner / bar) to the
access(check in) point; k=access,
manner in which elements typed(speed, rhythm, stop and goes); locator:
System(s) finds/follows/studies u
according to u's whereabouts based on what "access" (codes/modes) u used/uses,
eg: u is in north wing of
building because access check points are passed to get in or out of wing; or
user is in sw's 40th database, and in
tern uip on u is developed accordingly.
-Exists: IR? for controlling locks, probably via ultra-sound too(well known).
-M ="ACCESS" (4C-020):M's database matches needed data / code / process / etc
before "access" permitted.
artist=access=m. balance=access=m. bva=access=n. c=access=m'. camera=access=m.
cart=c=access=m.
clap=access=m. composition=access=m. date=access=m. display=access=m.
distancer=access=m.
educ=access=n. gps=access=m. k=access=m. mic=access=m. mo=access=m.
mp=access=m. mq=access=m.
multi-user=access=m. notifier=access=m. *osc=access=m.
pd/locator/pp/pr/ps/r/score/sensor/soundanalyzer/speech/status/*synth/tds/t*/ui
p/uq/visual-analyzer =Access =
MFH. -MIC = ACCESS (4C-020): ACCESS / ARTIST (control images via" speech")/
BVA (certain u's voices
and or vocal patterns, eg: sing particular tune) / C CART (sound database,
sw)/ CLAP /COMPOSITION /
157

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
DATE (w5 of incoming sound)/ S / DISTANCER (u must be at certain distance from
"mic" to activate access.
Space from u to ="sensor" (thermal / distancer / vibration sensor / other
sensor's judging presence of user (s))
"analyzer" -c)/ EDUC / K(control "mic") / M (sound database; sound analyzer) /
MIC / MO /MOUSE / MP /
MQ / MULTI-USER / NOTIFIER / OSC / PP / Q/ R / RC /SCORE / SENSOR /+ SOUND
ANALYZER:
sound database; u's sound=sound analyzer=access (analyzer)=controls designated
function (open gates; permits
u full or partial function w/in some designated System(s) (sw) / SPEECH / SP
TEL / STATUS I STEREO
/SYNTH / TDS / T/ TR / User / UIP / UK / UQ / VISUAL ANALYZER / VR *= MIC
Light Sensor: Senses
changes in light measured by: presence or lack of light, or more precisely the
amount of light; frequency of
light, eg: color; duration and or time in which light was generated. -Flashing
lights. Drawing: access point =
alters in designated patterns / colors = from el light "tr" = c-r = u. Morse
code.
pat search strategy of USPTO bib disk -6/96: (laser* or light*) and (access*
or accesses* or password*)-light
/ laser may need to be of "designated" distance: if two or more light
frequencies are used, System(s) knows
distance of light source, or may know via other "sensor" / methods (where
access renters password at remote
location (ps-zone)).
-Any signals generated by accessor's (laser /light) related)behavior
="access":. Changeable password elements.
"Order & Timing" of: which laser lights are tripped / activated / deactivated
/ altered (its light bent) / w5.
"MANEUVER" = Maneuvering through any of the needed steps / stages necessary to
conclude access
process. The "order &*timing" process are the essentials, what's actually
keyed in at "designated" points being
the subset. Maneuvering through images / computer screens and programs: U
maneuvers through images
on computer's screen, going into deeper layers until they've selected
designated image which is the password.
The manner of u's moving cursor thrbugh the jungle of images, and avoidance of
traps permits access.
Sample "routing" style required of "accessor":1] click on icon of flower -> u
moves an animated character over
to third flower to smell it-> u opens bee hive -> u directs bee to 8th flower
for pollination -> resulting see
planted in planter box #10,303 -> character clicks on 75th apple from tree of
planted seed -> further "access"
hurdles -> "access" provided.2] click on 'deactivate music box' -> however
music box opens ->u plays 29th
song -> song plays while its wording shown -> u must click on designated word
/ phrase / melody (at right time)
->further hurdles -> further "access" hurdles -> "access" provided
+Style of computer's response / terrain in which u must maneuver can be
different / changed according to w5 /
"multi-user":
+-u must know / intuit how to respond / behave.
+-uip: System(s) knows enough about designated correct u to adjust /make hints
/ design path for maneuvering=
so u knows how to maneuver through barriers. Based on uip-tailor, similar to"
generating passwords"=uip-
tailor).+-differences between correct and incorrect maneuvering can be minor
or major, eg: flower smelled is
still the 3rd one but changes from red to pink (while other flowers changed
from pink to red), resulting in
confusion for hacker, eg: changing of designated sofl.ware codes.
158

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Miscellaneous: "maneuvering" is a quick process ("mouse" around)
+ "Change Access Procedure" = Adding on additional steps:
.-scenery / type maneuvering change constantly. Example of "Change Access
Process", and generating
passwords.
+-As in semi "game" / "entertaining" "interaction": each subsequent access
attempt requires the correct addition
to the previously known steps.
+--What new step(s) may be:
--- Errors might be tolerated in each new stage added onto previously known
maneuvering; but next access
attempt requires unto "repeat" previously learned "access procedures". Or may
be accessor decides what each
next stage will be, and simply needs to remember (example of accessor being
the password generator (in
"change access process").
---Sys "hints"= allowing accessor- five attempts at intuiting correct access
procedure.
-- "Repeating" what u did or experienced in past= tied to correct choice(s).
--see: access' repeating section; "artist's" "draw"; "track" ="repeat";
"track" - "ba" = generating "hints" for u's
subsequent steps.
.-external events: time of year; events in world or organization.
."VR": manner in which u moves -> access. See KN (maybe under "vr").
+"Crawler": Automatic maneuvering system: Something is designed to trigger the
maneuvering process (in
event its too cumbersome for accessor). Examples: a software pr activated by
u; cart; clicking of designated
icon (only available at designated locations / times). See "artist's"
"crawler": this has a function of its own (can
be triggered by u/sys).
.-Password needed to activate the automatic maneuvering. User may need to
maneuver part of the course = type
of password, then =automatic maneuvering process.
:"Order & timing": User must created designated images ("artist")in sequence.
-Sequence here is defined as the manner in which each: 1]step/stroke in image
generation is implemented; 2]
sequence in which (total / partial) images are inputted / released by u.
. pat search strategy of USPTO bib disk -6/96: (move or movement or moving or
moves or maneuver*) nearS
(access* or accesses* or password*)-Any signals generated by accessor's
maneuvering behavior ="access".
Changeable password elements. "Order & Timing" of: how accessor must
"maneuver"+ See "maneuvering"
via "game's" character. Manner in which'accessor acts is the needed pattern
for gaining" access". -See "Artist"
_ "Maneuver".
-U= needs to know= where to find what "prompt" seeks= (to have "merged")= for
"access". Where or how to
look (for other element(s) needing to be merged: how to "maneuver" / play
"game" / which files to check.
"MERGE" =
+p Need to merge any multiple files. Namely, accessor merges two or more
elements in designated "order &
timing".
159

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Accessor may need to match (icon or file) (w "mouse" via dragging across s)
any (past occurring and recorded
event's filed signals / element / file / text with something else: Examples:-
Voices: multiple voices somehow
related (by birth, work);typical functions or responses said voice or person
would make, or how they would
respond to any real / imagined scenario(something like a "game" playing).
.-the synergy from a merging = "access" / "artist's" "crawler".
.-the order subset of "order & timing" can be a form of inerging:
. Changeable password elements. "Order & Timing" of: what is "merged" w5.
-see: "Artist's" "Merge"; "Artist's" "Synergy"%
Drawing: "Merging" of Access procedures = C ("Analyzes" if correct parameters
were met) - Access (Offered
/ Denied) = ARTIST () // BEHAVIORAL ANALYZER () // INFRA-RED SENSOR () Il KEYS
() /I LIGHT
SENSOR O11 MERGE Q I/ MOTION MANEUV ERO /1 PS-ZONE O // REPEAT O // SCIENTIFIC
SIGNALS O // SMELL ANALYZER O /I SOUND ANALYZER O // TEL (transmits signals of
password
procedures / CID / "merge" wi other passwords) //TR.ANSMITTER O // VISUAL
ANALYZER O // W5 0 // %
CHANGE ACCESSPROCESS () // HIDE ACCESS PROCESS HINT NOTIFIER //ORDER &
TIMING // PROMPT () // SCORE ().
"MOTION" = Manner of accessor's movement gains access. Motions include:
"exercise", "distancer",
"ps-zone", "dance"-}-, "vibration" analyzers. this overlaps: Access' BA: type
motion= matches needed
behavioral profile_ -
"NOTIFIER" =+ "Access"="Notifier" is a subset of "Seek & React": Legitimate/
Illicit users of (kn)
System(s) cause a "reaction". Reactions include: turning system off/ on;
punishing u (denying them future
access for set time duration or other via other w5 "reaction" mode).
-Notifier functions as an alarm or the "reaction" itself is a notifier
(catching the attention (of security
(personnel)).
-See KN's Tamper Alert: "Nr" activated when anything has been illegally
accessed.
-Accessor= generates password / "access" / behavioral pattern(s)=permit
"designated" "access" / "designated"
~Inr"
"ORDER & TIMING" = When; Time duration: What; in what order access process'
methods were enacted.
Pauses in enactment.
. 6B370: Press keys designated length of time per key:+-"access": must press
key designated length of time.
--or activate code (on and off w/ designated number of pressings. Can expand
to include: certain time each
pressing should be made with needed pause time between pressing).
+ User must know w5 to enter designated data, w/ or w/o (without) prompts.
Entering data in designated
rhythm.
--Eg: hold key 1.5 seconds and wait 3.1 seconds between keystrokes. The order
of KN access modes alters each
month[multiple access procedures].
: Multiple Access Procedures: User required to use one or more access "kn"
procedures.
160

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.-Accessors required to respond quickly: Illegitimate accessor SW (Software)
difficulty in reading I locating
"prompt" -> respond to c sw's prompts fast enough can't gain access, this
makes it more difficult for computer
hackers to gain access when/where (w5*)they are less initiated into sys'
functions; those trying to gain access
(then failing on initial trials) are more closely tagged(2E251 Intelligent
monitor) during any subsequent access
attempts they may attempt. 5G070 Speed Reading Software.
-Patents: 5451934 time delay features * 6B370 Measures time(s) door chime / k
was pressed. Signifies
frequency, etc of those who are not that close who sought contactor entry. -
system additionally might register
all times door was opened if U Pr. Each type of door entry signifies different
type person.
-applications: "Track": was person or employee honest about what occurred,
record keeping, security, evidence
(eg: when something was delivered, when employees came and or left, etc )-
limits u access by amount or type.
"Access" restricted to time(s) of day/year possibly in combination with other
hurdles.
-Accessor= generates "order & timing" related behavioral pattern(s)= permit
"designated" "access".
-Other elements determining timing of access: Gravity from moon or planets
(see astrologers); astrological
charts designating which days are good / bad for any criteria (accessor,
company, love). "Designated" hours,
days (birth dates of known people).
-See: 'Sound analyzer's ='order & timing.
"PROMPT" = What prompts U: to begin access procedure. "Hint" issue-set of
"Prompt".
-any required type signals (from u or sys). Such signals can be "access"
signals (which simply need to be
"repeated" / "edited" again). -Drawing: prompt= accessor generates behavioral
pattern(s)= permit" designated"
"access".
-may need "access" to get to (next) needed "prompt"= then enter access.+
prompts can be disguised: to look
like something other than a prompt, eg: egg / "crawler" / "game" (for
"maneuvering") labeled number five=
inside SW (Software) window number three.
-activate prompt= then it is ready to= accept password.
-"Morning alarm": clues user= should they not know how to "react" or function.
"PS-ZONE" = "PS-Zone" 3EI50 : u must be in limited localities to gainaccess.
US Pat search strategy:
location* near5 (access* or accesses*or accessing or password*)
-US Pat: 5243652 Location-sensitive remote database access control.
-Accessor= generates "motion" / ps-zone behavioral pattern(s)=permit
"designated" "access". Changeable
password elements. "Order & Timing" of: which zones are entered / activatable
w5.
"REPEAT" =<+> Access via Repeating Past Patterns:+l] Repeated action: User
repeats an action they
committed earlier. -Required motions: can be those u made at some previous
task within narrow time
parameter, eg: how they controlled a vehicle; joystick from earlier "game"
they played; replicating
(joystick)motion made by character seen on "S" (nearby).
-U hears something they said during last ("c") session, repeated back to them
when they next gain access. This
existing System(s) shows if there was tampering.
161

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+2] Copying: User sees something and uses it as a cue for the needed access
process. Examples:-Password is
shown on "s", u simply must reverse its order, or ignore last and first three
digits.* Pat search str (strategy):
access* and (repeat* or repetitive). Nothing-comprehensible found.
+ Patent: 5247497 Security systems based on recording unique identifier for
subsequent playback.
Information provided by User to system when they last entered is played back
so User knows if someone else
gained access previously. Assignee: Octel [big co].
--improvements:
-U = This Invention System(s) (Patent: 5247497) - C = ACCESS () // ANALYZER ()
// EDIT () // NR (u
nr when (w5) u didn't check to see what their 'unique identifier' (5247497
type input) was during their last
session, System(s) is of no use if u doesn't check, and best if u checks each
time) // OSC () // PR () // PS-
Zone (sys "tracks" w5 u moved and or what they did(uip, gps) -> plays back
this information when u re-
accesses sys) /I Q () // R() // ROUTER () // SCORE (u's previous score or
"status" or "TDS" (previous
usage) can be a unique identifier(password) - this automation helps the less
creative / lazy u) !/ STATUS () //
TDS O lI TO /I TRACK O // UIP O.
-Pat search strategy - USPTO Bib disk --6/96: (repeating* or repeat*) near5
(access* or accesses* or accessing
or password*)Accessor- generates repeated behavioral pattern(s)=
permit"=designated" "access".
. Changeable password elements. "Order & Timing" of: how accessor should
"repeat" aspects of previous
activity (w5)"Morning alarm": do it to deactivate alarm.
"SCIENTIFIC SIGNALS" a Body signals. Body signals: System(s) gauges bodily
signals unique to individual.
Examples: body's natural electrically generated signals; skin chemistry; heart
beat pattern; heart beat speed (u
works on treadmill to get heart to designated speed = and u sees their rate on
"s" and when achieve, it requests
access at this time.
-Drawing: u = sensor = medical "score" "analyzer" = access.
-Pat search strategy - USPTO Bib disk ---6/96: (signal* near5 body) and
(access* or accesses* or accessing or
password*).
-Accessor= generates scientific pattern(s) = permit "designated" access".
-Animal / Organism monitoring KN must "sense" designated criteria= access (for
animal).
. Changeable password elements. "Order & Timing" of:
scientificsignals."Morning alarm": body signals must
imply (full) wakefulness. User is up to psych up themselves to then= alter
their body signals.
"SCORE" =Limits amount of access. Eg: kids can't watch TV over 30hours/week on
week nights.
B370 Measures time(s) door chime was pressed..
-Scores w5 of person's hacking activity to better enable court prosecutor's
request for stiffer sentencing.
-UIP: 1] Studies if u's actual behavior matches how System(s) thinks u would
behave. 2] Identifies then
"tracks" villains. 3]"Analyzes" contents and restricts accordingly, eg:
limiting programs for children.
-"Edit": Limits functions available based on u's "status" /"score".
-9G220 Channel Scanner Skips Stations Having Commercials:(access/uip
determines what (w5) u needs to
view (access),communications/data that can selected include: t, mo data, a/v
material, db, m access, usage of r
162

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
functions. System(s) blocks: commercials, aspects of data (which are coded as
restricted to certain access coded
u)='Bill"-Accessor- generates "score" pattern(s)= permit "designated" "access"
/ nr.
-"Track": system records who gained access (w5). Each person[or department]
has different code. "track" = ba
= access.
-criteria #A, K: correct rhythm of typing necessary; criteria #B: correct
password needed; criteria #C: (entry)
data must be tr by the second of three people. Access sys's ="analyzer" =
randomly determines which of the
three A/B/C allows access (on a month by month basis for a u by u basis) ->
access procedure for isolated
situation: 2nd u k password (w/o regard to rhythm) -> 2nd u types letters in
certain rhythm.
"SENSOR - MISCELLANEOUS / CHEMICAL" = Chemical "Analyzing" systems / "sensors"
/ probers% that
sense the presence of any designated object w/ "designated" chemical
constitution. Eg: salt; gold; water; any
chemical "Smell Sensor" senses; any chemical compound(s) given in designated
"order &timing".
+ Liquid or solid chemical produced by company and competing w/similar
chemicals sold by others. Eg: bring
your Coca Cola but not Pepsi into exhibit at carnival and get free entry.
Needs good applications if patentable.
+ Applications: -Particular sports shoes (with unique: colors, or chemical
constitutions on portion of shoe).
-Particular sauces: eg, Kikkoman's but not other brands of soy sauce or other
Asian sauces.
-Labels on products w/ designated chemicals. Labels attached to product. Eg:
Floppy disks; "cart".
-Passwords can be built into part of product. Only users of legitimate brands
gain "access". Each product
(model number) may have designated passwords.
-Number of "accesses" might be limited. There would be some counter / "score"
/ wearing off (of chemical) per
usage (for access).
-Additional Applications for giving preferred treatment to user's of one's
products: Access to (free): water;
soda dispensers; physical access to permit entry into a gated area or building
or zone= w/ desired products /
services; "stereo"; "osc"; information; kn function; or anything else that can
be limited /quantified / restricted to
certain people (such as via "access").
-at end or (running) race, only those w/ Nike tennis shoes can get free Coca
Cola, and with this soda, they get
access to next function.
-Electronic system only functions when fed or given such label supplies or
parts. This may fringe on U.S. laws,
hence discounts or other preferences can apply.
-Presence of correct protective clothing, eg: gloves required. See KN's 7G
forms of shielded protection, counter
tops, proper containers, etc.
-Other valuable applications should exist!-Those w/ or w/o excessive radiation
prohibited access.
-7G Indicators KN: any chemical that can be "sought" via "indicator"=
qualifies as a triggering agent for=
"access".
-Exists: bar code readers for "billing"; magnetic strips on flat keys for
"access" and credit cards; microchips
built into keys for "access", eg: on Cadillac cars. -
163

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Patentability: System(s) "seeks" elements not commonly "sought" after for
"access"; access process doesn't
usually require carrying of an extra object, eg: key (since the presence of
(main) element is enough to gain
"access").
. Changeable password elements. "Order & Timing" of: which chemicals are
needed.
. This is a subset of: Access"'Sensor Miscellaneous", and KN's7G Chemical
Indicators = "Seek & React".
"SMELL ANALYZER" =+p 4C190 Smell Lock: Unlocks only in presence of certain
smell, eg; wearing of
cologne. If person's special cologne recipe is secret, this will be a
difficult lock to break, and it will be difficult
to even detect that a smell lock is the type of lock being used. User might
wear colognes unrecognizable to
human noses, in tern fooling observers seeking a way to gain illegal access
into any electronic system, eg:
computers, walkways, safes. Smell lock couples with additional safety
measures, eg: passwords.
+p-some smells are not detectable to human nose, hence wearing such smells,
which are noticeable by "sensor",
increases security. Smells can be masked by combining w/ other smells
(perfumes) not(always) needed for
"access".
: similar and compatible w/ "Sound Lock" Invention in C Directory, 4C210Artist
Access.
-uses existing smell technology-Drawing: perfume -> chemical "sensor" =
analyzer = access.
-Smells generated from: particular candles (scent from wick /elements in wax);
cologne / perfume; hair spray;
other cosmetics; insect repellant; body odor (advanced System(s) identifies
each u's unique body odor); lack of
certain odors (having just taken shower); weather conditions (smells just
after rain), hence "access" limited to
weather conditions (or weather conditions require differing access process).
-different combinations of access processes required for differing days /
situations / type access desired.
-Hazardous situations: access might only be / also be offered only at times of
hazardous chemical release (such
as to escape through controlled doorways). eg: chemical spill / radioactive
release where (air) sensor picks up
on it. Reasons: u doesn't have time to fumble with passwords. Cautions built
against those seeking go gain
access by inducing disasters, eg: accessor is photographed / not allowed out
until security clearance.
-Smell "Analyzer". See 4C190 Smell Lock: Unlocks only in presence of certain
smell, eg; wearing of cologne.
-Pat search strategy - USPTO Bib disk -6/96: (smell* or odor* or cologne* or
perfume*) and (access* or
accesses* or accessing or password*)-Accessor= generates smell pattern(s)=
permit "designated" "access".
-user must blow (via mouth or fan or natural wind) air / cologne in designated
"order & timing". This
patterning process might tolerate drafts or odors in between the blowing /
transmission times (due to less
controllable air flows).
-Needed "changes for access process" can be: using more / less cologne *;
mixing cologne's; not wearing
cologne at "designated" times (w5 access is desired).
-Smell types. Particular kinds of: flowers; foods; spices; mildew or rot from
certain elements; ink (fluids);
elements kept in capsules and (plugged into "sensor"= resulting in less loss
of odor for subsequent usage);
minute odors from woods, plastics, metals, stones; liquids (w/ other
elements); wax; other chemicals; hazardous
chemicals (those mentioned in KN's file 7G).
164

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Smell can be replaced w/ particular types of weather: humidity; atmospheric
pressure; level of ionization;
pollution; altitude; longitude; latitude.
Changeable password elements. "Order & Timing" of: w5 odorsare dispensed.
Odor may only be released when the previous access procedure was conducted=
intern this odor triggers
"order & timing's subsequent needed password.
-Punishment: wrong access procedure can release an odor whichcauses: system
shut down / inability to re-
attempt access (W5)(during set duration) I nr / unbearable odor, eg: skunk's.
-This an other password generations can be utilized for training animals.
--Eg: animal's actions cause an odor= animal then gets food. Poor behavior
from animal causes wrong odor and
no food or electric shock or piercing sound.* Not important! "Morning alarm":
are body odors slightly
different in morning? If so this can be utilized to determine wakefulness.
Applicable to animals being
researched?
"SOUND ANALYZER" = Synthesizer: Password is the setting needed to alter u's
synthesizer: need "synth"
set in designated ways to make sounds audible / comprehensible to (human) ear.
+ 5A500 Sound Lock: Activate lock by emitting special inaudible sounds from
tiny pocket device. +-Key
attached to the sound transmitter.
+-sounds may be inaudible to human ear, lock opens. Helps prevent people or
other's monitoring systems from
knowing a sound lock is being utilized. Access"'Hide". The audible / easily
recordable portion of sound might
not be the sound needed to gainaccess, misleading hackers, while the presence
of this sound functions to let
accessor know the sound mode was activated (w/in certain time period from when
important sound was
transmitted by'osc).
--there are frequencies which cannot be easily recorded by equipment (illegal
copies of sounds for unlocking).
Its more difficult to copy and or know about copying if the transmitter sends
sound in frequencies not audible
by human ear-the volume might be set at certain level, to further complicate
accurate copying / needed access
procedures.
-changeable password elements. "Order & Timing" of designated: sounds; pauses;
volume; pitch; bass; w5
sounds emitted.
-others nearby may not know how the lock is opened, adding tosecurity.
-4E020 Content & Date Verifier: of (any said) occurrences, eg:"tracks"
occurrences; "analyzes" occurrences
(for uip)"Speech": voice recognizing System(s) seeks certain sounds "sa".
-Patents: 5450524 Password verification system based on a difference of scores
("scores") of type sounds (SA);
5499318audible uttering and timing of uttering.
-type sound(s). Different: regional accents; languages; person's voice; any
other sound distinguishable from
other sounds such as by their frequency, duration, pattern, volume, pitch,
distance from microphone.
165

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Pat search strategy - USPTO Bib disk -6196: (verbal* or sound* or music* or
audi* or voice) nearl5
(access*or accesses* or accessing or password*).-US Patents: 5517558 Voice-
controlled account access.
5426450Hands-free hardware keyboard. 550303 Accessing information
-AT&T 5335313 Voice-actuated, speaker-dependent control system for hospital
bed. 5309504.
-sounds can be used to create "artist's" images -> gain "access": Manner of
sound generation (by u) determines
type image. Accessor= generates sound pattern(s)= permit "designated"
"access".
. Changeable password elements. "Order & Timing" of: w5 sounds are emitted.
-"Morning alarm": UIP-DB stores the sound types of user when they are wakeful
= this database compared
against= those vocal sounds emitted by user in morning. User needs to bring
themselves to wakefulness = to
reach the "designated" "mood" in user's voice= as "analyzed" by "sound
analyzer".
"TEL" = also see file: Parts-Telecommunications for further explanations parts
codes used. Eg: for telephony,
information highway related applications of "access".
."CID": can only gain access from designate tel numbers. If caller not from
designated tel #: User designated
as suspicious. Access is limited, eg: by time parameters; subject matter;
additional passwords needed.
System(s) calls back u on the tel # u should be calling from, and expects a
busy signal. Access may select not
to even answer / respond fully to calls from unknown tel numbers.
-Pat 5280581 System(s) calls back accessor.% Misc: 3E040 3E041 Telephone Noise
Canceler: (sound sources
identified by their tr (access/uip code transmitted) are processed/handled
differently as pr; system better hones
into/away sounds w/ or w/o such tagging transmitters)-3GO10 T Ring Delayer:
(only for calls coming from
particular CID)-4E020 Registered Electronic Media Communication:
(]](registered) material is "analyzed" for
uip/key words and this analyzed material is then = tagged (uip) = intern such
tagging helps in matching
whatever (u who is being evaluated (for their access/uip) w/ the (registered)
material. 2] "Analysis" helps
control/guide the 2E251 Intelligent Monitor.)-"Morning alarm": user's port
connects to "mainframe" computer.
"TRANSMITTER" = Transmitter from u (as u walks by "sensor");Magnetic Device.
. R127 [ Commuter's train ticket credit card: circuit emits frequency read by
device in ticket gate. JR (Japan
Railway) ]. Also copied to "Access", "PS", "Score", "Track".
Magnetic Device: The presence of a magnet touching, or not touching within a
few mm or cm, activates and
or deactivates. Differing type magnets or other devices emitting other
electrical forces give different commands
according to the activator. An activator may have the ability to transmit one
or more different type signals.
Accessor must exert designated strength, eg: type magnet and or distance
they're placed from" sensor's"
magnet. Changing distance ("distancer") creates needed patterns = Access'
"order & timing".
.-copied from IMI&8 "R" part.
-Accessor's (portable) magnet / object may also need to meet following
parameters by having/being: a size (fits
into slot);include a microchip with built in password; (standard) key;
attached to another kn (invention)
password generating device. "Transmitter"= Accessor's "Key".
-Drawing: similar or opposite magnets = "sensor" = "scores" degree of pulling
or pushing = access.
166

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Radiation: radiation needed to gain access. Values: such key can't easily get
taken out of building / area since
it needs to be housed in a large enough lead container readily noticed, plus
security at entrance checks / scans
all packages / people.
--Drawing: mild radiation = Geiger counter "sensor" = access.
-Pat search strategy - USPTO Bib disk -6/96: magnet* near9 (access* or
accesses* or accessing or password*
orverif*) and (computer* or electr* or software*)4C020 Transmission Lock: * <1
(good argument), 1, 4, 4>
Activate lock via any type of transmission. The exact frequency and the
combinations of on and off activate the
desired functions. Combinations can lock or unlock, turn on lights, call
security. Example frequencies: light,
sound, or any other airwave.
-activation via vibration(s) - the level of vibration (impact /movement) and
or the code determine "access". The
'code' is determined by: time period of each vibration mode / time period
between each mode / level of
vibration intensity / number and type of modes / in combination with other
factors, eg: other "fq"(sound/light) /
key / combination / password / other "access" entry factor. -the more
different factors, the more difficult to gain
entry /crack the code (for "access") / "access".
-(instead of magnetic...) any frequencies which cannot be easily recorded by
equipment (illegal copies of sounds
for unlocking) -its more difficult to copy and or know about copying if the
transmitter sends sound in
frequencies not audible by human ear-the volume might be set at certain level,
to further complicate accurate
copying-transmission can be of any other electromagnetic airwaves Laser Lock:
Activated by tripping laser
lights. <3> 21 4C020 <- 5A-48Q-042004. Laser lock details found in "access"
main file.
-Accessor= generates transmitter signal pattern(s)= permit" designated"
"access".
. Changeable password elements. "Order & Timing" of: w5transmissions are
transmitted.
"TRAP" =+"Maneuver" ="Traps" (Punishment for having wrong password): Trap
types: images beckoning
("prompts") accessors yet results in: -deactivation of desired function. This
part in this way might not be used.
-gives enough information / acts (almost) like how the hacker may think
System(s) should work.+ Booby Traps:
fools "accessor" into believing they gained access: initial password typed in
(whether correct or not)results in
System(s) stating /implying such was correct answer:-yet u trips up on some
later step (while falsely thinking
they have one of the correct passwords).
-sys "tracks" (compiles enough information on hacker) to punish them: identify
hacker (who or where they are /
W5 they access);"notify" security; ba on hacker to better catch them upon any
subsequent attempts they may
commit in hacking.+ "Bluffing" - leading accessors on: some sensitive
information may need to be given to
continue fooling hacker into believing they've not been identified as a
hacker. Depending on the level of access
system's sophistication= the "designation" between sensitive and non-sensitive
and "trapping" information
given=wifl better allow access System(s) to accomplish its aims: "trap"
accessor; stop reattempts at hacking.
-Files used for "bluffing": "designated" files need to be triggered to open
when hackers are deemed present.
These files must be accessible in a realistic manner, eg: u keys in
(again)(same) password. Files for "bluffing"
may be altered from the real ones via: "editing" / search and replace / manual
alteration.
167

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--they hopefully don't contain (enough) information for accessor to figure out
how to (W5): gain access and not
be considered a hacker; learn about "bluffing's" presence / characteristics;
commit sabotage against anyone or
thing, even if its not sensitive to owner of the system being hacked.
-keeping hacker from thinking they're being led on: any foolish(password)
action by accessor can't necessarily
be tolerated.
. Types of "trapping" information or elements given to accessor: tel numbers
for accessors to call= which have
CID (requirement to gain access)= then identify hacker; other sources or
places hacker can visit (by "computer"
w/ their CID) (on W W W).
-sw (with computer viruses (that might best be deactivated by controller of
access gate way), hacker contacting
this human controller can give way to identifying who hacker is (if hacker is
unaware the virus is actually a
booby trap). Accessed system/ Virus can have information / contact points to
disable it.
-hacker's system is labeled for all future "interfacing" with other computers,
so other systems know hacker's
system was once used by a hacker.
--Eg: 1] hacker's CID tel number is registered in <black list>tel number db.
This is an example of how booby
trapping occurs w/o (without) hacker's awareness. 2] portion of SW (Software)
or hw is (permanently /secretly)
"edited". Such as portions used for helping computer System(s) to: identify
itself; gain access; use modem;
"interact" with new data / SW (Software) (on internet / m).Misc: identifying -
> "tracking" = hackers / nr /
"trapping" hackers.
-value: fear of (further) punishment helps ward off hacker's subsequent
hacking attempts; legitimate u w/o
correct access procedure are (more) forced to speak w/ their supervisors
(before damage is done in some
manner (releasing of sensitive information; damage to system or what it is
effecting (by incorrect usage)).+
Hacker's or their colleagues' subsequent attempts at hacking:-"track" ="ba"
are more on the look out for similar
accessors again. Chances are likely hacker's have some common behavioral
pattern (UIP)= that is common in
each access (attempt).
--if UIP-DB on hacker's behavior is lacking= System(s) may continue to allow
hacker to be fooled into
believing they're gaining access=while UIP builds up its db on hacker(s).Other
"traps" and punishments: Any
other known way of "restricting" / punishing human hackers / equipment used by
hackers, w/ or w/o hacker's
knowledge.
-See patent database: Key Words - (password* or access or accesses or
accessing) and (track* or punish* or
trap* or fool*).+ Building a better defense against hackers: UIP on likely
hackers: develops db=ba (what
behaviors to seek)against future (different) hackers. Learns what is more
sensitive and sought after by hackers,
intern requiring extra defenses. In other words: Access"'anaiyzer" identifying
weaknesses in their defenses (so
System(s) can (automatically) repair itself).
. Drawing: "Trap" = C ("Booby Traps" appear in below listed parts /below parts
are used to beckon hackers /
the parts are uip-tailored to beckon hackers) - Access =ARTIST () //
BEHAVIORAL ANALYZER () //
INFRA-RED SENSOR () // KEYS () // LIGHT SENSOR () // MERGE () // MOTION () //
MANEUVER() /I
PS-ZONE () /J REPEAT () // SCIENTIFIC SIGNALS () // SMELLANALYZER () /I SOUND
ANALYZER ()
168

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
/I TEL O /I TRANSMITTER O /NISUAL ANALYZER CHANGE ACCESS PROCESS HIDE
ACCESSPROCESS HINT NOTIFIER () f! ORDER & TIMING Q//PROMPT () // SCORE
(Accessor
made to believe they had a high enough score or "status").
"BA": level of crime or damage conducted by hacker= according to("analyzer")=
results in a corresponding
level of punishment= to hacker. Mirror: accessor is (partially) allowed to see
themselves as access controller
sees them. System= next analyzes how accessor changes its behavior / access
process. Those changes are more
carefully "analyzed" for what accessor might be trying to camouflage about
themselves, eg: their bad traits=
that system is trying to "track".
."Tracking" hacker= after they've been identified:-"Tags" are placed in the
material hacker downloads. As this
material is moved ("routed") around (their / main system / W W W)="track"
follows it= to: others collaborating
w/ hacker / hacker's whereabouts / better understand hacker's behavior.
"Guides"= "hackers"= into their
"designated"= "trap". Morning Alarm: if user turns off system / deactivates
alarm * in/on-authorized manner=
punishments can include: loss of files /other functions alarm System(s) is
tied to. See information on other
ways user is punished / motivated= so they get into and stay in a state of
wakefulness.
"VISUAL ANALYZER" = fingerprints; face; pictures. This part is very related
to: Access"'artist",
and "image" input for gaining access.+ Eye blinking: pattern of blinking ->
codes. Possibly only for unique
eyes of each person (iris). Blinks Morse codes. Another example of body
movement gaining access.
--needed eye color can be achieved by wearing colored contact lenses.+
Accessor must wear/present particular
(coordinated) colors for access (entry, usage). Other "artist's" "image"
examples: company logo emblazoned on
attire; picture ID clipped on shirt. These are examples of needed "images" /
visual "coordination" needed for
access via va.
-see "Artist's" R24-1 Image Coordinating Software-Fingerprints. Also:
Different genetic fingerprints = typed
/scanned in; photographs (faces, bar codes, scenery). Lines also from: palm
and any other body part.
-"Visual Analyzer" for externally shown 3-dimensional objects: U's unique
face; any picture or object they =
show "camera". Objects might need to be turned / angled up to 360 degrees (at
designated speed, such as by
putting it on a speed set turntable).
-"Visual Analyzer" for images on flat / 3-D surface: -Image generation:
("Printer") prints a different image
each time, based on its changing password creation System(s) = images scanned
= c= access. --Multiple
sources generating password: User might also be asked to make all / part of
the image generation, so image's
output effected by the symbiotic help of each source. The geometric effect SW
(Software) may have on each
source's input on each other causes a result nearly incomprehensible from what
any one source entered -
increasing difficulty in identifying each source's input.
---Drawing: each source (c (password generator sw) / u) = enters images/ data
/ S W(Software) / etc =
"analyzer" = c integrates inputted elements -alters according to source(s) / c
integrator = final password
developed (double checked for accuracy / functionality / security clearances) -
> password given / printed /
stated / tr to other.
-Previously generated / used passwords need designated alteration("editing")
for subsequent access.
169

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Images include: bar codes; abstract designs / paintings; single or multi-
color; coloring in shades / solid blocks
or (tiny) dots as in periodicals' full color printings.R174 Computer ("C")
checks person's fingerprint before
allowing" access" 2 Aug 93 NK-moved to "access" 6.96R195 Fingerprint operated
entry system. 25 Jan 93
NK-moved to "access" 6.962E251 Remote Controlled Camera: (sys monitors people
according to their
access/uip (code)).5G061 Dyslexia Software: (speed at which info given
determinedly u's access: either u gets
info faster (inhibits uninitiated computer hackers) / SW (Software) slows down
when c/security guards need
more time to "analyze" the "access" level of u (who is being questioned (by
c); 5G070 Speed Reading
Software)--form in which u sends / receives. Pat search strategy - USPTO Bib
disk -6/96: (photo* or finger* or
(bar near2 cod) or image* or imaging* or vision* or visual* or pictur* or (bar
near2 code)) near9 (access*or
accesses* or accessing or password* or verif*) and (computer*or electr* or
software*)Accessor= generates
image pattem(s)= permit "designated""access". Changeable password elements.
"Order & Timing" of: w5
images given.
. see: + "Visual analyzer", and "Artist" = "VA". Other "artist's" "images"
needed for gaining access:. any
product of nature with its visual characteristics. System(s) can require
characteristic common to the species or
scientific category of product, eg: any cat's hand or piece of gold, or be
more particular eg: front right paw of
specific cat, or 22 carat gold in "designated" shape. Seeks: color, texture,
(overall)weight) of objects. Access
requirements alter according to reasonable criteria, eg: plants change their
condition (dormancy)at certain times
of year; hands are colder in winter (eg: for infra-red "sensor"); % since
there are no Oak trees in Hawaii, leaves
must be flown in and hence will lose some of their color in the interim.
Objects can be placed in certain
manner by (non- visual analyzer) "sensor". Examples: -people: any body part.
-animals: any body part.
-plants: any body part: leaves (their veins, outer shape, color(changes by
time of year access sought),
branches*-organisms: any type cell or "scientific signal" they generate. -
-chemicals: needed formulae: percentages of differing chemicals/ (total)
quantity of any parts. Access =
chemical content"analyzer".
"W5" = Access at right time: designated temperature, weather, certain news in
mass media, when
another "designated" u also has "access". See Access's "Order & Timing"
subset.
-Accessor= generates W5 behavioral pattern(s)= permit" designated" "access".
CONCLUDES THIS ACCESS-IMI FILE (Parts)
File: Access \ Ac-Image
File: Ac-Image. Image Input Access System.
. $$$P 4E-030 Image Input "Access" System:
The user or one who wishes to gain access into a system must make certain
pictures to gain access. The
accessor must create an image with a computer mouse, or via other means; which
must match the diagram in the
computer's memory. This image acts like a password.
170

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-The system has a designated tolerance for images that differ from the one in
its memory; the accessor may
draw the picture in a somewhat different manner each time. This form of
tolerance can for example seek a
square or triangle of any approximate size.
-The'image permits'access to any privilege described in the "access" part.
Applications include: (de)activate alarm; additional verification of u (user)
(person trying to gain access (via
matching images / uip-ba (signature analysis N))); slows down u (user) whom
sys suspects are hackers /
villains; gain access into~: entry way; use of product (c, some el
(electronic) sys); use of game; higher levels of
usage within sys; banking: electronic funds transfer; gaining access into
building or C.
. Image types needed for access:
-straight lines connected at angles; (u)closed shapes drawn with lines, eg:
circles, triangles, squares, rectangles,
pentagons, hexagrams, polygrams...; (lines of) dots at designated locations
(on S).
-the type'image required often will be those for which the 'system's 'analyzer
can build a reasonable tolerance
for differentiation [should such'images be inputted by the accessor's hand and
not via other means like a
picture, thumbprint, etc].
-make similar or related or unique picture, system may give (prompts) ideas
for picture, eg: ones which instill
the idea of waking up like running to catch bus.
-type diagram examples: additional add on elements are made to previous
diagrams - to better assist user in
remembering needed diagrams; diagrams can be from sets of things such as
vehicles (first car, next bus, next
airplane), or shapes of provinces or states, or words (middle names of one's
family); zig zag lines, eg: spider's
web or child's drawings (required length of (straight) lines with certain
angles needed at points lines bend /
intersect.
+-Altering type images / methods / mannerisms needed to gain access, in order
to avoid hackers getting a non-
changing password type image or method. Sys determines (from hacker's point of
view) haphazardly w5
needed images are changed (according to circumstances).
--For Techies: Drawing: User = This N (invention) Sys (what helps in the
determination ("analyzer") for type
images needed =% type images given (entered); type prompts and or other
challenges can be more difficult to
/
hack / crack depending on, eg: circumstances (see Features following) /
perceived security risk (type u (user)
type application sought by U)) - c (computer) =
ACCESS ; AP (type application of N); A RTIST (if "artist" type N (invention)
is connected to main N; u's
drawing ability (uip, score)); ba ('behavior analyzer) ; CART (entered into
sys by u); EDIT (analyzing
inputted images by u); EDUC (if sys needs to teach u); K (keyboard) (if only
keyboard is
available/functioning, then available images are reduced; or entire sys can
shut down in this case due to higher
security risks); MOUSE & R (remote control) & K (keyboard) & Tilt & T-
bandwidth (type mouse being used,
its limitations being taken into account); MULTI-USER ; PR (software program)
; ROUTER (where on
information highway / web u (user) came in from); SCORE (u's previous
performance); SPEECH (sound
analyzer); STATUS ; tds (time date stamper) (occurrence of past / current
activity of u); TILT ; TRACK ;
171

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
User (who they are); UIP ; UQ (type questions u asked I errors they made,
helps create a perceived security
risk of U).
+-3D: User may need to enter / create I respond to 3-D images (onto
"interactive" "S"). "VR".
--user may need to 'interaot with the 3D image, such as knowing where in the
3D maze or terrain the "secret
door" or "key" or that day's password is located.
---accessor may need the first password to get into the terrain.
---too many errors in seeking to locate access in this terrain invalidate that
user's first password.
-Color: the color shown on S (screen) may change, even though the color code
used (via K) is the same.
Purpose: fool hackers sharing information with each other of getting data from
their notes which mention
which colors are used/needed/responded to / altered W5.
-Size: simply change size w (with) (most) other aspects of image remaining the
same.
-U / Sys may know / suggest when (w5) needed images are to be changed.
-Drawing: u (user) = K (keyboard) = visual analyzer = access (analyzer, score
(security risk)).
. Prompting may simply help u remember nature of desired image, w/o (without)
giving all data on the
images. ,
.-U knows additional 11 subject matter and or 2] manner in which depicted
subject is to be drawn. Eg: prompt
states 'citrus' = u (user) via #1 recalls its an orange (not the tree or
leaf), via #2 that the image should be drawn
with thin or thick lines (caused by pressure level / manner of stylus/R.
(5E020)) and whether the fruit should be
filled in with shading / various colors or just the outline to be drawn.
-Prompts: For Techies: Drawing: User = This N (invention) Sys (type prompts
given u determined via) - c
(computer) =
ACCESS ; ANALYZER ; CART ('software cartridge) ; EDUC ; mth (mainframe hookup)
; MULTI-USER ;
PR (software program) ; PS-Zone ; Q (asks questions) ; SCORE (u previous
performance / prompts during
previous sessions); %SOUND ANALYZER ; STATUS ; TDS (time of day, length or
level of security
clearance for designated type access/task); UIP ; VISUAL ANALYZER.
-Perhaps only the entity seeking "access" knows what to write (clues/prompts
may help a computer hacker).
-very similar to 4C210
.-compliments other "access" features~: u's finger print or eye ball image
scanning->c (correlates against
memory); cart; password; 'transmitter worn by u (user) (user) (seeking
entrance).
-use system to "score" u's behavior/ability: uip; bva (this is part of bva);
u's ability for specific tasks, roughly
replicating any existing psychological/*sociological testing system (on paper)
which studies u's behavior;
"visual analyzer".
--done via help of "visual analyzer" (of images made by u to gain access, or
during work session on C), "uip-
ba".
-D 1: u=(stylus/finger)=s (touch screen)=c-access = osc/printer/m/cart
-copied to better N (invention) file 1.95
-ForTechies: access; "morning": deactivates alarm upon u's correct input
(level of similarity controlled by pr).
172

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.-uses any existing electronic "analyzers" which analyze human signatures /
images. Also see listed patent
numbers. US Patent office is working on a visual analyzing system for their
patent database.
. PATENTS:
-Patent search strategy: #1: securit* and (signature* or draw or draws or
drawing or (image* near5 creat*)).
#2: (security or (gain adj access) and password*
KW: access
-US Patent Numbers: 5319797 5222138 4903991 4908861 4991205 + 5111512 Method
for signature
verification - 1992 patent. Access is given with correct signature.
4850018 4869946 4758718 4799258 4816653 4851937 4876717 4326098 4023139
-especially patents listed / related to "visual analyzer" and "access"; and to
some degree "ba" versus patents of
other Features for this KN.
Claims include: helps solve the problem that people's signatures are often
commonly available.
-the needed diagrams can change over time and or after designated number of
usages.
+ Generating images via: "C" "mouse"; 5E020; c (computer) input tablet using
stylus or finger or other stick;
"Artist"; R; % "Sound to Visual Converter"; manner in which one walks about
near the motion "sensor"
"access".
-UIP / BA: these are also used in determining whether access is permitted. Sys
"analyzes" past and current
images generated by User and studies them via U1P-BA or U S Pat No 5111512 in
judging how close /
dissimilar the recently entered images / signals are from needed criterion.
+ "Artist": all the (existing) diverse ways one can input / alter / "edit" the
images / drawings, which
were generated / started by person (u, one seeking "access") or sys (via its
prompts) can be utilized.
-Additional examples:
-Patent search for this "artist" sub-section: (artist* or draw* or (creat*
near3 image*) or (creat* near3
picture*)). KW: create can be replaced w: alter, design, edit, make, develop)
. For Techies: Drawing: User = This N (invention) Sys ("Access" gained /
effected / "analyzed" based
on functions for any of following) -- c (computer) -IJ010 Body Movement NR:
-3E150 PS-Zone:
-3G010 T (tel) Ring Delayer: ("analyzes" w5 u (user) answers the tel, eg: if u
is often not answering for some
time, then maybe u is somewhere too far from where they should be, or is busy
w (with) something else, or is
poor employee (lazy))
-4E010 Alternator: (sys must have designated level of)
-5E020 Remote Control Stick: (generates images, eg: abstract versions of
C=stylus)
-5G061 Dyslexia SW:
-7G050 PVC Notifiers: (presence of certain chemicals (also) needed for
"access")
: 7G052 Flexed Level Notifier:
For'1'echies: Drawing: User / Other Sys = This N Sys (Access: (Type) input to
gain access) - c (computer) 173

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
PS - R (remote control) - Tilt:
Remote Control
PS
Access
SW
Exercise
Analyzers
Indicators
-Sensors: hazards, novelties, monitoring of events: designated chemical needs
to be: inserted, / placed into/onto
sys; causing nr ('notifier) to change.
3E152 Positional Image Generator: Changes in position of moving objects are
registered by system
which intern generates an image or "track" for said changes -> when such
images match "access's" criteria,
"access" is granted. In other words their pattern of movement via zones / tilt
generates a pattern as perceived by
"sensor" -> C. Moving or stationary images are generated by location of
elements in subject that can generate
signals in "Visual Analyzer".
-position of each element generated by: 1] light / color / heat generated from
portion / all of targeted object. /
2] tr (transmits) (transmitters (on surface / appendages / inside) targeted
object. / 3] "distancer". / 4] locator:
KN (invention) finds objects.
-Drawing: signals coming from (moving/stationary) object(s) = "analyzer" =
image generator / "track" (score,
intelligent monitor 2E25 1, uip-db development).
-this part is similar to many other sub-Features.
Password/"score" needed so= image generation is in= desired color= to gain
access.
-1 C310 Software Multi-color Adventure Pen: The device decides when to change
color into another matching
color. In pen or software format.
US Patent Search Str:
(access or accesses or accessing) and/adj15 ((gain adj9 access*) or enter* or
password*'or secur* or protect or
authoriz*
-US Patents: 5491752 Increases difficulty of password guessing attacks.
--Pat search str: Worked w/ US Pat Database ' Bib' 4.96 Disk.
. Encrypted: encrypted with state of the art.
-u's activities: access processes, files, etc.
-password systems / pr, or the fact that one exists.
-Miscellaneous: "Track", "Score", "UIP" (uip-db)
-password itself encrypted = and only decrypted by access point's "analyzer" =
to determine if access permitted.
174

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+ See "Artist" image generating modes: any of these can create the necessary
image(s) / processes to
gain "access".
US Pat 5486122 Autonomous wearable computing device and method of artistic
expression using "game":
Educational devices using process-oriented educational methods are disclosed
to prepare children for
keyboarding. The device include sets of gloves and indicia applied to fingers
of gloves to provide pictorial
representations of the keyboard.
Accessor selects "images" that are "edited" as "designated"; or "edits" them=
then gains "access".
-Same "edited" form can't be used more than twice in a row.
='images" undergo ongoing "editing"= accessor needs to know at
which point in the evolutionary process= access is viable.
. Hypervideo (exists): users click on (moving) images/'icons, and get 'routed
video clips / information
('tailored to their needs). Object Tracking software (exists) make (moving)
images clickable.
--Access applications: user must know in what chain or 'order & timing, in
which they need to click images, as
[they] 'route themselves in the program to gain access. Clickable 'images can
change [in 'tailored fashion], eg:
user only clicks on what they recognize, eg: faces of people / objects they
are [intimately] familiar with, or
which have some [semi]-logical reason to be clicked on, eg: story line [based
on user's 'ba].
END File: Ac-Image
File: Access \ Ac-Pat Sch&
ACCESS PATENTS AND PATENT SEARCHES
Key words for patent search strategies: access*, computer*, entry, (gain* or
keyless) adj3 (access* or entry),
password*, interactiv*
:-toy*, fun, play*, child*, kid*, image*, imaging, create, creating
-str: (achiev* or obtain* or accomplish* or get [or gets or getting] or gain*
or keyless) adj3 (access* or entry)
-str: password* and (access* or entry)
-str: security* and access*
-str: (draw* or create or creating) adj9 (access or accessing)
-US Patent 5368308: Stream of recorded sounds broken into segments then re-
ordered = needed to gain
"access".
12.95 Bib Disk US Patents = Access: Search strategy on USPTO's Bibliography CD
dated 9.94: password -
many related N, only scanned the list, eg: 5323465 Access control; 5289540
Computer file protection system;
175

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
5276314 Identity verification system resistant to compromise by observation of
it use; 5206905; 5115508;
5111185%; 5097506.
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry
system into car 5319364
507402 ="c" 5450524 5206905
. Improvement on patents:
Sub-Parts:
-Access-Restrict: Different u have differing levels of access to full range of
inforrnation / functions =(based on
their password).
.-Access-Track: follows target upon entering (mode) (until which time the one
accessing is deemed a low
security risk.
-Imi Part'Burglar, is subset of'Access.
Pat search str: password* US Pat Numbers about sys generating passwords (pat
search str: password adj15
generat*): 5513263 5509070 5491752 5469564 +5442342 5428349 5416840 5365574
-+ Main at search strategy for all of "Access": (access* or accesses* or
accessing or password* or verifl") and
(computer* or electr* or software*)
File: Access \ Ac-Pa
ACCESS PATENTS AND PATENT SEARCHES
-kw (key words for search): access*, computer*, entry, (gain* or keyless) adj3
(access* or entry),
password*, interactiv*
.--toy*, fun, play*, child*, kid*, image*, imaging, create, creating
-str: (achiev* or obtain* or accomplish* or get [or gets or getting1 or gain*
or keyless) adj3 (access* or entry)
-str: password* and (access* or entry)
-str: security* and access*
-str: (draw* or create or creating) adj9 (access or accessing)
-US Patent 5368308: Stream of recorded sounds broken into segments then re-
ordered = needed to gain
"access".
12.95 Bib Disk US Patents = Access:
-Search strategy on USPTO's Bibliography CD dated 9.94: password - many
related N, only scanned the list,
eg: 5323465 Access control; 5289540 Computer file protection system; 5276314
Identity verification system
resistant to compromise by observation of it use; 5206905; 5115508; 5111185%;
5097506.
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry
system into car 5319364
507402 = "c" 5450524 5206905
. Improvement on patents:
176

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Sub-Features: Access-Restrict: Different u(user) have differing levels of
access to full range of information /
functions =(based on their password). * Access-Track: follows target upon
entering (mode) (until which time
the one accessing is deemed a low security risk. lmi Part'Burglar, is subset
of'Access.
Pat search str: password*
-US PatNumbers about sys generating passwords (pat search str: password adj15
generat*): 5513263 5509070
5491752 5469564 +5442342 5428349 5416840 5365574
+ Main at search strategy for all of "Access": (access* or accesses* or
accessing or password* or verif*) and
(computer* or electr* or soft.ware*)
File: Access \ Ac&
ACCESS' Miscellaneous information: File k\ac&
Miscellaneous forms of actions permitting "access":
-Forms of motion by U. See KN's Yamaha Miburi and related KN.
-Form of User causing "vibration".
-Way something is assembled or taken apart: 3A205 Tamperer Alert. Rubrics
cube.
-Motion access procedures: Correct movement of hand or joystick. Motion type
41 -> motion type #2.... ->
access. See KN's Miburi from Yamaha and related KN.
-Vibration Sensor: Senses vibration, eg: if person is walking or sitting on
sensor; or senses vibration signals
coming from elsewhere.
Miscellaneous: includes known (c) systems which restrict "access" of people /
other systems to: use,
work w (with) particular el (electronic) N.
General Diagram for "Access":
. D 1: 1 UK (user at keyboard) = 2 C('computer) = 3 tr (transmits) = 4 M/5
function. D 1's For Techies:
Details-
+1: Passwording: gain access via keying in alpha-numeric combination; key
insertion; via remote ("R",
password tr (transmits) from R); fingerprints, passwords, key cards, uip,
another C('computer) (their sw), clap*
25: access can be changed via pp, mp, cart, u (user) with higher (overriding
access, eg: supervisor, C
('computer) sys itself); character; 24 tds (time date stamper) (scores w5:
when, *how, *what, o0owhy, who
gained "access" into system - [may also be used for uip [database], 4E020
Content & Date Verifier); 25 "S";
23 %distancer activates/deactivates lock; 123 access lock can be a physical
(lock & key) / (programmable C
('computer) chip) card key / software barrier = (who can "access" 4E020
Content & Date Verifier / 2E251
Intelligent Monitor); 245 "C", 4E020 Content 8a Date Verifier, 2E251
Intelligent Monitor; 245 %interactive
(activates/deactivates access, 2E251).
13: signals for activation/deactivation of access can be received and or
activated via: microphone ("mic")
(sound signals activate/deactivate access/2E251); tel ("T"); mo; tr; %fs
(correct image eg: signature); remote
177

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
2: *tilt (2E251 activated by N's movement); *distancer (eg: clapper); 245 mp;
24 mq (machine asks user
questions) (prior to activation/deactivation; for uip database upgrade); 24
multi-user (individual requires own
password or other activator/deactivator to gain access); 245* notifier (who,
what, when, %where, why gained
access, and or is using system); 25 OSC (outgoing sound communicator) (if
password or other activator /
deactivator effected desired function, eg: gained access); 24 * uip (access
draws on pi's database to mq
(machine asks user questions) prior to allowing user access to user; 24
questions for access change according to
user's uip (mq an action user made on system in one of [important] previous
activities); 24 pp; 24%score
(2E251).
2 the necessity for the access feature is normally trivial, but assists in
marketing, and helps organize differences
between multi-user; uip.
I the type code used in the password (a series of sounds, lights, letter or
number combinations, etc) activates
and or deactivates the corresponding function reserved for individuals
equipped with the password.
24tds of user's past access is used develop his uip. Excessive or insufficient
usage can exclude him the uses
from some/all functions, trigger "notifier", and inform the user's supervisor
via tel ("T"), mo, e-mail.
24 the type of uq can consequently (according to system's uip, mp, pp)
affect/control the type of
password/manner needed to activate/deactivate; 5 speaker.
. For Techies: drawing This invention Part (Access) _
-E020 Remote Control Stick with Switch: (functions of any R (remote control)
controlled by access/uip)
-5E080 System self analyzes best synthesis for acoustics of room/hall:
(matches uip/access of u; u (user) may
not hear/read certain OSC (outgoing sound communicator) (sounds/data))
-5E090 Wireless Music Band: (access limits usage of certain portable el
(electronic) N)
-7G050 & 7G051 PVC Perforation Alerter & 7G052 Flexed Level Notifier: (type
access determines: type of
pvc needed (for extra/less protection: to save money/trouble); which types of
occurrences (chemical contact,
perforations) need nr ('notifier) to u/sys/monitor)
. "ACCESS": (4E030 Image Input Access Sys):
For Techies: D: User = This invention Sys (access: such actions (gain)
"access") - C('computer) -
-1J010 Body MovementNR; Yamaha Miburi.
-1J080 Ice NR: 7G (colors must change) = visual analyzer (c) = access
-2E010 20 30 40 50 Recipe Softwares: u (user) must request / read via sw
('software) certain recipes =(track) _
gains access
-3E010 Mobile Tel Location Notifier: nr ('notifier) functions only for those w
(with) "access"; u must be in
designated zone (at certain radius) prior to "access"
-3E020 GPS Record Keeper:
-3 E 150 "PS-Zone":
-3E210 Indoor GPS Extender:
178

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-4E030 Image Input Access Sys:
-5E020 Magic Wand: KN
-3G010 Tel Ring Delayer: KN
-3E060 Interactive Morning Alarm: KN: answer / ask right Q (asks questions) =
access
-3E061 Body Motion Instructor: "educ" teaches u (user) how to move = future
access.
-4E020 Registrar: uip of u (user) must match db ('database) = then access
-5G061 Dyslexia SW: "edit" changes according to u's type access
-5G070 Speed Reading SW: u's reading speed must match = speed designated by =
access.
See 'Sound analyzer for: R54-1 Voice Recognizer Differentiates Between
Multiple Speakers-
ACCESS = Passing of tests 'scored for level of accuracy.
-Forms of access: Access is achieved when the system 'receives the right
electronic signals such as: in the
correct 'order & timing, and duration of correct signal types.
--License: having a proper license for which royalties paid are up to date.
Not exceeding the terms (limits) of
the license, per the license.agreement. License rights include: geographical
territories ('zones); usage of
'designated 'Features, 'functions, and 'inventions; time periods; licensee's
proper behavior (as observed by
'tracker and 'behavior analyzer). More details of our license agreement on our
posted website, or *those
commonly used for intellectual property.
-'frequency signals from: 'remote control device.
-other correct human or machine generated actions: that can be picked up
electronically by 'sensors for:
--sound (of user's or animal's or device's unique voice or sound). Differing
sounds from such sources permit
differing types of access.
--visual images (for finger prints, eye's retina, other body elements). Images
studied by 'visual analyzer.
--temperature: of human appendage such as finger or palm, or other [heated or
cooled] device, or room
temperature w/in 'designated range. i
Changing Access Levels Granted to:Users:
-analyzer: stops access upon suspicious activity. Eg: computer hacking -
attempted access into files or
functions for which system has not offered access,
-'score and 'uip alter access level, when (behavior patterns) of user are
in/out of 'designated (behavioral)
patterns.
-Access granted to all or portions of functions available: W5: each 'multi-
user has own time frame (TDS) to
gain access. Differing desired functions can have their own access time/type
parameters.
-forms of access can periodically be fully or partially changed.
. Differing 'scores: The type of 'score achieved functions as the gateway to
'designated functions associated
with such 'score.
-What type 'scores offer: Time length of access, or quality of function.
Higher 'scores can activate more or
fewer functions. Differing. 'scores can activate 'designated functions with no
one possible 'score allowing
access to accessible functions.
179

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Notifier activated if system gives a high 'score chance that accessor is
illegitimate.
_* Diagram: user = access = computer = results for user
--"Explicit Knowledge": Documented info 'accessible at any time by anyone with
or without a password". This
is left available as 'system in 'programmed.
.-From *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
End of File: Ac&
180

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
E =
File: Adapt / Intro & Tailor
INTRODUCTION - ADAPTING INVENTIONS TO PERCIEVED NEEDS
Also Called - User Information Programming
Adapt Table Of Contents For Multiple Files
Introduction & Tailor
Adaptive Inventions
.,~ .'tli!r!=. i:,{:.=.
Sub Parts r =
. Expand
Link
Article
Patents
Code Sequences for software & 'DNA
. Other Adaptations * I
Learn that it is quicker and easier to license from us, than trying to
circumvent this revolutionary patent
application. This application has so many ways of adapting. Call (+1) 707-428-
5000
www.LicenseItToday.com.
Adaptation tailors a system's features for the unique needs of specific users.
The entire patent
application shows examples'andirelated information.
a: ;=
ADAPT = User Information Programming TM. Also called Tailoring TM, or Adapting
adapt 'adapts the system to the situation. A common example is how it tailors
itself to the user's unique needs.
System uses stored information about the user, which it then customizes its
functions. Improves product
performance. In other words; it self optimizes its functions, to tailor itself
to the situation at hand. It is often an
invention's optional bonus feature. adapt is a central theme found in our
inventions!
-adapt is a form of 'adaptive Interface: The electronic interface
automatically and dynamically 'adapts to the
needs and competence of the user:
-Adaptive functions include how adapt can: acclimate, accommodate, accustom,
alter, change, comply,
conform, revise / harmonize / familiarize with user's needs, tailor, attune,
coordinate and integrate matters for
user's greater benefit, adjust, collect and adopt info about what's to be
tailored.
-Includes: Player Information Programming TM and Player Modeling TM for video
games.
Adaptation Process Is Open Minded:
. The 100,000+ invention variations made it able satisfy a wider range of
needs than nearly all other related
patent applications.
181

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Ties with main inventor's conceiving 1987's best selling book "Closing of the
American iviind" about higher
academia stifles creative thinking. Despite the fact that this may
historically be the world's largest patent
application with extensive support for its claims, we expect to be challenged
by the patent system, just like the
main inventor was at some of the world's top universities.
. A more polished and refined version of this application is coming forth.
The work stems from top inventors including our Eastem Europe's largest known
electronic research program
in 1990's, plus his research into methods for increasing people's creative
intelligence.
Tailor / UIP-Tailor
This Patent Application Gives Thousands Of Examples For 'Tailor
System tailors its functions to the unique needs of specific users. Each user
can have their unique
profile stored in UIP-Database, which includes their: needs, preferences, and
behavioral traits. Tailor then
matches the database, with a menu of function choices.
Integrates and Often Overlaps These Part Functions: 'Edit, 'Educate, 'EGH
(Educ Gets Harder), 'Guide,
'Interact, 'Predict, 'Seek & React, 'TGH (Therapy Gets Harder), 'UIP-Emergence
(2G180), 'UIP Tailor.
, +=
Tailor titled 'UIP-Tailor, as it's a subset of'UIP.
-tailors sys for "designated" users. Matches characteristics of user's db= w
characteristics db covering all/some
of sys [abilities of sys]. Sys / U* "analyzes" for best ways to tailor sys for
u = then selects best/better options =
u may select better options and brainstorm further on subject w sys / sys
automatically implements its tailoring
(wo "editing" from u / other sys). Extensive examples in KN files.
-Access' BA also selects what asers want:
access=ba can "seek" / "edit" information for accessor. This is a form of UIP-
Tailor. Saves user's time.
--also uses internet's sw that "seeks" "designated" news / other material that
appears later on W W W.
--BA knows what accessor wants to "experience" W5 = uip-tailor.
--See: "artist's" "cut & paste"; "edit"; "seek"; key word "seeking"; "uip-
tailor". + "Predict" which is a subset of
UIP-Tailor. "Guide": "Game's" "Guide" which guides player according to
player's UIP-DB.
-See File 2E - Idea Generation Software in directory "I" - effective pre
12.96.
.-'Edit or 'Tailor alters how sections of computer code are 'Searched &
Replaced.
Tailor-Simultaneous: Time related [and 'tailored] events [if not simultaneous]
and how they can be
'tailored. Each function/benefit being 'tailored can take into account the
traits for traits from the other
elements [being 'tailored]. [Don't] create [some/much] synergy between each
['tailorable] trait.
Examples:
-Effects in 'Entertainment, 'Games, Etc: Simultaneously tailored effects
reflect the traits of the other effects.
E.G. While opening a shipped invention in a wooden case, smell some fresh wood
while hearing the box
cranked open. The toy robot popping out 'interacts with the box as it makes
the rest of the way out, like the
='traits of a butterfly coming free from its cocoon. A/V effects from car
races. Mother's A/V 'reaction to baby
crying or wetting diapers. See 'Game Parts section for 'Effects.
182

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Multi-Users: Functions benefiting one 'multi-user, can be compromised to help
others: Features [[address the
lowest common denominator (for 80%)] of the users (so they can better
understand [and be 'educated]).
-Environment: it reflects 'mood of 'entertainment.
-it causes 'reactions: Ambient light or darkness having an effect on 'reaction
from virtual objects.
File: Adapt / Adapt Inventions
ADAPTIVE INVENTIONS
OPTIONAL WAYS FOR USING ADAPTATION IN OUR INVENTIONS.
* 5A810* Advisor: compiles user's information: birth date and time
(astrology); takes picture of palm (or asks
user to identify type lines they have on palm or computer); taro cards (more
optional).
* For the hobbyists into Numerology: numerology (takes the important numbers
in person's life, eg: drivers
license number, "T" numbers, address number, etc and sees the significance in
them, eg: "8" means strength and
"1 " or "10" mean beginning. All the numbers in a tel number are added
together, then the multiple digit final
number is treated like a multiple digit numbers whereby all the digits are
again added together, for example - tel
number 222-2222 = 14 = 5) Numerology has been popular with mankind since
ancient times.
-device can be in non-vending type machine too, for home use: people can
consult it each day for decision
making.
-marketing: the(simultaneous) use of multiple measuring systems ('analyzing
user info) could be argued in
advertising as being more efficient.
-system can give equal weight to each method of 'predicting future and
'analyzing person's current and past
situation(s). And or, user or manufacturer may give greater weight to some
modes than others. Naturally,
system must learn to compensate for times one method gives
conflicting/opposite
advice/'predictions/'guiding/suggestions of another 'analyzer/user (info
programming) - but in such cases,
system might simply give no comment on area the two methods analyzed.
* Voice Recognizing Vending Machine:
Function #1: user states/'keys in what and or how [w5] they want something
provided, eg: temperature of food
or beverage served
Function #2: recognizes particular person using device, and [doesn't let
others it doesn't recognize use the
machine] adapts accordingly.
. Other: Also for vending machines. *4E020 Content & Date Verifier: of (any
said) occurrences, eg: "tracks" /
"analyzes" occurrences (for uip (db improvement), intelligent monitor 2E251)
"Entertainment" / Program (sw) Screener: 9G-220: sys screens/selects
(such/designated unwanted/wanted
o ccurren c es/m o d es%/program s%)
-'Guides / *'Educates users [for how to improve their 'game
skills/functions!'scores].
R53 Computer Tailoring: Computer interacts with users at a level corresponding
to their level of
computer expertise. ['egh]. System also adjusts by: adapting to
strengths/weakness/interests in different
subjects/type of computer applications [it deems user is more interested in].
Users select from [three] different
183

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
levels of operating instructions. Relates to products from Fujitsu Ltd, 1060-
1, Marunouchi, Chiyoda-ku, Tokyo
100 03-3216-3211 NK]
-uses R52, eg: R52-1 + UIP
access **:(); artist *:(); camera:(); cart *:(); composition *:();
entertain:(); "m":(); morning **:(); multi-user*:();
notifier:(); osc:(); pr:(); printer *:(); ps:(); q*:(); r:(); s:();
score:(tds); synth:(); tel:(tr); uip:(); wa:().
-any el kn sys ="interacts" w/ = according to u's level of expertise (in using
product / field of knowledge, eg:
medicine, art, other application for product).
-'tailors 'game/'game entities skills to 'game [main] entity's skills.
R122 (User) Error 'Prediction: Compares 'database
-Computer ("C") 'predicts human error. [Studies user's UIP first.] 15B:
Computerized typewriter gives verbal
warnings when user is about to erase something from memory. [ Related to: 15A:
Central Research Institute of
Electric Power Industry, 30 Sept 92 YD; 15B* Toshiba 7 Feb 93 YD]
. For Techies: ACCESS **:(); loARTIST:(); CAMERA:("visual analyzer"
(notifies) unusual
movements)/studies movement behavior for UIP; CART *:O; CLAP:O; loCOMPOSITION
*:O; Display
("S"):O; "M":O; MOI2NING *:O; PD:(develop uip); PP/MP:O; MQ/UQ *:O; MULTI-
USER*:(user/observer
(analyzing for other's potential mishaps)); NOTIFIER:(); OSC:(); PRINTER *:();
REMOTE ("R"):O;
SCORE:(); TDS *:(); TEL:(); UIP *:(); UK:(); WA:().
-used also in: 'heuristic [A.I.] ['predictions] 'analysis.
-'scores chances of error in how 'predictor may be wrong [in how a'game entity
will act/be weak].
* A9-01 AFTER LIFE SOFTWARE: 'Entertainment.
Before a person dies, they can deeply analyze themselves in terms of how they
would respond to their
children's, spouses, former employees, etc questions. The intelligent computer
will be able to make rough
estimates as to how the person might have answered.
o has a clock in which the person being copied can leave certain statements,
reminders (eg: take care of your
health, stop drinking too much, keep studying, etc), new aspects to their
will, etc. Keeps user plugged in and
curious.
o rich people would be willing to put their money into this because: they
can't take their money with them, want
to leave an impression (the desire in most of us), want to care for their
loved ones, its novel, its the next best
thing to being with the loved one after death.
-More details in IM125 file.
3J010: Tailored Reading: Suggested information is given to User (user) in
forms of: world wide web /
internet / America On-line / Compuserve / cable entertainment and or
information (Viacom [company]).
3J020: Ads / Descriptions / Behaviors / Communications of User (user) are
analyzed and sys matches
User (user) with what Sys thinks User (user) (may) want: (Classified) Ad
insertions made by User (user) =
analyzed = sys suggests one of following which matches User:
-existing services / companies
-direct mail lists; contacts who may buy and or use services / products
offered by U.
184

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-shows competing ads (from other companies)
-D: compares ("analyzes") key words of User (user) (its ads / co / product /
service descriptions) w/
adslservices/co descriptions (in db / business directory / on-line services).
-can focus (only) on material that is "registered" (KN)
-Sys finds specialists for activities U (user) is engaged in and for which U
(user) may be less qualified. Sys
studies work history / test "scores" of employees from U (user) and = matches
with curriculum vitae of others
outside U's company. Sys "scores" importance of function and if its worth
bother of getting outside expertise.
Sys offers contact information on outside experts. Sys might be offered free
by service / sw company (that
makes money only on experts utilized). This serves as a back-up for management
who knows their employees
may be too afraid to hire outside experts in the event that the outsiders are
better and can take away jobs from
insiders.
3J030: Targeting Ads:
UIP of audience compiled = then ads only go to those w/in designated UIP
guideline.
-Mediums: on-line, WWW, printed publications, cable entertainment (television
ads).
-"Access" of different viewers using same/*similar system can be different
intern, ads targeted will differ.
"Access" code may come from the password to activate sys (cable tv / on-line)
and or remote control device and
or UIP generated by sys w5 (when, how) U (user) accesses program / sys.
-Similar systems are probably known.
3J040: Life Form Matcher:
Characteristics of environment are matched with the ideal growing conditions
of each plant or other organism in
the database. Environment's characteristics are inputted by U (user) (from
known information) / sys analyzes
characteristics.
/
-(Plant) Characteristics of environment include: (average) daily temperature
fluctuations / humidity
precipitation / soil moisture (retention) I type soil (nutrients, problematic
elements, eg: poor Ph, undesirable
chemicals) / air or water pollution / light levels / depth of soil / common
(insects / bacterial / virai pests) / (legal
availability of) insecticides / etc . Covers each minute of year.
-D: uip of plant db = matched w/ = uip of location = "score" shows how well
matches are made = a percentage
of 0% to highest score of 100% is shown / chart / bar graph / printed
explanations.
-shows ideal age of p lants for moving / transplanting.
-any (other) life form can replace plant, eg: animals, insects, micro-
organisms. In which case other functions are
(also important): cages I food needed or given.
-Cost versus benefit "analyzer": benefit and cost value proportions for
different types of foods given / how
valuable the life form is (to reduce costs, cutting corners which can be poor
for plant or other life form, might
be worth it).
-how to maximize productivity: harvesting of plants or organisms or maximizing
(healthy) reproduction
(offspring).
3J050: Life Form Doctor: Adjustment Suggester:
185 =

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-related to Life Form Matcher - above KN.
-when organisms are already in the environment / U (user) wants designated
organisms = sys suggests how
environment can be altered to improve growth or health.
-"analyzes" solutions to illnesses / diseases that have or may hit organisms.
Eg: stopping epidemic; software
doctor.
-suggested activities for organism: exercises for unhealthy humans or mammals;
changed diet; medication;
temperature; light levels; other therapies.
--(disease's / situation's / environment's) characteristics = analyzed /k =
uip = suggestions.
--uses related / KN '(medical) diagnosis' / "analyzing" systems (sw).
-sys "tracks" changes in organism / environment = "nr" / makes suggestions (on
needed changes (from earlier
suggestions, eg: more medication, chemicals, light)).
+ 3J060: Formula Adjuster: System adjusts formulas based on User Information
Programming.
Applications include: food recipes, clothing styles for (human) clothing
'tailors. (residential) architecture, etc.
. Applications:
-Recipes: System can also adjust for multiple people, by picking food formulas
that can best average most
people's tastes. Non essential ingredients area adjusted, eg: for omlettes
there can be more or less cheese, but
the egg isn't adjusted.
--Food provider matches U (user) with other db (via Dialog (co)) that helps
food provider determine uip on u.
-Pizza Delivery: if user previously ordered pepperoni on pizza, and next they
want sausage instead, chances are
U (user) prefers the spicier variety of sausage and or other pizza ingredients
(eg: more red pepper, oregano,
pepper....). Or, U (user) fills out uip type of questionnaire. Questions
include: favorite ingredients, foods,
questions in other (UIP) KN. Large tour groups can have their people fill out
questionnaires = future food
providers provide (ala cart's) targeting average tastes of group's UIP.
-Restaurant Guide Company's Service: U (user) (customers) fill out
questionnaire. SW matches = U (user) w/
restaurant's whose ingredient / style (ambiance, type furnishings) UIP matches
= U. Or, the middle-man
restaurant guide company = suggests how restaurant alter recipe / menu for
U(user)== via U's "access" (card
number U (user) shows when ordering).
-KN uses "CID" - Caller ID to know what pizza User previously ordered
(Exists). Other functions are
improvement of this.
-Region of client calling in (known by first three digits of local tel number)
shows up on caller ID; then system
determines regional tastes and or lifestyles.
-Image' based software systems (which 'tailor color matching for the user,
such as suggested home decoration
colors, fabrics and furniture designs.
. System is a form of UIP Database collection/tailoring. Diagram: UIP of User
(customer) = used by sys to
suggest = alterations to (main) menu's recipe.
+ 3J070: Sound Adjuster: KN? See music or SA file.
186

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Each musical piece to be played has UiP "score" which can be matched with the
UIP of desired mood.
Examples:
I] co stock going up, so build on the momentum and play Tsaichovsky's 1812
overture. 2] It's Friday and
employees are less serious, so play classical versus pop music. 3] People are
semi-brain dead, so play Bach
which is cerebral and creatively more inspiring (according to questionnaires -
see KN).
-Applications: office background music; music while people are on telephone
hold; public areas: train stations,
restaurants, hotel lobby's or rooms.
-D: UIP of situation (system "analyzes" / person k data in) = UIP of
situation/environment determined = C
matches UIP of situation w/ UIP of Music (from music db) = controller =
selects wh ich (pre-recorded / to be
composed (see KN composition N) musical pieces are played and in what order
(order has effect as any Disk
Jockey knows = this effect matches UIP-targeted objective) = "stereo" / osc.
%-selected visual images (also) displayed on "S" = match U's UIP. See KN.
%suggested attire worn by employees match = designated situation: customers /
type work (hazards, 7G KN).
3J080: UIP Time Correlator:
Matches which occurrences (emanating from U's sys, w5) get greater (desired)
effects and when. In tern sys
adjusts itself by putting out more of the elements (applications, functions,
effects, results, information, osc)
during the better times.
Applications:
-when to play designated music / show designated visuals on S. Above KN.
Example: when which music has
greater effect on productivity (as measured by average typing speeds of all
employees hooded into M).
-when to place which ads to targeted audiences. Above KN.
+3J090: Personality Profile Matching:
Sys gives each user tasks and or questions. Based upon response, system gets
better understanding of each
user/'game player/'entity than more standardized (multiple choice) questions.
. Things measured:
-creativity (see KN paper "Inter-cultural Engineering").
-manner of expressing oneself:
-temperament: anger; stress level (how much stimuli a person can take / likes)
-> resulting in one of many
possible behavioral reactions (such as how User will predictably act / react
in designated circumstances).
-see: "score"; UIP
-percent of time User spends doing different tasks (especially those that are
connected to an electronic
"tracking" sys), eg: cruising info highway for girls; data processing;
computer games; sending / reading
electronically transmitted letters / data; financial.
-uses any current / future (electronic / sw) behavioral analyzing system /
process.
-human controller of sys k what they desire from sys = sys decides what needs
to be measured to achieve this
goal = sys determines what data is needed (via human or M psychologist) / gets
data via any means (UIP, M) _
UIP-Analyzer = output: suggestions
187

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Applications:
-how User is predicted to act / react in designated circumstances.
-developing UIP in sys to better interface w/ u.
-suggesting how one person can better communicate with / work with / sell to /
teach: designated User /
customers / (work) associates / students.
-becomes a db (database) for UIP.
-see UIP; *pr; KN (using UIP); other 3J file UIP SW inventions
-dating service
-matching User (job prospects) with new work openings / tasks: getting those
who can do the job best; matching
skills and personal needs/characteristics of person with task/job
-avoid problems: poor matches of people; reducing risks (not allowing people
w/ poor skills or behavioral
patterns to (take on risky tasks, eg: chemical handling, make important
business decisions if they appear to be
drug addicts or emotionally unstable, air pilot selection).
-sw for increasing creativity: see KN's Inter Cultural Engineering paper.
-conflict resolution: sys suggests how to better speak with antagonists; how
to present constructive proposals,
eg: should it be more emotional or intellectual, or is there a greater need
for trust in one or more of the parties.
. UIP - how its developed:
-"scores" are developed per User / group of users (company / dept) / task
/(geographical) region / interest /
application (of program or data) ="analyzer" = output.
-see UIP
How SW responds:
-it thinks of all the possible results for each action proposed by the sw, eg:
like computerized chess games with
Gary Kasparov fighting IBM's computer in Feb 1996.
4J030 Experience your future personality: System studies your current
personality and
guesses/'predicts approximately what they/'game players will be like in the
future. UIP, BA, SW.
-hear what you'1l sound like
-visualize what you'll look like
-understand how your personality will change
-guess how others will respond to you differently according to how you change
and the world changes
-guess how you'll be living your life differently. Considers: living at home
(appliances, chores, entertainment);
"interacting" (electronically) with = family; work (electronic modernization,
automization); etc.
-D: +db (uip, data compiled from experts in predicting future (worldly)
changes) / sa / tds (tracks how User
changes over time - during / before User started using sys) / "visual
analyzer" / analyzer+= c-osc = u.
. Database of worldly known knowledge available f'rom specialists for
understanding User now and estimating
likely corresponding changes:
188

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--Voice & Visual appearance (face, body) / Behavior of U: physical and
behavioral doctors and audiologists are
used to create db; they're consulted for how mankind (of designated existing
behavioral / medical / genetic /
family characteristics; ba) change over time. "track".
--Where world is headed. + Future products/inventions: see KN+. Futurologists
also consulted for current and
future characteristics (*ba, *analyzer) in int'1: economics, business,
politics, laws, culture, family relationships,
etc.
-How sw thinks: Different db = are compared ("analyzed") = w/ User (their uip-
db). -> This in tern creates a set
of parameters (how User is expected to be in future). -> Next: How world will
react to the changing User / How
User will react to changing world. [In other words: S W"analyzes" concurrently
how different changing factors
influence each other, and how they are effected in tern effects how they
effect other elements. This is sw
algorithm]
.-Example: John's a United Parcel Service delivery man in year #1. By year #10
he'll use his back less due to
estimated future technological changes (people deliver fewer products /
automization of delivery), hence less
likely he'll suffer from back aches and live longer due to his more positive
outlook on life. Due to John's other
characteristics (his inventiveness as measured by
"ba's",personality/creativity test) he'll in future have more
energy to invent new ideas (rather than be tired from exhaustive work,
draining his creative thinking ability). In
tern John will desire to buy more new products for his home, and or then get a
new job dealing with a more
creative sphere (eg: advertising (John has right personality for this). John
likely to get married and have 2.5 kids
(2.1 of which will go to college in the same country), 1.2 of which will stay
within 100 km of John's home when
John is 65 years old... John has less stress (than 80% of others in year #20
because he's more adaptive to
technological progress in society, this giving him a better income (bigger
house, more products, less into family
values...)...
-Idea generation sw used. Including, KN: 2E0I 0 2E020 2E030 2E040 2E050,
"analyzer".
Patents: 5410634 Self-optimizing method and machine.
See 7,107 Shopping assistance: suggests what user may want to buy. A shopping
agent. Useful on
places like EBay.com and Amazon.com
Keeping personal identity confidential: UIP's database can have restricted
'access (only for the user).
Some portions of the UIP can be made public, eg: for a search engine or
remotely related (marketing / info
matching) system. User's accessing public/private networks/search engines can
'designate certain sections/files
of their UIP database for (limited) public use (as applicable to the needed
function).
Tailoring Pop Up 'Interfaces: the type and manner of pop up relates to uip.
Software interface matches
user's needs.
Following Developed While Focusing On Game Aspect Inventions:
Paste Then Tailor: Build up UIP-Database by pasting from other sources what
one finds.
Find digitized/digitizable material, then copy and paste into UIP-Database.
UserJSystem searches/'seeks
elements that [don't] appeal to them/others/'designated applications. Seeking
can be for UIP [narrow
189

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
parameters] types of: colors, objects, 'inventions, people, terrains, events
[historically based] [and their video
clips].
-'seek can find what's liked via any searchable method: browsers [google.com]
how they are today and
tomorrow; 'image and audio searches via 'audio recognizer and 'visual
recognizer.
-Applications: UIP for one or multiple entities; creating a menu for data
one/system can select from when in
UIP-Input mode; %creating audio/visual stories from assembled pieces.
File: Adapt / Adapt Sub Parts
ADAPT'S FEATURES
Sub-Features For Adapt With Specific Benefits
UIP-BA / Behavior Analyzer: Studies the behavior of users. System reacts
accordingly. Concludes
with a behavior profile of target, then can 'react accordingly. UIP-BA or BA
can also be synonymous with UIP
[in other words, interchange BA for UIP often is OK].
-Behavior Analyzer 'reacts to situation:
--System adapts to user / their mood'. Different'moods of user (help
influence) result in different command
codes in controlling system.
--'Tailors itself to user's 'behavior.
--System determines the behavior /'mood of speaker, then 'reacts
as'designated. The behavior of the user= is
determined via the'sound analyzer. Different behaviors result in differing
'reactions.
-saves time for human or less efficient computer studying.
-can process much in given time
-occurs automatically
-U / customer can over-ride sw; and or reprogram UIP sw
-sw also operates on any (common) foundations, eg: Windows 95, windows, DOS,
Unisys, MAC, others and
their future versions.
+ UIP-DB: Database system compiles the needed database which includes
characteristics of: user(s),
environment, other connected systems, and system(s) hosting UIP.
--The development and or utilization of database on u's characteristics:
identifies/develops differences between
users (multi-user) intern allowing sys to better tailor itself (U[P-Tailor).
UIP-Tailor uses the UIP-DB.
Examples: "Access' BA", "Track", "Artist": preferred ways u likes "images"
"edited". Extensive examples in
KN files.
--SW (Software) Diagram: "seeks" what elements needed= for compilation= then
organizes data (via fuzzy
logic) into usable form= for UIP-Tailor. ---Notes: Seeks: via
"questionnaires", "ba", "track". Organization of
DB's files: collected information on user can be inserted into one or multiple
files according to which files can
use the information. Then UIP-Tailor seeks which files they need to better
tailor. Or more work can be required
for UIP-Tailor to find the needed information. Example: "Access' BA's Score" --
db compiles data to show how
accessor is rated= intem if 'accessor's changing rating stays good= uip-tailor
/"access controller" permit access.
190

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--See'Content Analyzer's Database Analyzer which overlaps UIP-DB.
-. Embed UIP in a browser: where it can be gathered, and made [partiy]
available [to those with 'access].
U[P-Edit: System edits material according to user's needs or characteristics.
Edited material includes:
text, (portions of) images, (portions of) sound tracks, computer code, etc.
--Omits material to match user's DB (database); UIP-Tailor - alters text,
(*"entertainment") of material
(9G220). "Edit". *"Router" is a subset of "Edit". See 'Artist.
. Hypervideo (exists): users click on (moving) images/'icons, and get 'routed
video clips / information ('tailored
to their needs). Object Tracking software (exists) make (moving) images
clickable. UIP Applications: tailors
itself to user by providing 'designated images/info via proper w5.
UIP-Gets-Harder: The type of access into a system adjusts according to the
user's situation. EG: access
to info related to another project user is working on in the system might be
required for more classified
information. There could be three levels of system access clearance for a
user: Level One: all data available;
Level Two: access requires UIP-Access' approval. Level Three: No access
allowed.
-User's characteristics (signals, UIP) "analyzed" to: determine whether to
allow: "Access" (entry, level/type
usage permitted u), Parts To See: +"Access', BA".
-'Games: proper actions achieves points, more 'lives.
--'Tracked method of playing 'game correctly is a needed password [for any
type 'access into real world
('invention)]. Winning might not be via obvious manner of what looks like
getting the most points [way to keep
hackers from figuring out how to play/lose game to gain access]. 'Game
tailored for player so no two 'game
identical, and the 'tailoring is such that only legitimate player may know how
to play/'react/answer uip-
database's question, eg: pet your dog or cat, sitting near 99 other cats and
dogs; then 'interact with pet to do 1,
2, 3 steps...
+ UIP-Guide /'Guide: UIP knows how to best show user what they need.
-Guides user to gain more benefit from the available functions. 'Tailors
itself to come close in replacing one on
one tutoring and help: focusing on the needs for specific user(s), versus
generalized forms of help. See 'Guide.
UIP input: System 'analyzes user's behavior/tastes, then files it for future
reference to 'tailor itself.
User or any person inputs their traits, desires. Also see file once called
"UIP Input *Ga"
UIP-Link: UIP LINK = Optional ways of dealing with situation when a function
isn't working OK.
Compensates by suggesting alternative functions and pathways. See UIP-Link
File.
UIP-Match Making:
-Invention connects and 'scores the uip characteristics for two or more
entities (users, companies.
-Exists?: web interface suggests what's the best product at close location to
user. System then makes the (tel)
connection. From French inventor with patent pending invention.
-Our invention matches the characteristics of the user's tastes with available
products, services, styles, and other
'designated characteristics.
-Providers can also access (user's i other co's) uip db, to target clients /
other designated parties.
191

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Computers (with their hardware and software characteristics) might seek
proper matching with other electronic
hardware and or software. Applications: 1. 'scoring compatibility between one
or more softwares and or
hardwares. Improves current compatibility checkers; such as by the 'score
system gives to the compatibility of
'designated aspects (uip shows/guides) of the matches. 2. 'notifies when
(non)compatibility (appears) may /
does occur (for 'designated aspects or functions) (of the sw/hw).
-Drawing: u (uip database) =(internet) connection = computer / ISP = uip
database of user/provider/what's
needed (by user).
UIP-MQ = Machine Asks Questions to user:
Machine asks user questions to obtain information so system can better serve
user. Answers used to develop
"UIP-DB".
--Drawing: sensor/analyzer/software analyzer = tr = c = display/prompts user
allowing them to respond (via uk)
(if they wish). OTD: ~Sample Situations: personal information; information on
game participants and
environmental elements; prompts user for needed information; etc. One use can
be for system to better function
by adapting to user's needs and or tastes. This feature can also store more
information about the user for the "pi"
database.
Product's self analysis: ~system asks user questions about any mechanical
failures.
--See "Brain"; "Access' BA". "Edit": determines type questions.
-Asks user if characteristic(s) discovered by UIP Info Input are correct [via
(window) menu (with visual
examples)]
UIP-Router: Via (software), user is directed to the designated programs or
functions.
--"Routes" u to app'licable programs based on UIP.
UIP Seeks Reaction: UIP knows "what buttons to push in another, to get the
desired reaction." Inn
dther words: UIP hones in on an entity's or invention's characteristics
'predicted to elicit the 'designated
'reaction. See 2G330.
++ UIP-Tailor: See Tailor Sub-Part file. And how it's amply demonstrated
throughout pateent
application.
UIP-Track *: System recognizes and is less apt to lose person/user being
tracked. UIP-Track differs the
target from the environment by user's characteristics. EG: existing computer
camera' follows person in room
based on facial recognition.
--"Tracks" u by following signals = characteristics of person; Intelligent
Monitor 2E251; "access"; "visual
analyzer"; "sound analyzer". Tracks user for UIP-Database's compilation of
info.
UIP-VA: VISUAL ANALYZER: Search for designated images, which is edited' as
programmed.
System learns/tailors' itself to know what images they should: track, edit',
locate for user; eg: though user
doesn't consciously know exactly what they are shopping for online, system
learns the user prefers designated
characteristics based on what user: bought or offered through the machine's
question (UIP-MQ) process.
.='analyzer" / user = (automatically) assigns desired uip-based code of
characteristics to designated image(s)
such codes are utilized by (CAD) to manipulate/process/edit the images tied to
the codes = results in outputted
192

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
images/text/suggestions/technical data as u requested/wants (uip) = these
outputted data (can) have codes of
characteristics = so such output can be altered (like requested earlier).
CONCLUDES THIS ADAPT SUB-PARTS FILE
File: Adapt / Adapat Expand
EXPANDING ON USER INFORMATION PROGRAMMING
BROADENING UIP - OVER VIEW: EXPLORING MORE OPTIONS FOR ADAPTING INVENTIONS.
Imagine about any type of product, real or imaginary. Everyone has different
needs. What are they, and how
can a conceptual product be tailored?
INPUTS: Whose Info/Needs are used/tailored to benefit the user and or others.
'Databases (that system
compiles) about user's characteristics:
-User:
(typical) individuals who get products to better do what they want, by
allowing system(s) to receive info about
their 'behaviors, needs, etc. Common aspect UIP.
-Friends:
Entities who associate with / know user: providing their views of user /
desires from user
-Environment:
culture (culturally bound thought patters, like communicating, or matching
preferable interfaces matched to
particular mentalities); (natural) terrain; weather (road conditions);
.--automated systems giving info for (user's) system to adapt / utilize with
situation, and or the environment tied
to the situation.
-Institutional / Authorities:
school, government, law enforcement, safety officials
-Employers: work functions tailored for employee (employee's interest to
discover new things about their work,
improves comprehension, focus, productivity, Q&A (quality and assurance).
-Parents
-Health professionals / systems:
'sensors 'guide user for health improvement, eg: see our motion tutor 'guide,
related to existing golf swing
instructor relying on RFID (PS).
-User Themselves:
person, group or company giving / receiving ('ba related) data.
-Marketers/businesses
-System to System Interaction:
Characteristics of alien/other products / systems / software: UIP receives
their (characteristic) input via digital
(packet attached to alien product; or UIP 'analyzes alien product and related
info to develop a UIP 'information
base.
193

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Robotic / Virtual Reality:
Robots who learn how to interact with people/users/systems for the latter's'
benefits,and or robot's. Robot can
take on all (UIP related) (behavior) characteristics of a (designated) human.
How one robotic/vr system interacts
with other (similar) model.
-'Analyzers: 'Content Analyzer; 'Sound Analyzer; 'Visual Analyzer; 'Scoring;
'Sensors
-'Seek & React: the seek aspect, allows the benefits aspects.
-'Tag
;
BENEFITS / Purposes of Tailoring: goals; matches user's needs:
-Buy / use more something: user better gets what they want (qualified
matching); increases sales; reduces
shopping / marketing time/energy/costs.
-'Guiding /'Educating users: 'guides users where user and or others
(employers/marketers/parents) want them
to go/experience/interface
-'Editing:
-'React: Automated Responses; Responding to emergencies; 'Access.
-Nurtures better (personal/business) relationships
-'Entertainment: another way UIP can "hit the sweet spot" of the user.
-'Games
-'GPS
-'Interact
-'Predict
-'OSC: 'synthesizer
-TGH and EGH
File: Adapt ! Adapt Article
Adaptive Technology Article: Mixes info from others with inventor's.
Adaptive Technology (is also used for handicapped enabled hardware/software)
and Intuitive Computing.
Adapt (UIP) Examples: 1. Black & White - Computer 'game. Uses an Al
(Artificial Intelligence) to
make the game more interesting. The Al can be trained to perform actions
based/'tailored on user's
goals/tastes. 2. Expanding upon Microsoft Office - The microsoft office
assistant 'analyzes how the user is
'interacting with the office software. If the user is randomly pressing keys
and buttons it will offer assistance.
If the user starts writing a letter it will offer help formatting the letter.
3. Technology is not where it needs to be
to provide a truely adaptive experience. Most designers focus on making the
software intuitive for the end user
and offer tools to manually 'tailor the application to the users taste.
INTUITIVE COMPUTING (UIP)
Intuitive computing is much of what User Information Programming does. With
intuitive computing
users collaborate their activities with an intelligent digital assistant that
models the user [via 'behavior
194

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
analyzer]. It suggests or carries out actions it 'predicts will satisfy that
intent. Intuitive computing systems can
be 'tagged and 'tracked to individual users, travel with them, and analyze'
their needs. They can actively
monitor the physical environment; learn froni past experience; seek out and
utilize distributed information and
computational resources; use innovative algorithms to compute the most
promising courses of action in the face
of complex, incomplete, or contradictory inputs; and employ powerful yet
natural spoken language and
graphical interfaces.
The term "intuitive" ('predict] applies both to user intuition regarding
system behavior and to two
forms of system "intuition": inference/prediction of user intent, and
selection of prom ising actions to satisfy
that intent. They're mutually supportive, in the sense that the modeling and
support of user intent makes
systems dramatically easier to use, allowing them to interact with human
beings in a way that more satisfyingly
resembles the ways in which human beings act alone, and or with others and the
environment.
Though it may employ resources spread across the Internet, an intuitive
computing system can have an
interactive iocus that can also travel with the user or mobile invention, much
like today's PDAs. It can,
however, have multiple physical components, some embedded in personal wear or
even the body. Using multi-
sensory (sensor's) input, including sound (SA) and vision (VA), the system can
monitor the physical
environment and the user's focus of attention. It can then combine this
environmental information with past
experience, commonsense knowledge, and task-specific knowledge to drive a
sophisticated model of user intent
and feasibility, allowing it to resolve ambiguous requests, to propose
appropriate actions, and to anticipate
future needs.
It manages an=unlimited variety of tasks. It can augment human memory, answer
questions, and gather
and organize information for upcoming activities. It can notify' users,
educate' and guide' them. Both
proactively and on demand, it can negotiate with systems associated with other
human beings, with
organizations, and with objects in the surrounding environment. As a servant,
it's available when needed; and
can be ignored by the user. While intuitive computing tasks can be short-term
and highly constrained, others
can be much more open-ended, and capable of consuming arbitrary amounts of
computational and other
resources. The algorithms to perform these tasks can also employ: =both
heuristic and traditionally rigorous
techniques, with the choice among them driven by intrinsic problem complexity,
resource availability, and the
nature (completeness, consistency, accuracy) of the input data. Challenging
functions include: choosing the
most promising actions in the absence of complete knowledge of external state
and consequences, balancing
resource requirements against quality of results, allocating available
resources among competing goals and
obligations, managing and mining large amounts of current and past sensory
information (from databases'
(compiled by UIP)), and selecting the order of access' to outside information
sources.
In an internetworked world (where the parts are highly interconnected in
unlimitedly potential ways),
an intuitive computing system can communicate extensively with other invention
parts, and information sources
around the Internet. For cost efficiency, e.g. battery preservation, and
saving computing power (in an invention
part), it can offioad expensive computations when feasible. It can offload to
nearby servers whenever possible.
When resources are plentiful, the system can speculatively gather and organize
information in anticipation of
195

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
futu're needs. When resources are scarce, it can use its knowledge of user
focus and its model of user intent, to
allocate what resources it has to the tasks its computations determine can
best (most likely) meet user needs.
Diagram: Data collection (database, tracking)/ UIP (intuitive computing) =
service provided = user.
INVENTION'S CHALLENGES
Artificial Intelligence, Natural Language, and Knowledge Representation:
planning for the future based on uncertain or incomplete knowledge; natural
language understanding for
multiple speakers (users') in noisy environments; modeling of intent in
general contexts; knowledge acquisition
and representation (collecting information for UIP's database'); learning and
inference; intelligent agency:
deciding what to do and how to do it (W5), balancing conflicting goals and
obligations against each other, and
against available resources; integration of symbolic and spatial knowledge
bases (databases').
-Computer Vision (VA'), Robotics, and Virtual Reality (VR'):
object recognition in general environments; recognition of spatial
location/context and user/human activity;
connection of visual perception to primitives useful in natural language and
planning; tracking' and exploitation
of user attention and focus; real-time integration of augmented reality with
vision and eye tracking
Computer Systems:
generation of secure mobile components with embedded resource (computation,
communication, data, energy)
and quality of service (response time, throughput, accuracy) requirements;
application partitioning and
relocation mechanisms; optimization techniques to distribute these components
to maximize performance and
minimize cost; compile (time) prediction' and run-time monitoring of data
access' patterns for locality
optimization and usage prediction'; attention- and intention-driven scheduling
and dynamic component
offloading; naming (tracking'), discovery, and routing' for wide-area agents
and resources, using peer-to-peer
and mobile ad hoc techniques; high-performance, low-energy processing and
communications for mobile
platforms
Theory of Computation:
algorithmic task decomposition and flexible serialization/ parallelization;
anticipatory computing via exact and
approximation algorithms, and stochastic modeling of human/machine behavior
and environments;
approximation algorithms (including progressive approximations); complexity
studies to clarify the demarcation
line between exactly solvable subtasks and those to be approached
approximately or heuristically; computing
with uncertainty (regarding input, environments, and payoffs); cryptographic
security (access'); data mining (of
database')/warehousing/classification/clustering;
query-order theory to improve information access' patterns.
Following is a list of the patents ordered by how relevant they seemed to be
to UIP. So far I haven't
found anything enough like it. I put I s by the patents that seemed to be
fairly similar, 2s by the ones that had
some theme in common and 8s or 9s by the ones that seemed like they MIGHT have
a little to do with certain
aspects of it, but possible little to no relevancy. Here's what I did: I
started out by searching by keywords and
trying to read each patent that seemed similar to try to tell how close it was
to yours, then following the links on
those patents to "references cited" (other patents) but that seemed to take
too long, and skipped around too
196

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
much. I ended up searching by keywords then browsing to weed out the ones that
didn't fit (like human
protease inhibitor stuff) and ordering the ones that seemed to relate. I was
going to go through and read over
the ones that seemed to match better and give a percentage of how much they
matched, and follow the reference
links inside the patent to determine if any of those were relevant as well.
The following patent numbers are just from a preliminary search of "database"
AND "tailor". It came
up with over 2,300 hits, and I've finished weeding out and ordering the most
relevant patents. I was going to
read them over and give a better idea ofjust how much'they relate or if some
of them didn't fit as well as I
thought at first glance etc. Other search combinations came up with over
30,000 hits. So this seemed like the
best one to start with.
CONCLUDES THIS UIP ARTICLE FILE
File: Adapt / Adapt Sequences
ADAPTING THE SEQUENCES OF SOMETHING LIKE:
ADAPTATIVE CODE SEQUENCES IN SOFTWARE, DNA, ETC.
CLAIM:
OUR SYSTEM ALSO ADAPTS TO NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER
BIOLOGICAL MOLECULAR STRUCTURES:
Adapting to the need for tackling germs on a case by case basis. Adapter
'guides user by giving them a
chemical formulae designed to neutralize dangers from specific germs and their
sequences. For example the
bacteria (P.gingivalis). Chemical indicators notify if and when items placed
into the solution have been cleaned
enough. The same features used to adapt the situation with this sequence apply
to electronic software codes as
weii.
. More details on chemical sequences throughout the application including, our
chemical indicators, 'content
analyzers,.etc.
ADAPTING TO NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER BIOLOGICAL MOLECULAR
STRUCTURES:
.'Content Analyzer: it 'seeks and 'reacts to 'designated situations including:
chemical combinations, and/or
behavioral traits (see 'behavior analyzer).
-Can 'Seek: changes in situation and/or 'designated circumstances
(compositions [at certain temperatures
and/or quantities (percent of solution)].
'Notifies user/('reaction) system 'W5 triggering event occurs.
197

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Set combination of chemicals/solutions is required to 'access / trigger an
event. A form of password is
achieved when the correct nucleotides and/or amino acids are found in
'designated [percentage of solution] /
other criteria.
Engineer nucleotides and/or amino acids so they 'adapt to needed
circumstances! Components of a
nucleotides and/or amino acids, and or an entire nucleotides and/or amino
acids chain can be [automatically]
altered/'edited to 'adapt.
-(Video) 'Game:"Adapting nucleotides and/or amino acids can be a strategy
game.
CHEMICAL ELEMENT CAN BE A ALTERNATIVE FEATURES:
Each (known) nucleotides and/or amino acid sequences has the
option/alternative of being one of this pat
application's features (inventions) (based on characteristics from being
synergized with something else such as
other (parts of) nucleotides and/or amino acid sequences.
-As with any part of this pat application, the stronger the knowledge with
other sections of this pate application,
the easier it will be to understand/use its features.
-'Software is used to 'analyze /'coordinate nucleotides and/or amino acid
sequences [based on what the
'content analyzer's 'guidance/'reaction].
-Shrink or expand nucleotides and/or amino acid sequences and their inventive
features in this pat application.
Benefits from altering ['editing] nucleotides and/or amino acid sequences
include:
-Bioengineered medicines and/or foods. Non organic/natural life/chemical forms
can be 'tracked so they are
properly used. EG: place 'tags in/near the nucleotides and/or amino acid
sequences.
.'Interactive molecules can function like features [synergizing] each other.
Common features [also for non]
nucleotides and/or amino acid sequences like 'access also have [purely]
chemical / nucleotides and/or amino
acid sequences (whose characteristics are 'sought and 'reacted to) features,
e.g.:
-A correct sequence is needed to trigger/gain 'access/'notify = in order to
achieve the 'designated (chemical)
'reaction.
-(Auto) safety air bags (any anti infringer method in application) can be
instituted [quickly]: Figurative
drawing:
--(Infringing) event occurs = person / system identifies [via sentence
structure 'analysis] event ='analyzer
['editor] 'adapts to event by =(activating) its links that are 'associated
(with possible infringement 'predicted) =
(user) files patent application (with system's help) = patent granted
=['predicted] infringer is stopped (this
protects the operator of this system (functioning like an air bag)).
FIGURATIVE DRAWING (diagram) of nucleotides and/or amino acid sequence
example:
Drawing # 1:
1 User's Need Determined -> 2'Keyboard Input => 3'Computer's 'Analyzer -> 4
Changes the constitution
(sequence) (to adapt) -> 5 Container holding nucleotides and/or amino acid
sequences.
--Notes on above diagram:
198

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
---1: what a user or system needs 'adapted; their needs can be 'scored
/'tracked for changes to the (sequences)
in nucleotides and/or amino acid sequences.
---2: 'remote control / 'reaction controls what #3 does.
---3: adapts situation / nucleotides and/or amino acid sequences
---4: altered nucleotides and/or amino acid sequences (based on how sequences
are/were 'edited) (by
'adaptation).
---5: can be moved (carefully) via ('WA) in the research laboratory. Any
accidents / spills are
monitored/'tracked by 'sensors, with 'notifications made when needed.
. Drawing #2:
'Designated need (determined by 'keyboard input / 'sensor's 'analyzer) -
'computer = mechanical (arms)
device moves/combines/alters the nucleotides and/or amino acids (along with
chemicals that can change their
'feature / characteristics / 'character / (%video game) 'agent features).
BRIDGING NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER BIOLOGICAL MOLECULAR
STRUCTURES:
Adapt available resources like software codes or chemicals to achieve adapted
results.
Splicing and or connecting chemicals and/or (our) software code has many
similarities (and we 'predict more
so in future).
. Achieving 'adapted sequences / software codes = can be done by having an
'analyzer output a formulae /
'guidance for how this sequence can be created 'W5.
SEQUENCE CODE WRITTEN BY OUR (CHEMICAL/ELECTRONIC) 'BEHAVIOR ANALYZER,
'ACCESS, 'CONTENT ANALYZER & OTHER FEATURES:
'Adapt 'designates a need = then 'guides the technician / automated 'editing
software programming device = to
write up a sequence / software 'program 'adapt 'predicts will achieve the need
to 'Access through the body's
brain membrane needed medicines. Steps:
l.'Analyzer instructs molecule #1 = to mix with molecule #2 and #3 = creating
chemical #1 &#2 = which has
the characteristics of getting through the brain membrane. #1 is a chemical
'behavior analyzer that can find #2
and #3. The latter can't gain 'access to the brain without the other (#2 and
#3). But #2 & #3 can't find each
other as they lack the 'behavior analyzer themselves, but their 'sensors are
good enough to determine a #1 when
they are close enough.
2. As only chemicals #2 and #3 are needed in the brain, and #1 must be removed
for #2 & #3 to function as
desired; chemical #4 is later released at the right time and situation ['w5]
by the 'analyzer = to dislodge #1
already behind the brain barrier. The medical problem (need to change the
brain characteristics causing brain
problems, eg; epilepsy or cancer) was solved via this adaptation. As each
person/situation is different, the
prescription/'guidance adapted to all the circumstances, eg: other drugs
person is taking, their age, weight,
and/or what might (not) cause ill feelings (nausea).
199

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
OUR SEQUENCES & TABLES:
Our feature lists function as our creative tables.
Features show sequences (chain of events / diagrams) that can represent
chemical features.
. Our system is easier (for lay people) to understand compared to the
traditional format in which sequences are
currently required by patent offices.
EXISTING US PATENTS:
6,974,706 Application of biosensors for diagnosis ['analysis] and treatment
['adpatation] of disease. The subject
invention also provides a method for screening ['access] those
analytes/biomarkers ['tags] likely to be present
in exhaled breath.
20020007249 Personal computer breath 'analyzer for health-related behavior
modification ['behavior analyzer)
and method (Doesn't mention amino acids, but relates to above patent -
6,974,706)
7,129,554 Nanosensors:
Electrical devices comprised of nanoscopic wires are described, along with
methods of their manufacture and
use. The nanoscopic wires can be nanotubes, preferably single-walled carbon
nanotubes. They can be arranged
in crossbar arrays using chemically patterned surfaces for direction, via
chemical vapor deposition.
-Our features: 'sensors, arrangements mentioned can be in an 'adapted fashion.
7,062,092 System, method, and computer 'software product for gain adjustment
('adaptation) in ([biological]
microarray) scanner ('analyzer).
PHENOLPHTHALEIN - A Ph Chemical 'Notifier (Indicator):
Turns pink ph becomes above 10.
When doing a titration phenolphthalein could be used. Measure the
concentration of a solution (its acidity) to
'predict how fast it will eat through an (un)known or little known substance.
Phenolphthalein can be used as a
device to 'score that acidity, with this info one can determine an additional
way of knowing what the substance
it is eating away at ('content analyzer). Characteristics of a substance
include how fast an acid of certain
formulae will eat away at something (a prescribed number of millimeters).
Killing microorganisms - Harmful to humans/animals, eg: Bacteria
(P.gingivalis).
'Adapted system 'seeks and/or 'guides (user) with its generated formulae to
achieve the desired acidity or base
'associated with a chemical that kills ('seeks &'reacts) (specific) bugs:
. Bacteria (P.gingivalis) its sequence: tcc aat gaa ttt gct ect att ttc gaa
tga aat ttt tcc aat ttt cct tga.
2: Inserted into chemical formulae designed to kill it e.g. citric acid at a
concentration of 0.1 normal. This
resutts in formulae going clear (hence it is safe(r).
--When ('w5) Hydrogen Peroxide / *Sodium hydroxide solution which is base
enough (to show pink from
'indicator), user knows that it is a good solution to place the bacteria
element into, e.g. dentures.
200

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
'Visual analyzer determines from an indicator that a chemical solution's
'status has 'scored high enough to be
'adapted to the need for killing the 'designated ('tagged) bug.
Entire patent application ([can] with its explanations) be one or more
sequences and/or software codes. There
are well over one million possible combinations we wish to submit to the
patent office however, current patent
office regulations would require us to spend well over US$12,000,000.00 just
in per page filing fees.
Traditional sequence filers are exempt from paying $12 per page after the
first 430 pages (first 30 pages free,
plus 400 extra per page fees). Hence readers need to read our condensed
version herein. It could be more
condensed but we put in the extra years and page fees to assist with
comprehension. The information needed is
linked to from this patent application.
Adapt's Sequencing system can use: 'Content analyzers, plus 'Order & Timing.
They apply to how elements
from atoms up to complex molecules and (software for) electronic features are
organized. Even the proper
placement and order of the features can involve sequencing.
CONCLUDES THIS ADAPTATIVE SEQUENCING SECTION
File: Adapt / Adapt *
ADAPT *
(Maybe Less Important Specifications. For Techies.)
2D-021 SYSTEM REACTS TO EXTERNAL PRODUCTS according where (w5) they are:
Eg: Incoming-Call Identifier - Screener / External Element Identifier.
Calls from desired tel numbers have a different ring. Hereby caller knows
whether to pick up the call or not.
-(Designating different type connections / (incoming) calls related to another
of our ideas?): sys responds
differently depending on which other N/sys/existing product wants to
"interact" with it.
--sys knows identity of other part/sys via its: "access" / code / tel #/ uip
(behavioral characteristics of N, or U:
how it moves / functions / responds (to stimuli from central "C" or "M") /
visual analyzer / sound analyzer.
-If user walks over to device, the caller's tel number and or name... appears
on screen ("S").
-D: Central Product / Sys = C= sensor / analyzer / uip analyzer / caller ID
sys part = tr/rc = External Product /
Sys.
-OTD: ACCESS *(); BVA (); CID (); CAMERA (LENS) (); CART (type uip or senses
or data sought);
CLAP (); INFORMATION RETRIEVAL (); K(); M Q; MIC (); MOUSE Q; MP (); MULTI-
USER ();
NOTIFIER (when desired contact has been made with part or organism); PR (); PS
(location of external
product is a determining factor in deciding if any/type connection/contact is
to be made); R(); ROUTER
(routes external product by their type nature); S (shows status); *SCORE ();
SOUND ANALYZER (); TDS
*(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK 0; VISUAL ANALYZER
VOICE MAIL ().
201

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-A sensor that connects to u (human body, eg: finger wrap; animal*) to read
electromagnetic signals generated
by the skin. Proprietary software interprets those signals and translates them
into actions. Being researched by
company: Other 90% Technologies Inc., Sausalito - See Wall St. Journal 1995
(maybe 6.95) article titled: Mind
Games: Soon You'll Be zapping Bad Guys Without Lifting a Finger. Finger wrap
version will sell for $100-
$200.
-4E020 Content Date Stamper: Registers and organizes previous occurrences.
-See "Brain".
% US Pat # pertaining to helping u develop new N, eg: for "D" directory KN:
5153830 Method and apparatus
for providing assistance with respect to the development, selection and
evaluation of ideas and concepts.
-US Pat No's: search str in Bib 9.94: (adaptor adapts) and user*: 5324021%;
5208898 Adaptive knowledge
inference method and system; 5313532% Recognition of patterns in images;
5212821 !o Machine-based
learning system; 5092354% Cosmetic kit: make-up; 4700295 Forecasts bank
traffic and scheduling work;
5321626 battery performance / forecasting system; inventory control: 5237496 &
5287267 & 5128861;
5136502 "analyzing" health care liabilities; agricultural forecast 4837146;
compatibility forecasting 4711632;
4197854 patient danger forecasting; game playing involving forecasting
3473802.
--search str: 1] (adjust or adjusts) and user* - barely skimmed; 2] forecast
(did only Bib 6.94 disk).
.'Tailor and 'Guide: 'Tailor = SW: For: (automatically) suggesting how sys can
better tailor itself to u's needs /
helps get product ideas / helping U brainstorm.
Introduction to formulae generation systems: Software used in developing /
analyzing / evaluating formulae for
food, chemistry, indicators, etc.
-uip of desired function is matched= w uip of differing elements / ingredients
/ chemicals / food elements =
resulting in fonnulae of ingredients that may (best) achieve desired goal.
--the characteristics of goal are tied= via uip = to characteristics of
available / known ingredients or * (KN) sys.
+ Important parts: UIP-Tailor, 7G050, PR, Track-Analyze (analyzes for what is
best to track = db),
Brainstorming SW, 2E010 20 30 40 50 Recipe Softwares.
. General Examples:
1] develop an nr for desired application = alerting presence of salts / acids
/ hazardous elements = in/for: liquids
/ powders / surface contact. 2] Other applications for 7G050. 3] SW sys may
simply help u by offering
suggested possibilities: formulae / equipment / sources of information
(reference material, on-line sources) /
type experiments. 4] UIP-Tailor = UIP-DB: adjusts to u's needs: Gives ideas to
u = from which u can choose
= then sys reacts accordingly by offering such tailored functions.
-Example: u using information highway software often requires more than two
minutes before u requires M
(mainframe computer) to act = resulting in sw asking u if they still want to
stay connected = frustrating u by
requiring them to respond to such petty questions. It may also be problematic
for u to locate where in the
software they should go to stop such prompts, but if sys were to offer such a
suggestion as, would you like the
202

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
default mode to give you 10 minutes before such prompt (after sys has
determined ("status") 80 percent of the
past 50 interactions between u and m were at least 10 minutes wo activity).
--Result: sys tailors itself to u, by first giving u a choice in matter -
maybe u wouldn't want the change to occur
wo their acknowiedgement. Manufacturer determines to what degree uip-tailor
will suggest or bypass former
and simply alter itself to u's need.
5] Constitution needed in plastic resins / metals / product casing ("cm",
"cp") or parts, for = tolerating
designated levels of: stretching, bending, pulling = within designated
environments of varying (extreme):
temperatures, light, abuse, excessive wear, time period of element's use (age
of N). 7G050 related.
6] Patent search strategy for idea suggestion generation sys: software* and
(formulae* or recipe* or
ingredient*)
7] Pharmaceutical: developing ingredients for drugs; ideas for research.
-KN: medical prognosis sys that studies all the characteristics of illness in
determining type of illness = 2E
suggests possible medications.
-Suggesting possible combinations for drug to solve designated illness /
problem: file for each aspect in
situation (uip-db) matched w = files of existing / potential future drugs or
chemicals.
8] Brainstorming: Software simultaneously designed to help researchers
increase their (sociologically,
psychologically related) creativity: KN
91 Nutritional recipe generators based on needs.
Indicator Examples: 7G050
i] Indicator type 'Guide [also called 'suggester']: Researcher anticipates
they will be coming into contact w
7G050 related: diverse (hazardous) chemicals / harsh environments -> Those
chemicals / environments are
keyed into computer -> C "analyzes" for type indicators that may nr more than
one of these (unrelated)
chemicals / environments [sw tries to find indicators that can be compatible
in seeking diverse chemicals /
environments] -> suggestions are made to u -> u may next need to do additional
research via: this same sw /
other references sources / do experiments testing out the sw's hypotheses /
stated facts.
2] Body protection device suggester: Researcher keys in that they will be
working with three differing
chemicals (of differing acidity) -> sw suggests which 7G050 type gloves to use
for all / each situation /
occurrence / type activity (eg: working with sharp objects in such liquids
requires thicker gloves) -> Designated
gloves can be identified by glove's manufacturer / model number / generic
type. Sys may also suggest other
protective gear used in hazardous situations, eg: aprons, body suits, masks,
goggles, gas masks, shoes,
(replaceable) filters for HVAC [Heating, Ventilation, Air Conditioning sys].
-sw used on case by case, day by day basis, or planning future long term
projects, or + designing new research
laboratories, eg: type surfaces (paints, flooring, counter top materials, air
filters....).
3] UIP: Characteristics of u are "analyzed" -> sys makes suggestion: U will be
having likely designated
occurrences (outlined in 7G050) = sw suggests: types of protection (protective
gear); methods of (cautious)
research (protocols) already determined to be safe via reference manuals on
the subject or sw (db).
203

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-"PR": sw (re)programs itself = as controlled by UIP; programmer can help
guide / control sw.
For Techies: U= This N Sys (sw suggesting formulae) ~ C
ACCESS Q; ANALYZER (); BILL (); CART (); EDIT 0; EDUC (); MULTI-USER (); PR Q;
Q();
ROUTER (); +SCORE (given to each aspect = attached to each element of: goal &
potential ingredients);
SENSOR (7G050); STATUS (); TDS (scores time delay in getting NR effect); TRACK
(history of previous
(chemical/food) experiments conducted by: u, organizational body, db, m); U
(researcher, student= "educ");
UIP ().
. D Overview - How parts might fit:
. For Techies: U/ Other (KN) Sys = This N Sys (software used in developing /
analyzing / evaluating formulae
for food, chemistry, etc.) - C=
. For Techies: PS - R - Tilt; Zones - Monitoring; Zones - Utilization; Access:
u needs to usually continue to
develop formulae that match those u developed w sys before. Villains wo most
proper knowledge can be
noticed (nr). Access allows for normal percentages of cases w negative results
(caused by human error). 4E020
Registrar. 4E030 Image. Input Access Sys.
+ Indicators: 7G: hazards, novelties, el monitoring of events: formulae for
developing needed indicators
developed.
. Technical: How files in db = match / compare up w / relate / score w= data
provided to begin search by: u
another sys.
Salt Avoidance Recipe Generator Steps: Suggestions on replacing salt in bean
soup:
1] User may normally.prefer the saltiness taste to equate at 0.5% of soup
volume to be real salt.
2] This preferred percentage is determined via: what u k / nr placed in soup.
3] U k 2 liters of soup will be made, and lists volumes of ingredients making
up 2 liters *(both before
combining, then after coming (and evaporation) - though latter can somewhat be
calculated by sys). Example: I
liter water, .4 liter kidney beans, .3 liter potato.
4] U lets system to 'recommend other ingredients (if no real salt were
actually to be used).
5] System's db "analyzes"/shows (s/printer) other non salt ingredients shown
to statistically satisfy a large
percentage of population (in u's zone) who are on salt restrictive diets.
"Score" for each of those ingredients on
salt replacement value. 6] Those ingredients that came up in previous step are
next "scored" for their
compatibility w/ existing ingredients u already (fairly) decided to keep in
soup. Each food ingredient in db has
many sub-files, each sub-file being the type application / situation / type
food such ingredient may be used in =
and the corresponding "score". Example: carrots get high score for soups in
general, yet a higher score in sub-
sub-file: western vegetable or meat soups, but lower score in sub-sub-file in
Japanese miso bean type soup.
7] The differing "scores" are= "coordinated" / "analyzed" -> suggested
ingredients are grouped into differing
sets / files of ingredients. Compatibility of ingredients with each other in
designated sets (including ingredients
required by u) based on db of past statistical taste studies for how such
combinations (may) satisfied people.
204

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
8] S / Printer shows = Suggested recipes = to U. The order in which they are
shown might be those w higher
"scores" for the set, or by other means, eg: cost, "score" for how all the
ingredients are commonly available in
u's zone's supermarkets, uip - db for what u liked in the past, etc.
. Indicator Development Idea Generator Steps: SW will suggest what u can use /
do / replace / alter in their
(research) plan / strategy / process.
1] All type materials in situation are entered into= computer, eg: type
hazardous materials (acid, pH level,
7G050 chemicals listed). Eg: type + gloves, type + containers holding
chemicals, + acids and where they are,
where acids might spill, environmental effects (temperature, time span (in
which acids will be in contact), other
circumstances.
2] The files for characteristics for each of these elements is either known by
sys (uip-db). If the db exists it was
compiled by: "analysis" of research material, surveys of chemists %, developed
by u (or their company) for
future applications (by other researchers of the company).
-Each element has different files, according to the circumstance of its usage.
"Analyzer" determines which sub-
files are applicable via, eg: label of file, % key word search, "status"*,
uip.
31 Files are matched. Examples: only 2% of glove/container types are suitable
for working with acids = next sw
determines three best gloves/containers for said acid, listing best first.
4] If u is unable/unwilling to make changes in glove / container, sys can
suggest differing acids, or time period
during which work should be completed.
5] If all suggestions by u are good, sys can "score" what u planned to do /
still give other better / good but worse
options / precautions (whether using products or not, and if so, how they
should be used) = S/Printer.
6] While research is taking place = "sensor" ="analyzer" = NR: when sys
determines there is or could be (based
on score) a situation needing special attention (danger, loss of money,
inability for u to get desired results).
Large Diagram Begins Here: The following 'Diagram Insert #]' is for the large
diagram below it, titled:'D-#]'.
The OTD D below 'D #I' is a subset of the latter. All parts converge in the
central computer in 'D #1'.
.'Diagram Insert #I': For +D-#1
Type suggestions made by sys to achieve needs stated by u (so suggested future
N or sys functions as needed in
future situation / environment and able to handle designated occurrences as
envisioned by sys / u.
Suggestions are made by sys: for one or more of following: NR type - 7G050.
Protective gear type suggested:
against (chemical 7G050) hazards. PVC Resin / metal constitution. Formulas:
pharmaceutical, food recipes, pvc
resins. Other Formulas.
-Likely scenarios: how to prepare for: fire and other natural disaster drills
/ preparedness. Accidents: (chemical)
accidents; vehicle; building (collapse). Desired effects: any (el) %KN, any
(el) %N, as prescribed by UIP-
Tailor.
* OTHER: IJ010 Body Movement Notifier: how sys can adapt to different: sized
people / applications. 2E010
20 30 40 50 Recipe Softwares: 3E020 GPS Record Keeper: what records might want
to be kept, which zones
205

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
are important, drawing boundaries between zones (based on uip of situation).
3E060 Interactive Morning
Alarm: what q sys should ask = matched w uip of u/ what u has to do later that
day [sys puts u into mood for
predicted occurrences/work]. 3E061 Body Motion Instructor. 3E150 "PS-Zone":
which zones are important,
drawing boundaries between zones (based on uip of situation). 3E151 GPS
Circumstance Correlator and
Controller: which zones are important, drawing boundaries between zones (based
on uip of situation). 3E180
GPS Locator: suggests where to begin looking or what needs to be found and
how. 3E190 GPS Billing Systems:
which zones are important, draWing boundaries between zones (based on uip of
situation). 3E040 & 41 Tel
Noise Canceler: what environmental sounds might be semi-canceled (at the risk
of impairing listener on other
end from part of speaker's natural voice). 3E210 Indoor GPS Extender: where /
how extender could be used /
placed. 4E010 Alternator: which activities offer greater battery power build
up. 4E030 Image Input Access Sys:
what images sys may use to trigger designated functions (access). 5E020 Magic
Wand. 3G010 Tel Ring
Delayer. 4G190 Insulated Scoring Ball: how to play / develop new "games".
4G200 Fruit Encapsulator: how to
adjust itself to cut in ideal manner. Other methods for peeling, cutting,
processing, cooking, canning the foods.
5G061 Dyslexia SW: how u may wean himself off the software; how sw may help u -
eg: tests u first -> "scores"
-> analyzes -> suggests -> s/printer. 5G070 Speed Reading SW: how u may wean
himself off the software;
how sw may help u -eg: tests u first -> "scores" -> analyzes -> suggests ->
s/printer.
D# 1: U=(+ See: ' Diagram Insert # 1') - C=
ACCESS: Access restriction strategies suggested: db of past hacker / villain
activity = matched w = db of
known / existing / available remedies or traps = suggested "access" control
strategies =[security manager's
suggestions = k = access - analyzer - sys]: sys analyzes any input from
security mgr during the multiple steps
via which sw w= mgr together brainstorm for strategies. ANALYZER (); BILL ();
CART (); EDIT ();
EDUC (); MULTI-USER (); NR (); PR (); PS-Zone (); Q(); ROUTER (); SCORE ();
SENSOR ();
SOUND ANALYZER (); STATUS (); TDS (); T(); TILT 0; TRACK (); UIP (); VISUAL
ANALYZER ();
VR* (); WA Q.
OTHER: UIP-Tailor & UIP-Suggest: see suggestion sw (being) developed from 2E
files.
+ Five senses are altered to match user's tastes:
Senses: images (see "edit"); sounds (see sa); "vibration"; odor releasers (see
smell "analyzer" details mixed
throughoui files; *taste (see A dir KN). "Synthesized" music / sounds altered.
Related to A or B* dir KN
where games are sold via vending machines and tailored to buyers.
+ "Game" application: UIP Game Effect "Editor": U is requested to experience
different effects like sounds and
type images. The U's response is "scored" and intern the game's effects are
tailored to get a more desirable
response from the players. Each game's aspects has multiple "editable"
choices, and sys utilizes those best
matching player's preferences.
-images: see "edit" = images; colors; textures of skin or objects; size
-206

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-sounds: sys "synthesizes" sounds (in its memory); sa scores sounds.
-"scoring": to match u's tastes: human body "sensors" are placed on player
(skin) to gauge reaction levels; u
personally k in their (multiple choice) preference of effects.
-What's scored: user's "mood" reactions "scored" / "analyzed": pleasure;
excitement; passion; fear; relaxation
(between episodes, type of break for player, so they don't over exert and
tire= in tern playing game longer).
-How sys utilizes player's preferences: User asked which of 12 effects elicits
greatest: passion. Then when
passionate encounters occur in game, that "edited"/"synth" version is
utilized.
-User generated effects: players can program / create / record (mic) sound
effects into the game itself.
3E061 Motion Tutor: 'Guides users to improve their movements according to the
user's needs.
Diagram #1: ["Tracker" / "analyzes" = U's behavior / db (description of U)] =
C (sw = develops sw / programs
which are tailored to (u)) = (desired/desirable) function(s).
-Developing UIP: UIP (of U / other element being matched) compiled from any
source including:
questionnaires (answered by U / service providers); monitoring organizations
(Dunn & Bradstreet, TRW); any
KN monitoring /"tracking" / "scoring" system(s); UIP.
D (Diagram): data input = analyzer = memory (M, cart, recognizes multi-user) =
analyzer = data output =
function
.-5A-810-042003 Advisor: compiles and analyzes user's information.
-OTD: fd-hdd; both pp and mp program how they want the system to collect,
retrieve and analyze the data in
database; uk; tds (when and how elements occurred); educ%; M%; score (score
information can be processed
for the UIP database; and UIP can help generate desired scores); cart (for
additional data for the database; and
or software for processing the database); uq (pi database is used to help
generate answers about, eg: about user's
past preferences and or activities); mp (the database and or software can help
prompt questions, eg: to expand
the database, guide the user in the right question if the system first gets
the right information); access (limits
access to sensitive information within all or part of the database to people
with the right password).
-Article in "Scientific American", p.64, April 1995. Article title: "Machines
that learn from hints". Its about:
Machine learning improves significantly by taking advantage of information
available from intelligent hints;
discusses the algorithm process in general terms; gives differing examples,
eg: computers judging how much
credit to give to credit card applications based on other similar people's
past histories.
-UIP formerly titled "PI".
-U or Computer (Administrator) can select which UIP mode will be used /
desired.
-Brainmaker 2 - (Professional version), p.76. [Existing N functions: Gives PC
human abilities such as finding
patters in your data and learning from the past.]: UIP-track.
. For Techies: Part #1: Electronic device obtains information about the user
by one or more of the following:
remembering user's previous performance, eg: their abilities and or
difficulties on this, or related devices (which
transmit uip data to other units via wire, or %wireless); asking questions
from user, or "M"; user takes one or
207

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
more test(s), the type and quantity are determined by the desired application
of product; another person or
device (M) gives information about user; etc. Device recognizes more than one
user by multi-user, eg: their
codes used to gain access into device. Personal information is stored in
memory and used by device to more
intelligently tailor itself to user's particular needs. The manner in which
invention tailors itself to user's needs
can alter according to: small or big changes in uip database, pp.
. For Techies: Part #2: D (UIP) =
"Billing"; User can take their cart (their personalized uip for all identical
or related products) from machine to
machine, eg: % existing card used to both activate and select desired
preferences in car stereo systems; different
cart effects user's uip differently with the correlated changes in functions;
type "character" changes according
to uip (if a display ("S") is used); date; uip data can be viewed on display
("S") and or printed out; uip is used
to increase the user satisfaction quotient, eg: entertain, (Apossibly by: way
in which function operates, sounds,
lights, words are used to better create the type of electronic effect uip
indicates is more likely to increase user's
positive reaction to using product [test studies are conducted to see the
reactions of people in test case studies of
50 - 1000 people]); "C"; % uip can support interactive (by giving the
additional data needed to better tailor
invention to user; % data obtained for uip's memory from microphone ("mic")
(voice recognizer); mouse; mp;
multi-user; uip's database guides system's functions (determines the type,
manner, timing, whether or not to
notify, mq, osc, synth; pp; uip database influences printer's print out
parameters, score, speech, vc, manner in
which it functions'as a semi-toy, it prompts - accepts - processes uq; tds;
uk. Data is also obtained via~: "uk",
"cart", "tel", "mo", scanner; UIP can be programmed/understood with the help
of: psychologists, sociologists,
marketing experts; U's city (tel area code/zip code) / caller id / location
based on pd effect how system
interfaces w U.
. For Techies: D: data input/output=tr/rc=c. C85 Electronic translator speaks
out desired words/phrases.
Fuji/Xerox 29 Aug 92 NK_ D: C85="tel". %-o-Cl 12 Computer predicts human
error. Input UIP (working
conditions of person). System predicts errors they're likely to make. 30 Sept
92 YD.
-utilizes fuzzy logic
-UIP was formerly titled PI (Personal Information).
-Sys analyzes u's actions -> database (behavior). Eg, Ubiquitous computing: u
carries (tiny) "c" that
communicate with other "c" embedded in: appliances, t, cars, walls, Kays' N.
Eg: Xerox's Parc Tab, and other
products mentioned in "Popular Science" Feb 95 from p.47.
-Marketing Enhancement Systems: UIP suggests /'guides users to alternative
products or services.'system
judges may suit (part of) their needs.
-Publications Related:
"Collaborative Filtering": comparing people's 'behavior and preferences with
those of other people ('users)
who match a similar profile to 'predict what additional info might be relevant
to that person. From *' Net
Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
='Datamining": open-ended queries of customer data and other info sources; and
to automate the process of
'predictive models of consumer 'behavior.
208

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
- ? "Dialogue Marketing": adjusts info delivered to the customer based on real-
time interaction between the
customer and the co. 'Predictive modeling and datamining techniques to enable
a more 'tailored "dialogue"
with 'users (customers) in (real) time.
.-Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
(c)1999.
-"Experience Communities": Aggregated pools of knowledge based on the
collective experience of many
people ('users).
.-Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
(c)1999
-"Flex Pricing": 'System 'tailors prices to demand and supply (automatically).
.-Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
(c)1999
+ Predictive Modeling" From *"Net Future - The 7 Cybertrends", Chuck Martin,
McGraw Hill (c)1999
-"Preemptive Marketing": 'Tailors marketing, eg: Eliminates future consumer
decision points that might lead to
loss of business.
.-Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
(c)1999
-"Pulicasting": 'User 'tailors which information or features they receive / or
are able to utilize; but also creates
such content / features / services.
.-Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)
1999
-"Relationship Age": 'Systems communicate with 'users for [free] exchange of
info/data to better perform
'tailoring functions.
: Aiso see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
=
-"The Shadow You": Electronic re-creation of the essence ('behavior profile)
of a'user's behavior. The
'database on 'user(s) for (purposes of 'tailoring).
.-Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)
1999
Search Key Words For Searches On Related Patents Include: "data base", adjust,
tailor(s), tailored,
adjust(s/ing/ed/ment(s)), alter(s/ing/ed), "(system/software/invention)
learns", "self learning". What search
strategies, and other terms?
TAILOR FEATURES - SOTTO N
4J030 FUTURE LIFE - FIND MISSING PEOPLE:
This may be helpful in finding missing children or fugitives. There already
exists age progression art which
predicts what someone would look like after a certain period, but what about
what they sound like, act like,
etc.? This can enhance such an age progression description. 'Tracks,
'Predicts.
6B-590 COLOR CODE - READING PRODUCT LABELS:
This can be used for reading food/drug labels. Suppose I need something that
is sugar free, for example. I
could read the entire label to see if it contained sugar or not, or there
could be a color associated with this; I
209

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
program my scanner to check if the label has this color and, if it does, know
that it fits this criteria. 'Visual
analyzer, 'bar code reader, 'score.
3J070: AUDIO ADJUSTER - FITNESS:
This can be used for exercise classes or individual exercise sessions. If you
have ever taken an aerobics class,
you know that the instructor uses different music for warm up, high intensity
and then cool down stages of the
class. Suppose a device. automatically sensed whether a group or person needed
to increase heart rate, slow
down, needed a change of pace, etc. and used music tailored for these
situations. 'Entertainment, 'Guide,
'Exercise.
MISCELLANEOUS:
Check Forgery: Have a pen that a bank issues with a checkbook. If a check
amount is suspiciously large, or
the check is suspicious for any other reason, the bank can check and see if it
was signed with the accompanying
pen or not; if not, it was probably stolen; they can call the customer and see
if, in fact, it was his signature or
not.
. Scientific Use: Scientists may be able to use this to identify chemical
compounds by seeing if they are exactly
the same color as some known compound.
. Agriculture: A plant is a certain color when ripe. Perhaps the scanner can
determine when it 'is ripe, as well as
when it is diseased. Plants that are not a ripe, healthy color will trigger
the scanner.
. Education: Like the fitness example, the device could tell is a student or
class was tired, nervous, distracted,
etc. and play music that was appropriate for their needs. It can be used for
both classes and when studying at
home: Relies on: motion 'sensor, 'behavior analyzer.
. Insomnia/drowsiness: Perhaps this device could play 'tailored music that
enables people to sleep more soundly
when they are sleeping, the feel wide awake when they get up.
. Addictions: Like the above example, perhaps this device can lower cravings
for nicotine, caffeine, alcohol or
sleeping pills by enabling people to feel more wide awake or relaxed as need
be via 'tailored: music/sounds,
'exercise, 'entertainment, 'education.
System tailors its functions to the unique needs of specific users. Each user
can have their unique profile stored
in adapt-Database, which includes their: needs, preferences, and behavioral
traits. Tailor then matches the
database, with a menu of function choices. The function chosen is the one that
best meets the user's preferences. =
-adapt-Input develops the adapt-Database by: 1. 'analyzing user behavior, 2.
Allowing user to input their
preferences, 3. Linking to other databases with user's preferences.
-Integrates: 'Edit, 'Educate, 'EGH (Educ Gets Harder), 'Guide, 'Interact,
'Predict, 'Seek & React, 'TGH
(Therapy Gets Harder), 'adapt-Emergence (2G180), 'adapt Tailor.
210

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Tagged Cascade Effect 7J08: System hones in on a frequency (sound), then
cancels other sounds making
tagged sound clearer. System 'reacts when the 'tagged action occurs. Hones in
on anything effecting man's five
senses. 'content analyzer, 'edit, 'seek & react, 'sound recognizer, 'tailor,
'visual analyzer.
-See many huge adapt files..!
CONCLUDES THIS ADAPT* FILE
CONCLUDES THIS ADAPT CENTRAL DESCRIPTION SECTION
File: Features Intro / Analyzer
ANALYZER
Like the word "analyzer" suggests, it attempts to match the human brain in
making decisions. Decisions are
made from a choice of preprogrammed possible 'reactions. Using fuzzy logic, it
takes on the needed functions
of software, as would be needed to handle the applicable tasks called for.
System tries to think like a human brain (where (w5) feasible), sys (system)
tries to know its limitations. Uses
the best knowledge in the field. 'Analyzer 'customizes itself. Uses the best
knowledge in the field (from
'sensors, UIP, etc).
Figurative Drawings
D1: I signals -> 2 data from particular input (item being analyzed) -> 3 put
into file(s)] = 4 tr/rc = 5 c (6
existing files )= 7 matched/8 compared w 9 inputted files = 10 similarities
and 11 differences noted = 12
type/level of differences 13 determined/14 "analyzed" = 15 conclusion made =
16 signal = 17 action made by
18 sys / 19 s or printer shows conclusion.
-D 1 Notes: 1: optional part of data flow; sounds = 2 sound analyzer; lights;
body movement =(2 sensors);
visions = visual analyzer. 2: communication w other el products; c. 3: sw;
different files are pre. or
automatically labeled according to type situation according to
circumstances/occurrences (1). 6: files
developed earlier by manufacturer (mp), or u's pr. 7& 8:
similarities/differences noted/analyzed via: key
words/paragraphs%, visual analyzer, SW ('software) number crunching. 9: data
from 1, 2, 3, 4, 5. 13 & 14:
sw analysis. 15: SW ('software) analysis. 16: computer code labels the type
situation sw has determined to be
the case, eg: favorable, unfavorable, and or what action is needed to be taken
(due to the "status" of situation).
-D2: input -> c (analyzer (sw)) -> results / function (altered according to
how sys may want to adapt according
to determination(s)/conclusions made by analyzer).
-D3: Read Later D C (SW Analyzer) =
ACCESS (determines w5 can access into any given sys (c, m, any portion
thereof, eg: particular files or
software programs/features)/ BILL / CART (differing SW ('software) for type
analysis needed)/
211

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
COMPOSITION / DATE / S / EDUC (sw determines u's level of sophistication (w
sys/sw) = intern
simplifies/complexities the SW ('software) interface (and available functions
/ steps needed to achieve desired
aim (via pr/k)))/ K ('keyboard) / LOCATOR / M (uses M's database(s) for
(additional) information from which
to (better) determine analysis)/ MQ (sys asks (intelligent) questions to
better collect needed data for better
analysis; development of uip)/ MULTI-USER (analyzes (tasks/things/occurrence)
differently according to
type/uip of u; development of uip)/ NOTIFIER (u alerted when analyzer
determines u (user) (may) need to
know (status))/ OSC / PR (how analyzer is to function / what its to seek and
how process information / for w5)/
PS (determines location of object(s), processes information accordingly (as
pr))/ Q (decides what questions to
ask u (user) according to circumstances, eg: what u (user) wants or is doing
(w5), u's status*)/ *R / SCORE
(new scores matched with earlier developed files for analysis; creates new
files for new scores, development of
uip)/ SENSOR (compares files for inputted signals w (with) what is
wanted/needed/expected/is standard/has
historically occurred before (uip/m/database))/ SOUND ANALYZER (compares
inputted sounds w previously
stored sound files)/ SPEECH (sound analyzer)/ STATUS / SYNTH (sys synth
(automatically) according to:
pr/uip/u's k)/ TDS (effects score, development of uip)/ T (telephony sw
applications)/ UIP (compares files)/
VISUAL ANALYZER (compares files, 2E251 Intelligent Monitor)/ VR* (compares
files).
-in some (simpler) circumstances, the analyzer functions wo software, eg:
simple turning on/off according to
situation.
.% Read Later This N Part:
-2E251 Intelligent Monitor: ; 3E040 3E041
-3G010 T Ring Delayer:
-5E080 System self analyzes best synthesis for acoustics of room/hall:
-7G050 7G051 PVC Change Alerter: ; 7G052 related kn.
-9G220 Channel Scanner Skips certain stations...
-"Analyzer" and how it matches and compares files and determines conclusions
also explained in UIP (UIP-
Tailor, UIP-Suggestion).
Fuzzy logic. AP = Applications: the related product applications, and
specifications, for the listed application(s)
are obvious.
-4E020 Registrar.
.-"Router": locates then= retrieves needed data= for this part.
'-Related existing SW ('software) from "TDSW":
Brainmaker 2 - (Professional version), p.76. [Existing N functions: Gives PC
human abilities such as finding
patters in your data and learning from the past.]: UIP, "track".
-ProTEM - Business Process Improvement.
212

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Takes on the functions of software as would be needed to handle the applicable
tasks called for by invention
disclosure.
* ANALYZER - READ LATER SECTION MAYBE _
Diagram 1: 1 signals -> 2 data from particular input (item being analyzed) ->
3 data put into file(s) = 4 tr/rc = 5
c (6 existing files ) = 7 older files are = 8 matched and compared w (with) 9
newer inputted files = 10
similarities and 11 differences between files noted = 12 type/level of
differences 13 determined/14 "analyzed" _
conclusion made = 16 signal = 17 function/action made by 18 sys (system) / 19
s or printer or notifier shows
conclusion.
--Diagram 1's Notes: 1: optional part of data flow; sounds = 2 sound analyzer;
lights; body movement =(2
sensors); visions = visual analyzer. 2: communication w other el products; c.
3: sw; different files are pre. or
automatically labeled according to type situation according to
circumstances/occurrences (1). 6: files
developed earlier by manufacturer (mp), or u's pr. 7 & 8:
similarities/differences noted/analyzed via: key
words/paragraphs%, visual analyzer, SW ('software) number crunching. 9: data
from 1, 2, 3, 4, 5. 13 & 14:
sw analysis. 15: SW ('software) analysis. 16: computer code labels the type
situation sw has determined to be
the case, eg: favorable, unfavorable, and or what action is needed to be taken
(due to the "status" of situation).
. drawing 2: input -> c (analyzer (sw)) -> results / function (altered
according to how sys may want to adapt
according to determination(s)/conclusions made by analyzer).
. drawing 3: C (SW Analyzer) = ACCESS (determines W5 (what, where, when, why
and how) can access into
any given sys (system) (c, m, any portion thereof, eg: particular files or
software programs/features)/ BILL /
CART (differing sw for type analysis needed)/ /COMPOSITION / DATE / S / EDUC
(sw determines u's level
of sophistication (w sys/sw) = intern simplifies/complexities the SW
('software) interface (and available
functions / steps needed to achieve desired aim (via pr/k)))/ K / LOCATOR / M
(uses M's database(s) for
(additional) information from which to (better) determine analysis)/ MQ (sys
asks (intelligent) questions to
better collect needed data for better analysis; development of UIP)/ MULTI-
USER (analyzes
(tasks/things/occurrence) differently according to type/uip of u; development
of uip)/ NOTIFIER (u alerted
when analyzer determines u (user) (may) need to know (status))/ OSC / PR (how
analyzer is to function / what
its to seek
and how process information / for w5)/ PS (determines location of object(s),
processes information accordingly
(as pr))/ Q (decides what questions to ask u according to circumstances, eg:
what u (user) wants or is doing
(w5), u's status*)/ *R / SCORE (new scores matched with earlier developed
files for analysis; creates new files
for new scores, development of uip)/ SENSOR (compares files for inputted
signals w (with) what is
wanted/needed/expected/is standard/has historically occurred before
(uip/m/database))/ SOUND ANALYZER
(compares inputted sounds w (with) previously stored sound files)/ SPEECH
(sound analyzer)/ STATUS /
SYNTH (sys synth (automatically) according to: pr/uip/u's k)/ TDS (effects
score, development of uip)/ T('tel)
213

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
(telephony sw applications)/UIP (compares files)/ VISUAL ANALYZER (compares
files, 2E251 Intelligent
Monitor)/ VR* (compares files).
-in some (simpler) circumstances, the analyzer functions wo software, eg:
simple turning on/off according to
situation
END OF THIS 'ANALYZER FILE
File: Art\Ar Intro & General
ART FEATURE
Table of Contents for Artist Section:
AR Intro & General
AR IMIS
. AR IMI
AR Write
. AR Cause
AR Crawl
AR Educ
ARMerge
AR ReadHelp
. AR ReadHelp*
AR Dys-Ed
AR Dys-IMI
AR Dysl
. AR Dys2
. AR Dys App
Artist Misc*
Use Our Masterminded Patent Application To Improve Your Artistic and Editing
Ideas! Learn about our quick
and easy licenses. Call (+] ) 707-428-5000 www.LicenseltToday.com
Tailor pictures to your taste. System's 'Visual analyzer with wide powers,
determines the characteristics of the
image to be altered.
. For Techies: 'Edit pictures. User alters pictures or text. System alters
images for user (in 'tailored form).
. Functions: accentuates images; automatically 'edits as programmed (so as to
best 'tailor itself); improves
visibility, readability, excitement, user's interest in (multi media)
presentation; images are made to 'interact w/
214

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
(with) user or other images on screen; 'cut & paste software function; user
'draws images; 'visual analyzer
studies 'images created by user or other source.
The Following Are Electronia Art Generation Elements:
-# 1 OTD: D =
*5A-110-042003 Master Artist: make masterpieces similar to the masterpieces or
choose your own. Select
painting desired, and electronic device will help guide user in any one of
many methods. Incorporate different
parts via selections and or drawing.
*SA-120-042006 Camera Editor: Take photographs, which you can then edit on the
related computer system
(camera and editing aspects can be on same or different pieces of equipment).
*5A-130-042004 Color Sticks For Computer Drawing Pad: Simplifies computer
graphics system for children.
Child inserts plastic piece for the desired color.
*3A-110 Antenna Art
3A-580 Air Pad
*"Sound Analyzer", and "Sound-Vision": used to convert sounds into visions.
*"Composition": sound effect composition might work in parallel or in synergy
with "Artist"
* "Remote"
3A-790 Magic Air Pen
*5A-620 Virtual Reality Invention Laboratory.
"Bi1P'
-OTD #2: display; fd-hdd; pp; mp; uk; mouse; toy; basic; printer; M%; osc;
speech; md; cart (image creating
software options); cp; uq (eg: how to operate software); mq (eg: how user
wants to generate their art); U1P
(system generates graphics according to past images user preferred; such user
preference can be inferred with
some margin of error based on the graphic editors selected earlier and or the
types of images user made in the
past - this "pi" system might be an optional mode, and valuable considering
that it might be too complex for
some users to select the graphic image editors that he might like most);
character; motion sounder% (activates
images according to how a device is moved, while simultaneously making a sound
corresponding to the type
motion); multi-user; cc; notifier; tilt (graphic image editor is effected by
how the part and or device is tilted); air
pad.
-El meeting place:
Improvement on US Patent 5347306: "C" - Animated electronic meeting place for:
business / "education"
/
"interactive" meetings / "games" / "entertainment"
ACCESS (needed for each participant (u) to join) 1/ ANALYZER (how / w5 sys
functions as desired
(according to uip-tailor/pr/k)) // EDIT (actions/statements/responses from u)
// NR (when u is asked to
respond or should notice designated occurrence(s)) // OSC (verbal
communication) // PR (how each u
215

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"interacts" w/ each other / sys) Q (answered differently according to u) // R
(u's control / communication
device) // ROUTER (each participant / their communications, routed differently
to others = according to: who
(u) the sending / receiving u are / w5 of situation) // SCORE (of each u) //
STATUS (of: each u / their
actions) // TDS () // T (how each u "interacts" w: other u/ m) // TRACK
(progress/changes of each u) // [
UIP / "Multi-user" = (each u = experiences / handles sys differently =
according to u's unique uip-tailored sw) ]
// "artist" // "composition" // "educ": each u = "interacts" = learns from or
teaches other = u (in different manner
= uip) // "cart"
Introduction: Each / Most Artist KN also have a sw version - D: U = mouse / r
/ k = c-- image generating sw =
s / printer / [tr = another c] / access.
Fidelity Catalogue's Product Improvements: Many Non-electronic
* See catalog for details on existing products: The catalog containing
Fidelity's products was received on Dec
31, 1994. It's cover has black marble background with pictures of taxi, and
applique film system. Catalog
dated "Winter 1995".
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'1 Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725]
Portable Drawing Board: Sliding guides; corner clamps.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'l Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p.3]
Rotary Cutters: cuts pads, foam, etc.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'I Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p.3]
Clip Compass: draws circles by gripping (any) writing instrument.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'1 Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p.9]
Electric Eraser: for lead / ink.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'] Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p12]
Tracing / Overlay papers.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'l Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p.13]
216.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Waterproof paper: Use in copiers.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'I Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p. 13, 141
Non Reproducible Blue Grid (Paper).
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'l Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p.14]
"Access"
Graphic Arts (Masking) Tape
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'1 Parkway, Minneapolis, MN
5540. 800 326-7555 Fax 800 842-2725; p.151
3C292 "Images" of Magical Building Blocks: Each combination has designated
results.
Person generates and edit images. It can be compatible with existing
multimedia ("MM") hardware and or
software.
-D: 1 uk = 2 base ("C") = 3 tr = 4"S"15 function/6 M
-OTD: 2 access; I air pad; 12567cart; 1245cc; 4character; 4color;
2%composition; 2date; 4images are
"displayed", stored in 2memory, 234 projected onto walls (via color lights),
5converted into printed pictures and
or Scinema or 5video; educ; %egh; entertain; 2fd-hdd; 124float; 5fs
(send/receive images in black &
white/color = separate computer/e-mail/fs/special computer=printer located in
other location; game; 23%gps;
2interactive; md; 12microphone=4=5/speaker/osc/play back/stereo; 4mo;
25%morning (user must generate
specific images to deactivate the alarm: generate similar / related / unique
image. System may inspire ideas for
image(s), eg: one which evokes the idea of waking up, like running to catch
bus; I mouse; 2mp; 2mq; 2multi-
user; 5**notifier; 5*osc; 26pi; 1245portable; 2pp; 5printer; 124rcp; iremote;
2score; 5speach; 2tds tgh;
toy; l vc; 5visual analyzer; 5 vr (create images desired for your virtual
reality experience before I during use,
eg: have a virtual reality-type experience painting. This can inspire
individual creativity); 25 camera takes
pictures, allowing user to memorize and modify, eg: size, color, slicing,
adding shapes; 26 user needs visual
ideas, so they uk: w5 of situation requiring a visual piece / uip of person &
or co & or situation; %wa.
-See "Brain": sys adapts images for u.
-OTD: U = "Artist" Sys - C
ACCESS (limits functions, each movement of r / r stick 5E020 is interpreted
("analyzed") according to
password); OSC (each "Ra's movement can tie in w corresponding type sound); PR
(u designates which
217

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
movements of "R" represent which type of marks/functions 5E020); Q (U asks how
they can draw differently /
program their R differently (from what's stated in N description)); S
(interactive touch screen; color monitor);
%SCORE (drawing aptitude); (Motion),SENSOR (of R/%U); TDS (); UIP (DB: image
data bank);
%VISUAL ANALYZER Q.
.-"Router": locates then= retrieves needed data= for this part, eg: images
(from image data bank (db) (on m)).
-A code (access, el 'water mark') encoded in sw/data* limits how sys / program
can be: utilized (to operate
device) / "edited" / copied. See: "Access", "Edit".
-"Bill"
END THIS ART FILE
ARTIST - SUB-FEATURES SIMPLIFIED:
"COLOR" = Any color(s). Any "edited" colors match.
"CRAWLER" = Externally controlled image creating mode crawls across screen.
"CRAWLER'S VIRUS" = Crawler attacks other's functions. "Game's" opponent
player's functions represented
visually. Crawler "edits" opponent's functions inturn effecting their
abilities:
"CUT & PASTE" = Standard computer terminology plus more.
"DRAW" = Create image.
"EDIT" = Alters images in complex algorithms. Eg: "crawl"; makes colors or
shapes compatible; "cut &
paste".
"GUIDE" = Suggests how user might proceded in creating images.
"IMAGE" = Picture.
"INTERACTIVE IMAGES"
"MULTI-COLORER" = Same as crawler except user controls how crawler moves.
"MULTI-USER" = Each user "edits",each other's "images"_
218

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"SW" ("Artist") soflware; program.
"WRITING INSTRUMENT" = Mouse, stylus, "tilt".
File: Art \ Ar-IMI
ARTIST - COMMON FUNCTIONS FOR EACH ARTIST KN:
Intro: Each "artist" function theme below includes different
variations detailed in the grouping of related "artist"
inventions.
"ANALYZER"
Sys has a mind of its own. How it will automatically: "Edit",
"Draw", "Crawl". "Designating" "images" for labeling /
"coordinatirig".
% "Tracks" / "Scores" the "artist" occurrences / functions.
"BEHAVIOR ANALYZER" =
US Patent: 5507649 = "images" are "designated" to= match
accessor's behavior. Eg: children receive different images from
adults.
* "COLOR" = Any color(s).
.-Color Selector: (Printed) guide shows numerical code for
numerous colors. Software version too.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Int'1 Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; all of p. 4, p. 5, top p. 6]
--each numerical code used by "color" = "analyzer" for: color
"coordinating" or other "editing"; "mood" and ba (how each color
effects viewers).
:"colors" are changeable / refillable: (Refillable) Ink Marker
Systems.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Int'] Parkway, Minneapolis, MN 5540. 800 326-7555
219

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Fax 800 842-2725; p. 6, 7, 8, 10]
Access: Hurdles to gain "access": type color(s) used W5.
"COORDINATOR"
Any "edited" colors / images match. Modes of coordinating colors
and images are similar.
Color Coordination:
. Color choice process (for "Crawler"):
+ Colors compatible: The colors used blend (well - as pr), eg:
green matches / blends with blue, creating blue-green in between;
red and blue blend to make purple...
+--the manner of color changes pre-"analyze" how colors blend
together
--The colors used blend well, eg: yellow blends with blue,
creating green in between; red and blue blend to make purple...
--the order of color changes consider how colors coordinate and
blend together
-device uses single colors, and or blends desired colors as user
selects.
+ Compatibility of colors may imply that: they are of a related
subject, function, u, application. "Coordinator" "designates"
colors accordingly.
+--'Character's 'image portrays (compatibility / type) of subject
matter. See: 'Guide's ='Character.
+ How colors selected: 1] sys= "analyzes" color compatibility
charts. 2] Second color utilized has color pigments that are the
same / similar / compatible w (with) first color and compatible with
second color. Applies to three or more colors too= whereby all
colors added into other colors must be compatible w (with) every other
color. 3] UIP tailoring according to: u's or customer's tastes;
target audience's behavioral parameters. 4] See "designator".
+-Style of outputted coordinated colors = uip= depends on
"designated" color desires. Applications: greater or lesser
color coordination or contrast (to catch people's attention or
create relaxed "mood" for "entertainment" or "educ" or "tgh").
220

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Image Coordinator:
Imaging Compatibility: changes made to be (non) coordinating.
Sys "edits"/"cuts & pastes"; adjusts/coordinates existing/future
sizes of shapes w (with) colors (to give desired / ["crawler" generated]
appearance). R24-1 Image Coordinating Software.
4-4- R24-1 Image Coordinating Software:
"Analyzes" for compatible colors / image texture / shapes / color
intensity.
Analyzes and rates how well chosen colors are coordinated.
Generates compatible colors in output modes of "multi-colorer"
and "crawler". Applications: analyzing photographs, graphic art
software (limited color choices influenced by type printer or
compatible software).
-"edits" non-compatible colors/shapes -> eg: colors/shapes become
compatible algorythmicly:
--#l changing designated colors/shapes. Designated colors:
those least compatible; using u's uip color preference chart,
omitting colors closer to disliked spectrum (all together);
colors needed to effect desirable results via "ba" / "uip", eg:
uses yellow or red to catch people's attention (in emergency /
for "nr").
--#2 changing all colors/shapes -> eg: bringing them closer in
line compatibility wise-> by adding / omitting coloring agents.
.-ARTIST:(system will select color(s) according to colors to
which it must I match /[2: pr (program) / uip = SW ('software) knows w5 to
color
coordinate, then does so (automatically)].
.-user selects one or more colors, then sw offers (available)
choices of compatible colors.
.-C SW D: color determinator (sensor, sensor = lens, color's "c"
codes) = "analyzer" = s / printer
-OTD D: This N Sys (image coordinator)
ACCESS (person must wear particular (coordinated) colors for
access (entry, usage)) - copied to "access" 7.96; ANALYZER ;
+ARTIST (sys fills in colors (after certain areas are done;
adjusts/coordinates existing/future sizes of shapes w (with) colors (to
221

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
give desired appearance as defined by graphic arts schools);
CAMERA (inputting of images ("cut 8c paste")-> processed ("edited"
by this sys); CART (type coordinating sw); COMPOSITION
((automatically) merges graphic w audio composition); S;
EDUC (learn coordination, art, read up on past painters;
guides/teaches u (user) if/when/w5 (colors) match); M (sophisticated
sw, colors, coordinating analyzers); MULTI-USER (how each u
likes their sw); pr (program) ; SCORE (how well coordinated: color,
shapes, texture (2D or 3D*)); SENSOR (for colors); **SOUND
ANALYZER ; STATUS (sys judges its ability to do the
necessary/requested task /judges what it did; shows numeric
possibility of error); UIP ; +VISUAL ANALYZER.
-2E251 Intelligent Monitor: uses sys (system) to better notice w5 sys (system)
is
studying/fol lowing.
.-R numbering Sys: because this KN has an extra digit (R24-1),
its strictly a KN and doesn't include existing N, yet the R24 of
R24-1 relates to existing N which is remotely tied to R24-1.
-image's texture, defined: comprised of many/small/big dots of
single/multi-color; substance image looks like (fabric, stone,
shiny (metallic, plastic), rough (wood), cardboard, paper, (live)
vegetable matter.
-5G061 Dyslexia Software.
-sw's ("guide") icons can be "edited" between different shapes:
squared / rounded (circle/oval) / triangular (perimeters) w
"color" w/in changed as "designated".
+ "access": u's "cart"/sw= must have designated shapes/colors= to
gain "access". ln other words: shapes in= pr= of u (user) must have
correct "image" parameters for= "access". Patentable?
--level of u's sw= "analyzed" for compatibility= level of
"access" given determined by closeness of compatibility.
--accessors aware of this sys= may change their type images=
within range of image that gave them some access.
R24 Paint mixer makes ranges of colors.
.-[Rock Paint Co 3-1-47 Himejima, Nishi-Yodogawa-ku, Osaka 555
06 473 1551 15 Feb 92 NK]
-D: cart ('cartridge) - c- container for different elements for painting =
222

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
mixer = paint transfers to dispenser = dispenser
(brush/spray/**drops paint(inserts paint into containers user can
remove and use as (fresh) paint) = paints surface = surface.
-paints different shapes, textures, thicknesses of paint, etc.
according to programming (pr) / user instructions.
-system analyzes the texture/surface onto which it will paint,
and in tern determines the best chemical mix to (stick and stay
on for desired period of time) and thickness and number of coats
needed. surface analyzer (scrapes surface = tests in its lab;
"camera" = "visual analyzer"; user "k" type surface and any other
information (whether indoor / outdoor; temperature parameters
year round...)
-OTD:
ACCESS **:(ranges of colors possible restricted as well as any
access); CAMERA:(studies (existing color of environment) to
determine best color to mix); CART *:(pr; inks; paints;
chemicals; scents [mix w (with) paint]); COMPOSITION *:(automatically
paints according to signals from sound analyzer - D: sound =
sound analyzer = R-24 = painted surface); ENTERTAIN:; MFH:;
MULTI-USER*:; NOTIFIER:; OSC:; PR:; Color PRINTER
*:; PS:; Q*:; R:; S:; SCORE:(tds); SYNTH:;
TEL:(tr); UIP *:(color combination according to uip of target
audience/user and or according to desired effect (according to
uip of target audience, eg: maybe best color to increase
productivity in blue jean factory workers in Thailand are light
burgundy painted walls)); WA:.
3C-210 Color Selector: (older KN?)
-Point device at anything, and its colors are altered or
dissected, eg: something green can be divided into yellow and
blue; or changed altogether, eg: to white, pink or brown...
(D) Drawing: "Artist" (Color Coordinator or Selector) / Artist's "Edit"
R24-1 Image Coordinating Soflware/ (Colored) "Image" output = C
((Color) "Analyzer") =
"CRAWLER" (effects manner of coordinated color output) // "CUT &
PASTE" (each section can have colors coordinated differently, in
223

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
other words the method and style outputted differ according to
the section (all visible simultaneously on same s)) // "DRAW"
(manner of drawing triggers differing "color"
generating/coordinating modes) // "EDIT" (liow coordinated)
"GUIDE" /I "IMAGE" // "MULTI-COLORER" !I "MULTI-USER"
// "SW" !/ "WRITING INSTRUMENT" .
. Hurdles to gain "access". W5: Manner in which following are
coordinated: images; user's behavior ("ba"); colors; shapes; W5
u accessed sys.
+ Sizing / Color / Shaping%: "Edited" as needed for
compatibility. Eg: size of tree doesn't exceed house size by
two, and its fruit is double the size of door's front door knob.
Sys can alter shape of tree and or its fruit in differing
fashion. *D: "cuts & pastes"= then "edits" accordingly.
End "Coordinator" = "Artist"
+ "CRAWLER" = Externally controlled image creating mode crawls
across screen. Also functions like an organism crawling across
images leaving altered visual effects in its wake. Differs from
multi-colorer whose movement is controlled by u.
-%crawler can be in form of cart / S W('software) (inserted into function /
mode / sys (system) / sw / c) / icon or "interactive image".
-D Algorithms: previous image's characteristics (fl) X crawler
(f2) -> f3 X any other variables (time, additional input given
crawler (by u)) -> synergized function (f4) -> altered image(s) -> time pause -
> last image can be re-"edited"
(into something new
/ repeating related algorithm)
--each 'f = function: has hidden codes. These codes are hidden
in that they don't (necessarily) relate exactly to the image
shown; but influence: subsequent "crawler"-type events.
. Read Later (D) Drawing: u (user) = This "Artist" System - C('computer)
COLOR (chooses what colors appear when and how (w5)) // DRAW
(crawler itself decides how it will draw / "edit" // GUIDE (u may
"guide" crawler. Though crawler may choose to ignore requests
from u.) // MULTI-COLORER (what crawler does too) // MULTI-USER
(each crawler can be considered a u (user) in this circumstance=
224

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
resulting in each crawler "editing" images each crawler
generated, or each crawler can alter other (living) crawlers)
WRITING INSTRUMENT (crawler takes form of any writing
instrument).
-See additions to "Crawler". Was in file: k\ar\IMI& in 7.96.
. Hurdles to gain "access". W5 Crawler is utilized via one or
more of following:
-U attaches their key or other related element to the correct
crawler which takes them through the hurdles, though u (user) may be
required to take "designated" actions controlling crawler and or
anything in its environs W5.
-Crawler must be reprogrammed as "designated"= then taken on (one
of) the path routes it's designed for according (according to
type application / access= desired).
-W5 how u (user) controls or reacts or creates crawler (virus*) in any
manner: "game", "artist", "access" = "order & timing"+,
"crawler"="cart".
-see "game", "game" = "crawl"
"crawler" knows W5 (what, where, when, why and how) to get u (user) to desired
point of access, saving u
from keying in unnecessary strokes / information. Like an
electronic bookmark: u selects which bookmark they want crawler
to take them to.
+ "CRAWLER'S VIRUS" = Crawler attacks other's functions.
"Game's" opponent player's functions represented visually.
Crawler "edits" opponent's functions intern effecting their
abilities.
-An algorithmic function that alters function of whatever its
designed to attack/effect; Virus is a subset of'Crawler'.
-Also functions like crawler however the altered results also
include functionings correlated to the attacked images.
-See "Crawler".
* Read Later (D) Drawing: u (user) = This "Artist" System Changes the
abilities of other
player's abilities in below manners - C('computer) =
GUIDE (how they can control their players/crawlers) !/ MULTI-USER
225

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
// SW ((partially) disables their ("artist") sw) // WRITING
INSTRUMENT (what it can/can't do).
"Access": How attacks hackers: Crawler seeks (via "analyzer")
W5 hackers are present in sys= attacks / disables hacker's: sys
or (sw) portion thereof that technically allows u access, eg:
erases needed SW ('software) codes for pr (program) to get into sys during
that or
future attempts at access.
"CUT & PASTE" = Standard computer terminology plus more.
Cut out spaces into which images inserted: these images are:
drawn in / previously drawn images /"camera's" photos / other
(downloaded) images; fragment cutting / pasting shows up
(randomly) over (pr) sequence of time.
+ VA ('visual analyzer) seeks "designated" images= then "cuts & pastes"= as
"designated" (by "edit"). SW's search and replace.
Applications:
-creating collages;
+ compiling images w associated text of needed subject matter:
Asian feature faces; (portions of) password icons (w "designated"
function).
-"entertainment".
+ sys gives user a menu of images to choose from= to "cut &
paste" as u (user) desires.
.-Puzzle "Game": cut & paste omits sections of image / screen =
u must guess what's missing.
. Read Later D: u (user) = Artist" (System's "Cut & Paste") -- C-- What is
"Cut & Pastable" =
COLOR (colors but not necessarily the shapes or text) /I CRAWLER
// EDIT // GUIDE // SW // WRITING INSTRUMENT.
-"score" shows W5 / how often elements were used / viewed / "cut
& pasted" before by "designated" u (user) for designated applications.
226

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+ "Artist" automatically jazzes up what's cut & pasted: select
"edit" mode.
+ Any function can be labeled w/ an "image": Anything
representable as an "image" is cut & pastable. Any KN (invention) function
(shown on its s). Eg: U requests VA ('visual analyzer) to seek= then "edit"=
all
icons with features (parts) which are over 80% green, blue and or blue-green.
What's cut & pastable (w or wo "image" (parts) / other elements):
any KN part, eg: "score"; desired uip elements (desired
functions, portions of db influencing what uip determines as
being desirable functions); parts (visual presentation or
function) of icons.
-"Artist" / KN Function type gained or lost: "draw", "edit",
"writing instrument" ability.
Hurdles to gain "access". W5: "Merge" = "Artist's" = "Cut &
Paste".
-Lines where "cut & paste" cut determined by: how sw shows where
images start and end as "designated". Eg: VA ('visual analyzer) seeks: faces
(wo
hair or background), precut (blocked) images are cut in entirety.
"DESIGNATOR"
Colors, shapes or other images are utilized or "edited" to
achieve "designated" result. System automatically determines via
any kn "designation" criteria what needs to stand out / be
"edited". Results in greater help to u: "nr"; what needs
attention; "status"; intuitively user may know what "designated"
changes mean, saving time from having to read text, look up
meaning or have s cluttered. "Editing" mode selects: color,
"coordinator's" (compatibility level), "crawP'.
-form of Seek & "React": Though nothing may need monitoring or
"tracking", or be occurring by accident or chance; sys (system) or u (user)
wants
"images" / (corresponding) %functions altered as "designated".
227

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Patentability issues: how designation works automatically
coupled w (with) the benefits.
. Need for "designated" result determined by: "nr"; "uip";
,
"score"; "tds": shows deadline coming up; "analyzer"; "sensor" is
triggered; creating designated "moods" for: "entertainment",
"educ", "tgh", "mm".
Applications:
What needs "designation":
-designing anything (house or N plans): certain colors/shapes
are needed (to catch attention) wo creating an overall unpleasant
shape/color/other (how u would use N= determined via ba)
coordinated scheme; this coordination is such that the important
colors stand out to the degree desired as well.
.--Eg: have orange [stop] button while rest of'product is in
white or grey, but not dark burgundy (btirying the orange).
-(automatically) gives same / related colors/images to each type
of function (sw icon). Results in u's eye being more readily
able to classify "images".
--"designates" color according to "score" of function color is
tied to.
-"nr": gives "designated" changes to: catch attention. Eg: red
is most serious crisis in department A, while lighter shades
(pinks) are less serious in same department. Orange and lighter
shades for department B of company.
.--"Nr" induced changes may only be temporary or in effect until
problem solved.
+ Who did / is / needs to do what, why, where, wfien and or how
(on sys): ("game") Who and W5 (was in ps-zone)
-influences "mood" generation: according to W5.
-Chemical indicators: SW ('software) shows "status", "nr", w5
-"CID" / Text /"C" file names or icons: Know w5 /"score" of
value about subject / caller.
-Shows if something doesn't belong where it is. Eg: customer's
228

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
file in wrong sw directory; wrong chemical utilized= causing
possible hazard / 7G indicators.
-number of times someone "accessed" (which sections) of sys and
W5.
-how well material u (user) is seeking / reading / experiencing= matches
their UIP. For seeing titles of internet articles. "Score"
occurs via key word / subject matching as w/ Yahoo sw.
-M / DB: "designated" u browses world wide web, and he or sys
"scores" value of sights (creating bookmarks of "designated
colors") for others 1 themselves in future "access" of such
sights. Magellan internet sw's rating system.
--"Scored" data used accordingly for developing UIP-DB. Colors
let others quickly see how well sights were rated (by previous
person / sys).
--material "routed" to pertinent subject category files= on U's c
/db.
VA ('visual analyzer) seeks -> "reacts":
-"cuts & pastes": va seeks "designated" "images"= then: "edits"
as "designated". Example: va seeks thru db ('database) for "images" of
masks= "cuts & pastes" the masks found= onto pumpkins= then
changes and "coordinates" coloring into shades of orange and
black for Halloween =
.--Next ->*: u (user) can next select preferred newly generated
"images"= and: print them (onto stickers) / use them for labels
for icons or "crawlers" or "game" characters.
-Designated images attract characters / small "images" which look
different according to what character is there for:
--Labels subject: va seeks negative "images"= then places
"game"=character "image"= next to negative image. This nr
character is different according to what it is nr /
"designating". * Eg: Character is a: dog when labeling security
or "access" issues; baby when labeling toys or thing for babies;
red stop sign when labeling most important cautions.
--Character represents additional information of interest= as
pertaining to what images character is near or pointing to.
--designated images altered otherwise: to get attention, eg:
229

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
circled / color or size changed.
-"Sound to Visual Converter" - Old KN. Eg: bar codes conver
"Routes" designated images to: files organized by: subject
category, "score", "status", "uip"; u (user) needing image (according to
uip).
--(sys seeks and tr (transmits) designated (uip-tailor, "visual analyzer")
images)
-SCORE (how closely each image (sys can "analyze") comes within
desired image's paradigm) -> sys (system) "reacts" w/: greater or lesser
"editing".
-Image db ('database) Searcher: VA ('visual analyzer) scans db ('database) /
world wide web for
"designated" images ("routes" it and any attached text / page /
web sight text / other images) to= "designated" file.
. D: "Artist" / "Image" output = C ("Analyzer" seeks following
(according to W5 (what, where, when, why and how) criteria)->)
"COORDINATOR" (what is or isn't (poorly) compatible) // "CRAWLER"
"CRAWLER'S VIRUS" // What was "CUT & PASTED" (according
to W5) // "DESIGNATOR" (what / W5 altered according to
"designator" / "edit") // "IMAGE" // What was created by
"MULTI-COLORER" (according to W5) // "MULTI-USER" II "SW"
// "SYNERGY" ->
-> "Reacts" as "designated": "Edits" / Alters information or
codes or images.
.(D) Drawing: S"'Images" / W5 / "Score" / u (user) / What part is/was (not) in
operation =
Artist's "Designator" - C =
ACCESS ; ANALYZER ; BILL ; CART ; EDIT ; EDUC ;
MULTI-USER ; NR; OSC ; PR ; PS-Zone ; Q; R
; ROUTER ; SCORE ; SENSOR ; SOUND ANALYZER ;
STATUS ; TDS ; T('tel) ; TILT ; TRACK ; U; UIP;
VISUAL ANALYZER ; VR*; WA ('walk about).
Misc:
.-Functions automatically, or u given menu of best choices
("guidance"), and or occurs while u (user) "draws". Related to:
230

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"edit", "coordinator".
"Access" = "Designated" images:
-Hurdles to gain "access". W5 needed "access"' passwords its
images are created (password generation): "Designator" creates
the needed password (or image representing password)= according
to "designated" uses u needs.
-Attacking hackers: Hackers' password images / sys are attacked
("edited") as "designated". sys (system) may also stop / make difficult
for hacker's computer to subsequently gain access via: making it
difficult for them to (re) create needed images for gaining
access.
--"VA" / "BA" "analyzes" how potential hacker's images
(passwords) differ from "designated" criteria.
-Each application (according to W5) needs differing "designated"
images (passwords).
"DRAW" = Create image.
Paint; move computer mouse to draw image; "tilt"; brush on;
selecting and utilizing "color"; * normally excludes taking
picture via camera; %'crawl'; %"camera" takes pictures (then sys
"edits"); color sticks utilized; multi-colorer; (sw) pen or
brush; paint; rub (finger on "interactive" screen); "dance"; move
"R" in fashion to create /*"edit" image.
. Read Later D: u (user) = This "Artist" System: "Draw" - C=
COLOR /I CRAWLER (what crawler does) // EDIT ("artist" =
"edits"= what was drawn) // GUIDE (helps u (user) draw) // MULTI-COLORER
(way of "drawing") // MULTI-USER !/ SW (determines how u's use
of "writing instrument" comes out) // WRITING INSTRUMENT (tool
for drawing).
. Hurdles to gain "access". W5: the needed shapes / colors are
drawn; at what speeds images are being drawn (mouse's (average)
speed) or time (duration) from start to complete.
231

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"EDIT" / "EDITING" / "EDITION" _
Alters images in complex algorithms. Examples: "crawl"; makes
colors or shapes compatible; "cut & paste".
-Edit modes: "Cut & Paste" (sw, algorithmic function); % any
change in function or effect can be controlled by u (user) / "crawler"
/
other non-user controlled modes. "Multi-colorer".
-D: U (artist) -> "mouse" -> c ("edit") -> image output.
* 5A120 Camera "Editor": Take photographs which you can then
edit on the related "C" system.
-camera takes a picture which is shown on "C" system. This gives
spark to the artist (studies show a majority of "semi-artists"
are more inspired when they have such a scene to work with - it
is more difficult to create art from nothing)
- add animated characters (user can find it easier to create them
if they choose from 1. existing characters, 2. faces, bodies,
hair colors, etc then "stick and paste" on "C". Characters can
even be moving.
-characters can communicate in written or "osc" form
7.96
+ "Visual analyzer":
+- Seeks and alters "designated" images: seeks designated images
/ aspects thereof-> they are altered ("edited") as designated ->
output: altered image(s).
--seeks "images" via: "camera"; "db" of"images" (in m / c).
-Camera's images are alterable as in "Guide": 5A110 Master
Artist.
-"access": u (user) must "edit" images in "designated" manner.
Read Later D: u (user) ="edit" System - C('computer) _
COLOR (how colors altered) // CRAWLER // GUIDE (suggests how
u may edit) // MULTI-COLORER (u may edit the pr (program) controlling how
"colors" are outputted) // MULTI-USER (each u edits each other's
images (in their own fashion or via own crawler)) S W(controls
232
.. , .. . .

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
edit).
R57 "My Magic Diary" creates drawings from preprogrammed images
to store along with phone numbers. Helps user remember people.
[Casio, PS ('positioning system) 10.931
-OTD:
ACCESS**:; BA;
CAMERA:(take digital picture of targeted person, and insert with
"k" info about person); CART*:(database; sw); COMPOSITION
**:(vocalized recording: user's info/music matching each person);
ENTERTAIN:; K:; MFH:(uip->behavioral analyzer);
MORNING:((at alarm time) see pictures/images of people/events/etc
(for things to do for that day; can be part of massive training
program for many people); MULTI-USER*:; NOTIFIER:(alarm
calendar: functions like "moming" at other times too); OSC:;
PR:; PRINTER*:; PS ('positioning system) (see R58-10); Q*:; S:; SCORE:(#
times user contacted such person; tds); SYNTH:; TEL:(tr;
automatically dials tel number (when user places system by tel's
receiver / system connected to tel via tr (wire))); UIP*:;
WA:.
R57-1 Facial Image Generator: User selects adjective words to
alter type face on software. Merges multiple characteristics.
Characteristic selection process requires less screen space.
Example, user selects: nose (big); -hair (blond); sense of humor;
fat; intelligent; intern creating single preprogrammed image
including all factors. u (user) saved from having to see all possible
facial choices first. From Casio: "My Magic Diary" creates
drawings from limited preprogrammed images to store along with
phone numbers. Helps user remember people.
-facial'images can be generated in connection to any type of
image / information.
-ARTIST:(user's keying in their view of person's uip (personality
traits) effects facial images created~: cut and pasteable
elements effected; entire face can alter; eg: user says devilish->the first
choices for eyes are narrow / strange
ones; or
233

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
sloppy/poor hygiene->slightly messy appearance (hair, clothing)).
-characteristics to use for behavioral selection listed in
personal ads (seeking lovers), as found in newspapers world-wide,
eg: height (tall, short), face shape (long, wide...), eyes
(big...), dishonest, devilish, body build type, age, thickness of
eyebrows or nose or lips or biceps...
-D: K ('keyboard) = SW ( software) menu = selected choices merged = displays
image (face)
= image merged with: tel / address / written description of
person / notes / *uip / *access
-utilizes 57-2
-D: This N (invention) Sys (facial image generator)
ACCESS / ANALYZER / ARTIST / BVA ((t) voice -> bva = this n
draws face (typical possible images from such voices, also
utilizes any uip available, eg: via cal ler ID) = uip/m)/ C/
CAMERA (stores -> converts images (when behavior of person (is
expected to change))/ CART (how alter images)/ CLAP (control
sys)/ S / EDUC (learn relationship between facial images with
behavior types: studies conErm relationships, though this is not
politically correct, eg: people who are overweight, or slur their
words are less likely to control themselves)/ M (database of
potential images matched with all available information on
targeted person, uip)/ MIC (voice analyzer)/ MQ / MULTI-USER
/ NOTIFIER (when trouble is expected (from person being
watched/studied), eg: they look like they are about to act in
desirable/undesirable manner. uip = nr)/ osc ('outgoing sound communicator) /
PR (artist)/ Q
(menu of choices, how to use)/ R('remote control) / SCORE (likelihood images
generated (more by sys than u) are correct, based on
database/analyzer (of past experience related systems had with
such trials and errors, and as studied, coholuded upon, then
inputted into c (by humans/c))/ *SENSOR / SOUND ANALYZER (t,
mic).
-type face generated= corresponds w/ "designated" subject matter
or "mood".
613180 Photo Paints: draw onto pictures (color or black and
white) with colors of your choice. Do while camera is in still
motion, then with mouse or pen draw and or move around pieces.
234

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Involves taking of picture before and or after (memory required)
-developed pictures can receive wanted colors by applying special
inks right on top of special or standard prints.
-developed pictures entered into computer ("C") for future
editing
-add color onto black and white photos
-replace all of certain colors with desired color
-SW version of: Correction Tape Dispenser: can be typed /
written on. "Cut & Paste" on the tape.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; p.9]
-"Restricter": some "images" are pr (program) to be (fully) "editable"
while others aren't (at all).
-"Edition" = image after having been "edited".
End "Edit" = "Artist"
EDUCATE =
Guides users to draw better.
* 3E061 Motion Tutor: Guides users to improve their drawing
movements, eg: guides how their arms move.
+"GUIDE" / "GUIDANCE" = Art Instructor. Suggests how user
might proceed in generating "images". Useful for large sector of
population.
Fill in colors in designated locations. System guides / prompts
u for when / how (w5) they can create art.
Subset of: "Educ".
-Answer's user's "Questions", so u (user) may better achieve
235

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"designated" desires.
Instructs u (user) how to learn use of each "artist" system element.
Read Later (D) Drawing: U = This "Artist"="Guide" - C
COLOR (color choices / how colors are "edited") /I CRAWLER (how
its controlled within crawler's limitations or temperament) //
DRAW (how to draw (within "designated" desires)) // EDIT (how
utilize edit) // MULTI-COLORER // MULTI-USER // SW
(controls "guide") // WRITING INSTRUMENT.
=
5A I 10 Master Artist: make master pieces similar to
masterpieces. Select painting desired, and electronic device
will help guide user in any one of many methods. Incorporate
different parts via selections and or drawing.
Guiding methods:
.-outlines each color area, remaining left blank, allowing user
to ad their color choice(s) and different shades. User might
select from suggested choices, the first choice made then
influences the option available subsequently (color coordination)
-outline drawer: when making the outlines, the mouse or joystick
is completely restricted, or gets a bit more difficult to
maneuver when it goes a bit far off required lines - hence guides
artist. And or, a light goes on showing level at which they are
on course, eg a green and red light, and maybe even a yellow
light. "C" or user may designate which lines they are attempting
to draw so "C" knows how to help guide it
-abstract art and related: make wild brush marks, and only those
that fall within the programmed parameters make it into the art
piece. Eg: ink is like metallic powder which only sticks to
where the magnetic areas are found
Guidance: tgh, educ.
"Restricter": "Guides" u (user) with restricter. Form of difficulty
in maneuvering is one form of guidance.
. Technical: artist can see their creations directly being made
onto screen or paper. Later printer might transfer screen image
to printer. Prints in color; black and white (with different
shades of black)
236

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-H-Non Electronic version: mechanical device might guide the
pen/brush/pencil/etc. w/ or without artist's hand actually being used
at time. Artist selects colors. Writing instrument can be
stable while paper moves, or visa versa
-"tilt": controls sys' functions, its r= paint brush.
-Filling in colors (for "Crawler"): "Coordinator".
--develops/colors (preexisting) shapes (as in filling up a
coloring book): 2D / 3D / circles / squares / dots / balls
I
prisms / dots -> changing into 2D or 3D images.
--5A110 Master Artist:
+ UIP ="Guide": sys (system) suggests forms of art generation. Sys
knows UIP data via: "va" past "images" u created; menu of
preferences chosen by u: "image" types ("colors", shapes,
*sizes, type "coordination" (compatibility).
--. D: "Image" output = C ("Guide" / UIP-"analyzer"-"va" / asks
U Q / u's art generation "ba") =
"COORDINATOR" // "CRAWLER" // "CRAWLER'S VIRUS" // "CUT
& PASTE" // "DESIGNATOR" // "DRAW" // "EDIT" //
"GUIDE" !/ "IMAGE" /! "MULTI-COLORER" // "MULTI-USER"
"SW" // "SYNERGY" I/ "WRITING INSTRUMENT".
Hurdles to gain "access".
-Sys teaches u (user) how to develop / use password (images).
-Hacker "reaction": upon sys (system) "analyzing" presence of hacker, it
will (suggest) a "guidance" tutorial that gives (partially)
correct / incorrect information to trick hacker.
Art Instructor: "coordinator" = good art /"images".
-see KN's: Music instructor %; + Dyslexia's Writing Instructor;
+ "Educ".
"IMAGE" = Picture and or its colors.
Graphic(s); something drawn (by u); % sw icon; line(s) / dots /
other graphic fragments ((made to) compris(ing) more complex
237

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
image). Images can be made "interactive" for touch screens.
Chief definition excludes text, but can be made to include text
depending on embodiment of invention.
-Comprised of "colors" / shapes that can be= "edited".
* Read Later D: u (user) = "image" -- C('computer) =
COLOR // CRAWLER II DRAW // EDIT // GUIDE !I
MULTI-COLORER // MULTI-USER // SW (forms/stores/edits
images) I/ WRITING INSTRUMENT.
"INTERACTIVE IMAGES" _
+ "Interactive" "Images" for computers or interactive screens: u
/ sys can create "interactive" touch screens w/ its needed
"images". Generated images (icons) have functions triggered
according to how they are touched / activated. Interactive
images can be made for and utilized by any KN's S, and control
"designated" functions. For 1D-010 Adaptive Design System.
Each "interactive"="image" is like a key or key stroke w/in "K"
or "R". Design and or control any product's functions by pr
interactive image's functions / image (how it looks and feels).
Programming interactive images simplified: Process becomes more
of an "entertaining" designing process. u (user) (who may not be
programmer) can generate interactive images by "drawing"
("cutting & pasting" subset images= representing features (parts) of entire
function scenario).
UIP: Menu of function options based on UIP-DB. Manner in which
functions are carried out effected by UIP-Tailor.
"NR" / "Score" /"Status" : Are built into interactive images or
corresponding images. Their differing / changing values=
represented by "designated" "images".
Image types: Multi-faceted icons comprise numerous (unfoldable)
238

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
parts each being a representation. "Designated" images=
represent correlated functions. Shaped in icons or other images
commonly shown on (touch) screens= for representing: functions /
directory and files (text, "image", pr) / data / web sights.
--Other images as used by: Microsoft, Lotus, IBM, Apple,
Borlund, Octel, AT&T, "Billing" (banking) institutions,
Surveillance and access control ("Access", and "Track") related
companies; "MM" companies. Other companies and research
laboratories in and or dealing with: ACCESS ; ANALYZER ;
BILL ; , cart ('cartridge) ; EDIT ; EDUC ; NR; OSC ; pr (program) ;
PS-Zone ; Q; R; ROUTER ; SCORE ; SENSOR ;
SOUND ANALYZER ; STATUS ; TDS ; T; TILT ; TRACK
; UIP ; VISUAL ANALYZER ; VR; WA ('walk about) .
-Icons are two / three / four / five+ dimensional. "Designated"
parts can only unfold / be present (seen / functional) when icon
or part is manipulated: turned / moved (to another ps-zone w/in
sw (file)); be handled according to any ("access") W5 criteria.
"Interactive Image" Synonymous Terms:
-Icon = "interactive image" or "K" or "R". Icon / its parts tie
to= "designated" functions.
-Function = What u (user) / sys (system) desires (to happen). Functions are
tied
to icons.
. Futuristic: Three dimensional "images"= move hand / instrument
to (nearly) touch the interactive image. Eg: "interact" with
front / side / back of image= each side having different "r"
characteristics. Also: for simpler "interactive" touch screens.
30- Applications:
D: u (user) / "Designated" functions = ("interactive images") - C =
. ACCESS: Need special icons: U (re-creates / needs) (uip-tailored / specially
designed) interactive images.
Only u knows
how to alter these icons. Icons (and non "interactive images)
can only be activated ! created 1"accessed" w: right hw 1 SW ('software)
/
cart / access.
239

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
BILL: design icons "designated" to the billing structure I type
client / uip-client.
. CART: u knows which cart ('cartridge) is being used by corresponding
"edited" icons. Carts can change icons / have or activate needed
icons.
+ "image" = "access"' password.
"Interactive Images" = click on image then ->:
-get definition / explanations / answers to "Questions" /
"Educational" session.
-osc states related information
-information given in "designated" language
"MERG E" =
By combining multiple elements= system integrates / syngerizes
them= creating a new "image" (barely) distinguishable from the
original elements. Elements include: "images" and or their
parts or functions.
-System "analyzes" for a compromising where the middle of a road '
is taken. A type of balance between different directions, eg: if
three files are merged, it takes 33% from each, giving preference
to those elements causing the least conflict or poor
compatibility with the other two files.
* (D) Drawing: "Artist" / Altered "Image" output = C ("Merge") _
"COORDINATOR" // "CRAWLER" // "CRAWLER'S VIRUS" // %"CUT
& PASTE" // "DESIGNATOR" (what's designated is altered by the
merge function / designator functions as a form of "merge"
function) // "DRAW" // "EDIT" // "GUIDE" // "IMAGE"
// "INTERACTIVE IMAGES" !/ "MULTI-COLORER" // "MULTI-USER"
// "SW" /I "SYNERGY" // "WRITING TNSTRUMENT".
240

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+ "MULTI-COLORER" = Same as crawler except user controls how
crawler moves.
-U has no/minimal control over output of color/images, but u
controls where the output is made (where pen/mouse is moved).
Differs from crawler which moves on its own.
+-see "Crawler" for all its functions with potential for u (user) to
control where "writing instrument" flows its ink(s).
. Read Later D: U =This "Artist"="Multi-colorer" - C('computer) _
COLOR // CRAWLER // DRAW (color output = multi-colorer)
EDIT // GUIDE // MULTI-USER // SW // WRITING
INSTRUMENT (color output = multi-colorer).
.-functions in any sw/hw "writing instrument".
. Hurdles to gain "access". W5:
-U's Multi-color (a type "crawler") needs to function according
to "designated" criteria.
-(Nearby / Sys) observers of accessor see / "analyze" function of
u's multi-color= "react" W5 (what, where, when, why and how) u has: exceeded
"access" / been
determined as a hacker (due to wrong colors being emitted W5).
"MULTI-USER" = Group "interactive" art generation. Each user
"edits" each other's "images". See "game". Each party generates
own art whereby they can ad [or delete] portions of other's
"images" (simultaneously).
.613030 Multiple Artist: Done on same or connected computers.
-Teachers, editors, and people down the creative production line
can make future changes as well
-Done via: modem, tel ("T") (regular or cellular), etc.
-Each separate person's contribution may be tagged by: different
color, or can be separated by any user (just single person's work
might be brought up onto display ("S"), or a person's
contribution may also be separated by the time or time period in
which it was entered. Can also be separated according to type of
item entered, eg: explain what was keyed in then have it delete
all material afterwards, etc.
241

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Read Later D: u (user) = This "Artist" System - C
COLOR // CRAWLER I/ DRAW // EDIT // GUIDE (guides
each u to "interact" / preserve (sections of) other's "images")
// MULTI-COLORER // MULTI-USER // SW ('software).
+ Same sys can uip-tailor same icon for different users:
("interactive") "images" apply to all / "designated" /"multi-users".
"Designated" functions of interactive images
apply. Eg:
same basic icon has five variations for each u= w differing
visual representation / function. U can pr (program) icon to be so
differentiated.
.-each u's needed (image) passwords differ.
"REASONS TO DRAW" = Miscellaneous.
+ Gain "access".
+ "interactive images"
-Generate desired "images".
-"game" function (of player; to win): Creating images such as
those of characters and tools. Create those images most likely
to help player win, eg: biggest, brightest, placed in
"designated" location (ps-zone) (in relation to environment's
factors (enemy's attacking / defending points or modes).
-"educ"* (improve drawing / sw abilities);
-"tgh" (creative therapy): % "Access": correct u's "reaction"=
ba determines u= is a legitimate user.
-increase u's creativity: see Intercultural Engineering paper,
and referrals to the paper.
-make art
-"ba"
-"MM": other multimedia
-utilize for applications in: "entertainment", "osc" mixed w/
images, "tgh", other KN (invention) utilizing (changeable) "images".
* Other: help sys' uip better understand u (user) being studied ("ba");
create needed images/designs/image of kn; % compose: designs made
are interpreted into sounds ("visual to sound converter"). (KN)
product's design: externat casing; images used in its sw.
-"Entertain" (artist playing).
242

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Dyslexia Software 5006 1.
-Any sw's needed imaging, eg: 'User "interface"'; icons;
."Status": u's status= correlates w= how "images" they see= are
shown on "screen".
--Types of status "designated": length of u's usage of system;
level of "access"; subject material u (user) is viewing/" interacting" w.
--Values in showing status: shows people ("nr") who walk by u's
status= such as for u's level of access; "Educ": shows
instructors their student's "status" / "scores"; motivates u to
do better= and get= better "scores" (from "educ" / "game" pr).
-H---The changing image represent the status of the user. In
other words, the Image Effects U's Behavior: (Subtle)
differences in altered images influence u. Eg: they work harder
to get better images due to its scoring; u (user) is more cautious
(instinctively when colors are more yellow, red or orange).
Color change = "nr". UIP influences "editing"= eliciting better
"response" from U / %sys (image -> va -> "response").
--"Access": level of u's access "scored" by type "images"
appearing (on S / stored on files after they've been accessed).
.--"VA" treats u/sys w (with) "designated" images differently. Sys can
treat u differently by their status or score, but via "va" is
simply another algorithmic method.
"RESTRICTER"
+2D100 Movement Restricter: Writing instrument movement
controlled (via magnets or pr): Different levels of resistance
and ease in drawing can facilitate creative inspiration for
abstract art.
-D: pen (magnet) = writing surface = magnets (below surface)
-crawler virus infects writing instrument: 'crawler's' virus=
having "accessed"= writing instrument= effects how instrument
alters/creates images. The crawler / its virus function like the
magnets in effecting how writing instruments moves / writes /
functions in other aspects.
+ When (W5).pen movement ability changed: u (user) (in "game") goes up
243
. ~ , ,

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
a hill or other difficult terrain; tds: time is running out;
battery running out; "game": player was weakened by opponent;
("nr" for) "c" or sys (system) slowing down; type text or pr or color or
image or UIP related material; "drawing" "designated" types of
art such as one's signature may require a one to one ratio.
--when multiple factors influencing movement occur
(simultaneously) pen controlled by: averaged power, lowest or
highest influencing factor(s).
+ Type effects: like "multi-colorer"= pen's movement's
"reaction"= has (unpredictable) resulting ("images"). U can pr
the preferred ratio between movement and interpretation.
Different "colors" emitted according to: the interpretation ratio
/ w5.
.-sw I hardware (mechanical / el) versions (unattached to pc
"c").
. Construction of writing instrument: "Mouse": the ball's
stickiness changes (by break touching ball w differing degrees of
pressure (like car's breaks).
-physical movement by user is altered according to program.
-different pens (operable simultaneously ("multi-user")) have
movement interpreted differently.
-ratio between physical movement of pen w (with) how its interpreted:
ratio between (u's) moving pen= w how it translates on S has
algorithm.
.--Eg: standard can be move 1 cm and S interprets at 1 mm movement,
while slow down can have I cm physical movement and .2mm S
movement, or pen can be empowered to show on S as moving Imm to
2cm.
p+ 4J050 Mouse Restricter:
Ease in moving mouse is restricted as a guidance system. Mouse's
movements are harder to maneuver when it enters into undesirable
area.
Hurdles to gain "access". W5 "Restricter" (can) function:
-Passwords may alter how "restricter" "restricts"= (changing what
can be accessed W5).
244

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Results / function of "restricter" determine W5 can be
"accessed".
"STATUS"
+ "Edition" shows status of situation: type subject matter / nr
/ "routing" shown by how images are "edited". Value: requires
less text explanation cluttering- screen. See: IMI's "Score",
"Status".
. Examples of what "editions" represent:
-amount of shadow shows how much additional information in db is
available on the "interactive image"; color shows subject;
multiple colors like blue and green or blue-green (mixed) show a
combination of status' eg: subjects.
-direction of shadow can show on which side or area (of s) u (user) can
find: applicable information, icons, files.
-possible functions of "interactive image".
"Status" (D) Drawing: "Artist" / "Image" output / "Status" (of "artist"
feature / how icon interpreted by (u)) = C =
"COORDINATOR" Il "CRAWLER" II "CRAWLER'S VIRUS" 1/ "CUT
& PASTE" /I "DESIGNATOR" II "DRAW" // "EDIT" /!
"GUIDE" // "IMAGE" !I "INTERACTIVE IMAGES" // "MULTI-COLORER" /1 "MULTI-USER"
Il "SW"
/I "SYNERGY" Il
"WRITING INSTRUMENT".
"Status" D: U = / "Screen" / "status" (Anything that can be
"designated" by these functions can have a corresponding
"edition"; W5 part is being used)- C('computer) =
ACCESS (W5 is accessing); ANALYZER ; BILL (if function is
being billed and at what rate (w5)); CART (which cart is used);
EDIT ; EDUC (what information can be learned (*W5)); MULTI-USER (who's using
system W5); + NR
(what needs attention w5);
OSC* ; pr (program) (w5 can be programmed); PS-Zone ; Q; R('remote control) ;
ROUTER ;+ SCORE ; SENSOR ; SOUND ANALYZER ; STATUS
245

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
TDS ; T; TILT ; TRACK ; UIP ; VISUAL
ANALYZER ; VR.
"SW" = ("Artist") software; program.
"sw"; "pr"; "cart"; "editing" program; %'crawl'; %'crawler's'
virus; %multi-colorer.
. Read Later D: u (user) = C('computer) = SW Controls / "Guides" 10 COLOR //
CRAWLER // DRAW // EDIT // GUIDE //
MULTI-COLORER // MULTI-USER // SW ('software) // WRITTNG INSTRUMENT.
-"designated" "sw" = "cart" / "access".
"SYNERGY" =
Synergistic effects of "Artist" parts:
Multiple parts can work together to create results different from
what would be created had they functioned (more) alone. Eg:
Writing instruments:
-Movement Restricter. Restricts: (automatic) edit mode by:
slowing down / reducing available editable options, eg:
"coordinator", "crawler", "cut & paste".
-Multi-colorer: W5 (what, where, when, why and how) u (user) "cuts & pastes"
determines resulting
"color" / how images are "coordinated".
-Crawler: "cuts & pastes" / "coordinates" along its wake.
-Color sticks: insert into any writing instrument or edit mode.
Stick becomes primary or secondary... color (in color
coordination schemes). Effects colors in newly created "cut &
pasted" images.
* Bouncy: controls how edit functions.
='synergy" = "access"
"TILT" = See "Writing Instrument".
Each angle of "tilt" correlates w (with) associated functions: type
color; thickness or darkness of color.
"USER" = Artist; drawer; user; tilt = "writing instrument".
% person being effected/shown created images; % u being analyzed
246

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
by "ba"; % u(user) trying to gain "access"; % observer (of images
(being created)).
-see "tilt" = "access".
+ Magic pen: KN. Can "draw" while in bed, bathtub, etc.
+--shocks from moving automobile are not transferred to "writing
instrument" / "mouse"= "sensors" judge "vibration" level from
outside sys= and compensate when interpreting / "sensing" how
"writing instrument" is "drawn".
"VISUAL ANALYZER" _
(With the absence of correlated codes) "VA" analyzes "images"
(created by "artist")= and "reacts" as "designated".
-Values: can save the need to write / generate additional codes
(for what color is / stands for) - this saves human labor time in
entering or creating the information, and space on computer,
assuming the "image" /"color" are already there anyway.
+-Patentability issues: when color or images represent =
something= the VA ('visual analyzer) is another (though less efficient) way of
sys'
knowing / tabulating ("artist's generations) wo the codes.
+--"Access": Additionally this may serve as an "access"
hinderance for hackers wo the codes nor "designated" "va". A new
way to store c data.
--suggests what subjects are missing via "va": subjects labeled
by "images".
-see "VA" = "Access"
"WRITING INSTRUMENT" = Mouse, stylus, "tilt".
"Mouse"; "R"; (El) pen or brush; "Computer's" cursor; %
"Crawler"; "Tilt".
5A130 Color Sticks For Computer Drawing Pad: Simplifies "C"
graphics system for children. Child inserts plastic piece for
the desired color.
-Insert one of many colored crayon shaped plastic pieces
activating the desired color.
247

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-select the color stick you want, insert a third of the way into
the slot, and move around this joy stick to create the shapes you
want. For a different color, select another fun stick!
*-use many colors in your picture
*-can print out pictures
*-base of device has other programmable functions
-design with joy stick also [joy'stick might take color
"inserts"]
--system identifies the type stick via: small differences in
shape at the connection point; or light, electrical, etc
frequency emitted at the time it is plugged in.
0-one stick might have ability to create several or all colors.
the color selector might be from a key board; or switches on the
joy stick. This is simpler, yet maybe removed from the saleable
idea of one color has one stick.
-OTD: "S"; "C"; pp; mp; uk; mouse; interactive%; educ; toy;
basic; entertain; exercise of creative skills; portable; sst;
printer; "M"; bp; sp; alerter; osc; egh; score; tgh; md; cart
(colors, graphic possibilities, how movements can be interpreted
and altered, etc); ep; uq; pi%; character; clap.
%-"Tilt": differing parts mentioned can also act like a r
-"cart": item one might insert for getting additional colors /
"artist" functions.
. Manual version of"Writing Instrument" (for "Crawler"):
-the ink flow-through parts of device can be: switched /
replaced. This helps if a pure alternative color is wanted
quickly; wear and tear; for cleaning...
-this has both mechanical and or electronic versions
=
Read Later (D) Drawing: U="writing instrument" - C
COLOR // CRAWLER // DRAW // EDIT // GUIDE //
MULTI-COLORER // MULTI-USER /I SW .
. Ink flow for sw / manual versions:
+ ink (looks like it) flows out through one/multiple sources
(simultaneously). Changes in color happens (gradually).
248

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+ ink flows out through (one) source. Changes in color can
happen gradually/abruptly. Point of flowing out on SW ('software) version is
represented by an image: cursor / pen / brush / spray
(can/nozzle) / finger /*tail / computer mouse [fully depicted on
sJ /(rolling) ball / animated character (from its writing
instrument)
-* can have two or more ink heads working simultaneously, each
with own or separate "brain" that decides when and how colors
change. This allows creating of interesting rainbows. Colors
can change at same or different times.
--each side of pen has different color at one time
-can have image of two or more ink heads working simultaneously,
each with own or separate "brain" that decides when and how
colors change. This allows creating of interesting rainbows.
Colors can change at same or different times.
+3C-290 Bouncy:
How object is played with triggers corresponding signals.
Multiple "sensors" are activatable simultaneously according to
the extent of pressure and or area(s) of object were manipulated.
-How manipulated: Roll it. Buttons / Joystick ("Tilt"): press
or rotate or bend or twist. All these actioris trigger art
creation. In multiple shapes and sizes, eg: ball, rectangular
prism, cube. Squeeze or twist: triggering signals according to
what tiny "sensor(s)" where simultaneously activated (under the
cushioning. Drop or throw: different levels of impact create
corresponding signals.
-Interpretation of manipulations: Differing (simultaneous)
signal generations W5= corresponding result. Consecutive
triggering of (same) sensors such as via bouncing can have
differing effects (from'subsequent near time triggers).
-SW Versions: ' Bouncy object is on s= u (user) manipulates it= w
"writing instrument".
--(standard) mouse: activates bouncy to behave (automatically)
upon u triggering desired behavior's icon. Bouncy can function
like a "crawler".
-"Game": move character by manipulating bouncy (shaped as doll).
249

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Patentability issues: Similar to: "VR", remote control of
robots. Maybe applications and unique signal creating modes are
the patentability:issues.
-like a puppet bouncy can be used to control any "R" listed
control function. Examples: move a 3D doll.
.-Device transmits via wire or air waves
-Insert different items, eg: plastic sticks, and move about when
inserted.
-D: Manipulate any object's "sensors"= in any way= and its
resulting signals= are interpreted as "designated".
: related to 5A-130; reference to this KN made in "R".
(related description probably included earlier).
.--According to type item inserted, different graphics created.
Receiving device identifies the inserted items by their: bar
codes, "C" magnetic tape, shape... People can buy such
additional pieces separately from the main unit.
.--Insertions might also have software inside it, or come with a
separate software disk insertible into main unit
.-Ap: graphics generation, toy, acts also as standard "C" mouse;
paper weight; decorative piece; can be in shape of interesting
objects: doll, animal, creative machine, car, plane...
-OTD: new type of Rubics cube; game; is "R" control device which
also activates other household appliances and entertainment
systems; "R"; "S"; "C"; pp; mp; uk; mouse; date; tds;
interactive; educ; toy; all; game; entertainment; portable;
printer; "M"; can be a small "C" by itself, with own "S"; bp;
osc; vc; score; tgh; egh; md; cart; cp; uq; mq; access (for the
fun of it); uip; character.
% 3C-310-083009 Disk Art:
Spinning disk lets user dab on colors to create wonderful art
color shows.
-Done manually with real ink
-on "C" using mouse to dab the color..
--can also have spinning object (two or three dimensional) that
get ink as they spin around. The three dimensional objects might
also spin on their own access - like planets in universe.
250

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--can have all (non spinning) types of movements creating colors
-computer version lets people merge colors too...
OTD: "S"; "C"; mp; pp; mouse; toy; printer; "M"; score; egh;
character.
-sw version.
-disk can start and stop at pr (program) times/speeds= enabling u to dab
paint= so there's less than complete circle painted (like
dashes).
-'crawler' stays motionless altering image on disk= while disk=
moves.
* R39-10 Finger Art: press fingers along screen to generate
desired effect (images; commands (touch control screen): certain
sections of screen can be for commands, other sections for other
purposes: "s", touching to create images, etc)
-bring up past images, then edit/alter via standard graphic
modes~: cut and paste; in/decrease size(s)
-D: user = touches/keys in = s = c = printer/*osc/desired
function
-OTD:
ARTIST:; CAMERA:; CART*:; COMPOSITION *:;
ENTERTAIN:; K:(r*); MFH:; MORNING**:; MULTI-USER*:;
NOTIFIER:; OSC:; PR:; PRINTER*:; PS:; Q*:;
S:; SCORE:(tds); SYNTH:; TEL:(tr); UIP*:; WA:.
-SW version of Revolving Receptacle: holds everything, eg:
pens. U clicks= via "mouse"= desired writing instrument /
"editing" mode.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; p. 9]
Hurdles to gain "access". W5 "Writing instrument" (can)
function = "access".
Additional ways to play artist:
251

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-"Restricter": electric cord of actual 3D tool can be
represented by how far tool can reach around on S (as
"designated" / so as not to negatively effect certain (important)
elements. Tools wo cords are more mobile / w(with) fewer
"restrictions".
+ Vacuums / Fans: Clean up unwanted (loose lying) scraps /
elements w= vacuums. p77, 63. Especially for sub-images that
aren't firmly fixed w/in larger image. Eg: va determines that
loose leaves or paper or dirt on lawn can be blown away or sucked
up wo damaging rest of image, and results in rest of (lawn) below
becoming visible. (Then sucked up images can be: collected /
"merged" for "cutting & pasting" elsewhere.
+ wheel barrow / pick up trucks = "cut and paste" (taking and
dumping)= then u (user) must "edit" from there in more careful manner.
p68. Paths traveled may leave interesting marks / "trackable"
mark so u knows what was "cut & pasted" W5 (by age of track
marks).
-textile clothing / helmets (worn by "character" = *"game")
protects them from: colors / "images" /"crawlers" (going astray
(hence lose fewer points)).
-heaters: makes (semi) frozen "images" / "crawlers" more mobile
I functional (up to its full ("access") abilities). p77
-screws / nails: the stronger the longer / W5 images are "*cut &
+pastable".
-concrete mixers: pour into (3D) molds created previously by U=
making new "images". p79
-thermometers: shows "status" / "score" of images. p83
-tape measures / calculators: size of images (for
"coordinator"). p83
-(metal) detectors = va's seeker: seeks "designated" images.
-engines: 'power of tool associated w (with) type engine used. p88
+ Brush: "sensors"= on image input tablet (kn)= s brush strokes.
% Also: brush may have material (chemicals / electro charging
elements / small hard objects / tough bristles / wire) whose
presence is more readily sensed by "sensor".
252
:, .= .. . . .. .

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
File: Art\ Ar-Write
ART-WItITE PART:
Software for teaching dyslexics and young writers how to write.
. Image input writing tablet:
-What user writes is represented on the "screen" after it was quickly
"edited".
-in other words: as u writes certain letters= ocr (optical character
recognition) automatically "edits"
"designated" characters. Enables writer to better read their material / see
how dyslexics will read their material.
+ Writing instructor:
Teaches people to write correctly. Alerts for dyslexic or poor handwriting.
Saves from having to pay teachers
to read material for corrections.
.-D: u (user) = "writing instrument" (stylus = image input tablet) = VA
('visual analyzer) (optical character
recognition) / "guide" = nr: whenever u (user) writes a non-standard letter,
word, %phrase.
-D: "Artist" /"lmage" output = C('computer) ("Visual Analyzer"/Optical
character recognition / Dyslexic sw)
+"COORDINATOR" (compares past w= present (written/read) errors -> UIP-Tailor
I"guide") //
"DESIGNATOR" II "DRAW" (writing "images") // "EDIT" (what's written= is
"edited") lI "IMAGE" //
"INTERACTIVE IMAGES" // %"MULTI-COLORER" // "MULTI-USER" (has different "educ"
program)
"SW" /! "WRITING INSTRUMENT".
-UIP-Tailor: System tailors itself in teaching student to write according to
their poor abilities. In other words:
this system "visually analyzes" student's errors= then develops UIP-DB= for
UIP-Tailor, so SW ('software)
tailors itself to user.
-BA: handwriting "analyzer": [KN from A, B or C Dir] -> gives behavioral
prognosis (possibly related to
reading/writing problems).
-Type handwriting taught in any language. For learning: non-dyslexic writing;
good calligraphy;
-See: + "Artist's" "Guide", "Artist's" "Restrictor".
. Other troubles sw teaches:
: left hand writers who need to make their writing look as if it were from the
right hand.
+NR: Software shows how letters should have been written by superimposing the
correct form in an alternative
color over what was written.
:-ln other words: How sys (shows needed) correct(sions): in a different color=
sys semi super imposes where
the pen should have gone= wh ile showing what was "drawn".
.253

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.-poor handwriting style defined as: if u presses too hard or too lightly (in
uneven manner) = nr W5 (what,
where, when, why and how) was done incorrectly; written letters too
big/small/unevenly written; illegible
(though VA ('visual analyzer) might be able to read); too quickly written
(hence illegible).
-NR prompts slow writers / readers to go faster. "Score" beeps when u (user)
is too slow. Rewards user when
their writing is good via positive "mood" in forms of: osc, text.
US Patent Search Strategies:
-str: (software* or program*) and (teach* or educat* or learn* or instruct*)
and (write* or writing* or draw* or
paint*).
-* US Patents: 4138719 4972496 5365598
-5486122 Autonomous wearable computing device and method of artistic
expression using "game":
Educational devices using process-oriented educational methods are disclosed
to prepare children for
'interactive/'adaptive keyboarding. The device includes sets of gloves and
indicia applied C to fingers of gloves to
provide pictorial representations of the keyboard.
File: Art \ Ar-Cause
PART: ART - CAUSE
What Is "Designated" As Needing "Editing" & Why:
Miscellaneous things that are "edited":
+ Numbering: Some numbers dyslexics may have trouble with: number (digits, eg:
3 versus 8,2 versus 7, 6
versus 9, 5 versus 6, 1 versus 11. .--Eg: left portion of 8 would be bolder
than right side, and likewised for
bottom of 2, and bottom left of 6; the digits of 11 would be seperated a bit
more than usual and maybe each
digit is made to look slightly different. Commas might be boldened, coupled
with greater spacing between each
set of three digits.
-Time pieces: clock's tiine face: digital or dial [mark shows/reminds u, which
side is right and left, * which top
and bottom], numbers are "edited", or not used at all.
--Other alterations: shapes of face or dial; their colors or textures. Make
easy for children and dyslexics and
sight impared. Each hour can have different shade in background. See KN's
smell clock in 5J.
+ Color blind: helps teach color blind people to better identify between
colors. Examples: text versus
background colors are those giving reader difficulty; "games"/exercises
test/remind u that red lights at stop
lights are above the yellow, with green on the bottom; street stop signs are
shown in colors other than red, so as
to be more effected by their shape, and common locations on corners.
--degrees of shaded differences (as experienced by color blind subject) are
altered (over time).
254.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
UIP [User Information Programming]: System identifies what needs 'altering
after having "analyzed" user's
previous behavior pattern, such as their errors on computer. This is an
example of what portions of software
that may be too difficult to develop for its earlier release versions.
-"Edit" / "Route" locates certain terms of special interest to user based on
UIP = intern sys will highlight such
chapters (w/in text's menu) / paragraphs / sentences / words / letters /
image(s).
-system decides (based on uip) which words are important for u, eg: "cherry
tree" is marked in cherry red while
remaining text is all one other single color (white, or grey, etc.), because
reader operates an orchard or likes
cherries.
+ User selects words they need help with: U develops file(s) comprised of text
they have special problems with
(above and beyond how their sw handles images). Eg: common word processing sw
has ability for u to include
new words for their spell checker, but this file is used as a seeker= then
edits.
"Education": Difftcult images are used more frequently= giving reader more
training and experience. Via sw's
thesaurus= words are replaced with other similar words (even if it can be
slightly awkward). Alternatively,
difficult images are replaced with easier images (if user is being over
whelmed).
"Designating" which words need "editing":
System decides what needs altering to help each user according to their own
problems. Software searches for
designated letters/words (according to UIP / PP), then alters targeted
"images" accordingly.
-UIP: if system determines u is making certain mistakes it will "edit"
"images" as "designated".
--.Examples for how sys determines u's difficulties / "score": sw's spell
check shows they incorrectly replace
certain letters such as <Better> becomes <Detter> (when they type = K); UIP
questionnaire / sw test:
determines type problems U has.
-.Speed reading sw (KN) shows reader is slower at certain points which are
what are (already "designated" as
likely dyslexic) problems.
-Possibly all difficult letters throughout text may not get edited to ease the
dyslexic's reading ability. Only
elements highlighted for whatever reason have chance of getting additional
contrasting / highlighting for the
dyslexic.
END MAIN PART OF ART-CAUSE
File: Art \ Ar-Crawl
ART'S "CRAWLER" FEATURE
255

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+<4, 4, 4, 3$(if hw n)> AR5-1 C310 Software Multi-colorer:
Device decides when to change color. Multiple triggers cause the automatic
color changes. Screen color
changes can also signify status of situation, eg: level of access' security
clearance. One's "entertainment"
abilities change according to extemal criteria: game's characters;
"composing"; "tgh".
-In pen or "artist" software versions.
+ Causes: Externally generated causes for color changing:
-"Score": U's "score" correlates w color mode. Type scores: "game"; grade
given to their (previous) "educ"
examination.
--U's score color enables other players to know U's "status" which can include
additional powers / "game's"
character's abilities. Game characters of differing colors can gain or lose a
notch in their color hierarchy if they
are able to touch each other, eg: lower color gains a notch while higher drops
a notch or dies.
-"Access": u's access status correlates w color (on "s"). -whether u is a
customer / employee / vendor / student.
Their level of value: height in organization / volumes sold or bought.
-Punishment: sys punishes hackers by changing color accordingly for designated
time thereafter hacker's
computer is turned on. % Also applies to c of hacker in distant location. Poor
"scores".
-Danger levels: eg: yellow is more used when u is dealing w dangerous (u's
location w/in "c" is where chemical
/ research accidents are more prone); sensitivity of information (level of
secrets have corresponding color
codes).
-Subject matter: of db; type sw utilized.
-D: U= This N Sys (causes for color changing) - C
ACCESS () // EDIT (type editing mode used by u/sys) // NR (type of nr = type
color sliown) // PS-Zone
(zone of applicable people/elements) =// *Q (type q u asks) // R (whether r is
or isn't being used / of if
activated) // ROUTER (how something is being routed) // SCORE () // STATUS ()
I/ TDS (timing of
occurrence results in corresponding color) // T (whether "T" is/was used: if
info was obtained from internet)
TRACK (type activity of tracked person/object/element/process) /I UIP (whether
activated or not / if uip was
used to achieve current scenario (q, information). 'Customizes the 'artistic
features.).
-user programs or manufacturer programs the time interval between each color
(interval can be in: writing time,
time ink is sticking out ready to be used, amount of ink used, etc.); or
decided by random (with a minimum and
maximum period for each color)
-time pr (date): user programs or manufacturer programs the time interval
between each color (interval can be
in: writing time, time ink is sticking out ready to be used, amount of ink
used, etc.); or decided by random (with
a minimum and maximum period for each color)
. Subject matter: different types of information / db / functions have
corresponding colors. Quickly lets u and
onlookers know that general nature of subject matter. "S" can have multiple
colors, each section/color
designating differing subject.
256

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-identity of communicator: person / company / department / country / male or
female / age / level of seniority or
influence or value.
-suggestions for u: System "analyzes" possible interest (uip) for u to "route"
himself into other subject matter,
eg: additional ideas that are related to what u is working on; u should type
more quickly (see KN: u's typing
speed "analyzer" and= "nr"); time left for user to use system ("tds").
-know the day / time of day b'y the color.
-"game": winning/losing points results in changing of abilities/colors.
Effect (color) changes have / (Color) changes signify:
. "Game": Functions change.
characters' weapons / weapons' type emissions change color and function
accordingly. Each play / their
character needs to adjust to the changes (quickly), requiring agility. Player
can has one or more characters.
Examples:
1] Attacking Mode: red bullets kill then-> bullets change to blue and can only
name other players -> requiring
shooters to change their shooting and overall
play/movement/offensive/defensive patterns accordingly; each
player may have differing colors, changing at different times. If color
changes occur wo prompting, player
might avoid being far from defensive cover while they're in offensive (red
bullet) mode.
-other attacking modes onto other characters/players: (temporarily):
immobilizing others; changing their
allegiances to attacker; activating (booby) traps; activating dormant
attackers helping player.
21 PS-Zone - type barriers change: what it protects against; changing distance
attacker needs to be from target
to attack; location of barriers; buffer surrounding character where ever it is
(though buffer might not be
effective in designated zones (ps-zones). (Attacking) powers of characters
change in designated zones. Color
of zone can change. Character or their weapons change color resulting in=
effect each zone has on. it.
3] Character's movement modes:
=
"Entertainment" D: U = This N Sys (Effect externally controlled changes have
on designated functions) - C
ARTIST () /I BALANCER (degree to which sounds are from left or right side) //
CAMERA (direction camera
is pointing) // CART (each cart has differing pr to effect changes) //
COMPOSITION / DANCE = (u's ability to
compose altered, eg: each k/ sw icon changes its sound generating abilities)
// DB-UIP = (sys brings up data as
designated, eg: names of famous people; points in history of world or u;
related facts) // + EDIT (u watches=
sys alter images) // EXERCISE ()1/ GAME () // MD / MOOD () I/ MOTION SOUNDER
Q// MULTI-USER *
MM / MULTIMEDIA () // NOTIFIER () // OSC PS Q 1/ R() // SCORE () // STATUS ()
I/ SYNTH
TGHTILT()//TOY()/lUIP()//WA().
=
. Image selector: "va"/"camera" brings up images on s for u. Images
(periodically) flash up (inspiring u's
creativity; giving related ideas). Examples:
257 .

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-u is drawing (many) circular objects while in the "artists's" advertising
idea writing sw program= then sw
selects related images= eg: bubbles, balls, balloons, lady painting balls,
girl in polka dotted dresses (with balls
flashing)...
-u drawing any images= then sys scans u's room in random fashion= showing
images onto s.
=
"Edit". U ("interacts" w / "entertained" by) = sys alter
images/sounds/(flashing) lights/other effects via:
-u/sys pulls down 'scroll' over / clicks on image= which is subsequently
altered according to designated pr.
-all or portions (always) changing
-how designated element(s) or portions are altered by: color; changing size of
all/separate pieces/sections of
screen; replacing portions; switching portions; slicing (merging slices w
slicings from other images); empty
gaps created (allowing u to insert images / draw within).
-synth: changes according to uip preferred synthesizing mode(s).
+ Crawlers:
-'crawler' alters image as it moves across image.
Image altering point moves about image in forms of: scrollers;
-shapes of crawlers: big/small dots/blocks/other shapes; donuts; broom type
images/icons;
-how crawler moves: packmen (from late 1970's video games); falling / sliding
objects/snow; toy vehicle's
track marks; trucks dumping images at designated location(s); snake; any other
mammaUreptile/bird/fish/insect/micro-organism/other moving organism; how plant
grows (excessively);
shadows or prints made by anything (KN image (generator)); "tilt"; "dance"
-Influence original image has on subsequently= altered image(s): crawler
extracts designated elements from
original image, eg: changes circular elements to polygrams, blues to greens,
dots to larger blobs, changes only
shell / perimeter / center of original images.
--both crawler's function and characteristic of image feeding into crawler
both independently / simultaneously /
synergistically= effect altering process.
-Crawlers merging:
--one crawler can= crawl upon= another crawler resulting in:
a newly generated crawler / merging of all or some of crawler functions (to an
exponential power) / canceling
out of any touched/untouched crawler
--like magnets they can +tend (via fuzzy logic) to attract / repel each other
(in terms of chances they'll merge /
touch). Other aspects effect abilities / chances of crawlers to "interact":
type pr / u's moving around sw /
moving of crawler (by sys / u).
-Computer viruses: 'crawlers' crawl throughout designated pr / digital images
/ s, on designated computers /
systems (of targeted systems). Examples:
---used in "games": attacking opponents'
territories/functions/crawlers/attacking abilities/drawing abilities. Eg:
aj player #1's crawler goes across / penetrates / destroys player #3's wall
("access" point) allowing player #1/#2
258

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
to more readily enter ("access") = intern doing designated damage (limited by
crawler's functions). b] knock
out opponent's "game's" computer system's designated functions. c] means of
mobility (moving about pr /
cursor): drawing / movement of crawler / speed of "game".
---"Access": 'crawler viruses' may: crack passwords; lock out those w correct
passwords by accessing and in
process change password against former legitimate users
---Box holding virus: player can open pandora's box for corresponding desired
virus, though virus can attack
opener if opening player isn't cautious or if opener has bad luck (due to
crawler's being controlled by external
circumstances). Crawler might have abilities to open these pandora boxes and
be negatively effected as well.
---crawler is shown in color / osc mode how virus effects target, eg: targeted
computer turns red (shuts down),
or turns blue (slows down / limited functioning abilities).
---crawler can also function like other existing (harmful) viruses (but in
playful "game" mode). Patent search
str: virus* and (imag* or pictur* or visual*) and (computer* or software* or
electr*) not (blood* or cell* or
organ* or medic* or liv* or life)
--Used only under legal circumstances! Use this patent application filing as
additional.grounds to punish
malicious computer hackers!
-Crawler D: U= This N Sys (each type 'crawler' (and its variable functions)
controls / is controlled by) .~- C
CAMERA ((panning lens) sends images to screen) // CART () ll COMPOSITION ()
DANCE () // EDIT
GAME (crawler effects game functions, eg: attack modes / how player's
territory designated or protected) II
MOTION SOUNDER (sounding device alters according to crawler) // MULTI-USER
(each u
generates/receives different type crawler) // MM / MULTIMEDIA () // NOTIFIER
(how it notifies) // OSC
(how it sounds) // PS-Zone (each zone effected differently according to type
crawler and in what mode its in)
R () // SCORE () // STATUS () // SYNTH () // TILT () // TOY () // UIP () // WA
().
-pen / other writing instrument: functions like 'crawler'
. Was 1 C-311:
"C" version: The color of commands automatically changes color without
prompting. This can be fun and
valuable for the artist that likes making spontaneous, abstract art. It ads a
new dimension to the making of art.
.-Can develop sw images of many types (to draw), eg: ball point, felt tip,
lead for mechanical pencil, chalk,
pastel, certain types of existing durable paint-like brushes, etc
=
Misc:
-* NR: user is notified when color changes via: a light, click of mechanical
parts, or sound; or sees color change
on "s".
.-manual version also: too expensive since market wants lower priced unit.
.-This can be fun and valuable for the artist that likes making spontaneous,
abstract art. It ads a new dimension
to the making of art.
.-Can be electronic device which changes the color of ink (ball point, felt
tip
259

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
..........
--* lead for mechanical pencil, chalk, pastel
*-certain types of existing durable paint-like brushes
-related to: 1 C-31 1.
user is notified when color changes via: a light, click of inechan ical parts,
or sound
.-user can also request when a color is to change
.-device uses single colors, and or blends desired colors as user selects
D l: SW Version D: 1 u -> 2 c(cart) = 3 sw = 4 pen / 5 altering images /
printer / m / uip = 6 ink / 7 creating
images.
. D2: SW (Software=C) D2: 1C310 Software Multi-colorer =
+ACCESS ()/ +ARTIST ()/ CAMERA (c imports (and alters) images from (attached)
camera / digital data of
images on disk or via tr (from m/cartlsw))/+CART (sw: imaging abilities;
database of images)/
*COMPOSITION (images (created) -> converted to sounds (ose). Sounds
(created/imported via tr or cart) ->
converted to images. Images/sounds can be altered at any step in the flow
processes.)! DATE (tags files; date is
one of the elements that influences sw's analyzer (w5 colors change
(automatically)))/ S ("interactive" touch
screen; c=s=sw adjusts to type s in usage, eg: better visibility)/ EDUC
(increases creativity; see paper titled
"Intercultural Engineering" and other material on increasing creativity; helps
u loosen up (their creativity); helps
user try new things / helps user feel experimental / helps user let go / lets
user enjoy surprises; helps u try to
control their thought process less; merging of sw/graphic modes. Creates an
interesting 'transcending beyond
the predictable' mode sparking creativity.)/ K(control sys/pen)! M((image)
database)/ MIC ()/ MO ()/ MOUSE
(pen)! MQ ()/ MULTI-USER (preferred style (uip) of u lets sw better tailor to
each's preferences)/ NOTIFIER
(pr amount of time before color changes or other occupance happens; if quality
of work may be of poor quality
and or difficulty in printing out; lacks enough ink of particular color in
cartridge before u: tries to print /
expands image)/ OSC (nr)/ PR (artistic style, eg: u prefers water color / oil
/ Rembrandt / classic / collage !
abstract mode(s))/ Q (help menu)/ R (pen: while in bathtub/car)/ *SCORE
(quality of art = visual analyzer; for
test purposes; for psychological testing or uip)/ SENSOR (level of pen's
(stylus, pressure on key pad (k))
pressure)/ SOUND ANALYZER ()/ SPEECH ()/ STATUS (# images (in
database/completed))/ *SYNTH ()/
TDS ()/ U (artist, observer%)/ UIP (data collection; personalization)/ VISUAL
ANALYZER ()/ VR* (draw
while in vr mode)/ W5 (uip; personalization of sys (uip)).
-Footnotes: display ("S"); "C"; pp; mp; uk; interactive; each color when used
triggers a different sound, blended
colors blend the sounds; educ; toy; all; entertainment; art exercise;
portable; bp; vc; egh; score; tgh; md; cart
(colors, sounds, functions...); cp; uq; character; according to type sound the
color generated changes.
= '
- US Patents - 12.95 bib disk:
-str: (pen or pens or pencil*) and ink* and color*
260

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
% US Pat: 5412021 5411344 5376958 5368405 5352051 5306092 3552867
-str USPTO's WWW 1977-6/96: (image* or pictur* or color*) and (software* or
cornputer*) and (chang* or
random*) and (draw* or paint* or brush* or gam*) not (data or document* or
simulat*)
'-Image(s) that can change color(s). All or designated parts of: drawings /
"camera's" pictures / text. Sys can
effect colors on all of or part of: "s", printings from "printer", data
transferred to: floppy disk / another "c" or
m
Writing instrument:
-width(s) changeable for: 'crawler'; what is being drawn/changed. -US Pat
5325110 Multi-control point tool for
computer drawing.
. Benefits from changing colors:
-others (co-workers) know the level of access given u, hence easier to catch
hackers w excessive access.
. The color change triggering effect also causes following occurrences:
-"OSC": diverse sounds. Different sounds connect to differing triggering
factors.
+"Crawler": "Cut & pasted" element becomes a "Crawler": Alters what or W5 it
touches or "interact(ed)" w.
-This is one method for creating "crawlers". U selects from menu of possible
crawlers= cuts & pastes= then
may "edit" "crawler"= to function as desired (by u).
END - PART: ART'S "CRAWLER"
File: Art \ Ar-Educ
TEACHING PEOPLE TO READ (NEW VOCABULARIES)
File ar-educ
Software for teaching the young to read: Helps guide readers into more and
more difficult text. The purpose
being a gradual introduction to more complex text, saving the teacher's time.
(Patent searches on application for
young children not conducted.). Also see "Education", and Encapsulation, and
Speed reading.
Our sofl.ware scores the user's perfomance, and adjusts itself to the user's
improved reading skills they've picked
up by using the software. For example, it will stop accentuating certain new
words the reader has learned.
+ Teaching the young to read:
261

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Text has applicable images next to certain words. Eg: picture for house
adjacents the word 'house'. Picture can
be same size as (large size) text; or number next to word matches number next
to picture elsewhere on screen or
printed material.
-system learns number of times user has come across such words (on the sys).
.--system or human teacher allots # times of viewing text balanced with
complexity of word.
-Weaning: After designated occurrences of said word / concept, pictures may no
longer appear (weaning reader
off assistance).
D: (Young) reader = "Artist" / "Image" output = C ("Analyzer")
"COORDINATOR" () // "CUT & PASTE" () lI "DESIGNATOR" () // "DRAW" "EDIT" () //
+ "EDUC" Il
"GUIDE" () // "IMAGE" () /I "INTERACTIVE IMAGES" (} Il "MULTI-USER" (} // "SW"
() II "SYNERGY" /I
"WRITING INSTRUMENT" ().
Pat search strategy:
-kw: dictionary, word's defintion
-str: (software* or program*) and ((definition* or learn* or educat* or
teach*) near9 and read*)
US Patents: Programmable question and answer device 4118876 *; 4579533 Method
of teaching a subject
including use of a dictionary +; 5180307 5218537 3999307
5421731 Method for teaching reading and spelling
4083120 4138719
File: Art \ Ar ReadHelp Intro
PART: ART'S READING HELP SOFTWARE
5G061 Reading Assistance Software: This file is a subset of the file titled:
"Artist - Edit". <3, 3, 4-pat-sw-
version, 1.5-mk, 3>
General Information:
+ New words receive special "editing" attention:
-What's designated: Sys seeks words which are "designated" according to:
subject; newness (to u, field of
study (new idea)); difficulty u has had in past occurrences as "analyzed" by
(test's) "score"; what u or his
supervisors determine he should learn / "interact" with (for more experience,
"educating" himself (in its
multiple uses and contexts)). What "educ" /"router" / "mood" / nr: "analyzes"
needs learning / attention.
262

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Wean user off this editing after they've seen word designated number of
times. The more characters in word /
type subject determines number of times u reads it in "edited" form, w/ eye
catching modes diminishing each
time they've read or written it.
-However, the level of special attention can be varied, or non-existent.
-User can at any time point click on the problematic word or "encapsulated"
paragraph and view corresponding
picture. In such case, the sys (might) continue to show picture for such word
certain # times more.
-this learning to read application is simply an example of how sys tags (UIP-
db, matches) certain material
(words), next "edits"/alters it accordingly. SW search and replace.
-.sw has (invisible on s) slot in which image can appear / change.
-click on image to get: osc verbalizing what picture or text represent; video
program; any other system
triggering one of u's five bodily senses (see kn).
+ Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house
adjacents the word 'house'. Picture can
be same size as (large size) text; or number next to word matches number next
to picture elsewhere on screen or
printed material.
-system learns number of times user has come across such words (on the sys).
.--system or human teacher allots # times of viewing text balanced with
complexity of word.
-Weaning: After designated occurrences of said word / concept, pictures may no
longer appear (weaning reader
off assistance).
Weaning:
Weaning User off of the reading assistance system. Like leaming to bike first
with training wheels, then they slowly removing the extra help.
-the accentuating modes of designated text, might be reduced over time. This
reduction can apply to all / most
difficult words.
--"Designated" words w/ good "scores" showing reader doesn't have (much)
trouble can be weaned more
quickly.
-weaning off process is controlled: automatically or by u/ by guardian
(doctor) or teacher or uip*.
-if user is having a bad day [difficulty reading], they can alter the degree I
type of differentiation sys makes for
(previously / newly) designated text / other problems.
-(In normal text) images might be boldened or underlined, herein the same can
be done, with additional changes
to its shadows, etc. Replaces other "editing" modes.
. Sporadic Changes. Problematic letters are sporadically designated
differently from remaining
letters/words/text. Examples: every third problematic letter so handled;
special handling handled via random
(sw) process.
263

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-same type problem might be designated differently in
different=times/situations. Eg: confusions between letters
b and d can be green versus red; and at other times white versus black.
-TDS: differing days problematic letters are represented in differing colors.
Value: user doesn't expect difficult
letters to always be so represented, eg: for reading newspaper, etc. where
such 'assistance baggage' may not
exist.
--sys helps wean u off of the assistance sw.
-helping wean u off of this n: any difficult letters/words might simply have
differing typeface or color, so there
are two modes, normal appearance and second appearance which isn't different
vis a vis the other difficult
letters/words. Helps u to be extra careful when coming upon potential problem.
-the window size [via which text is read] can be made as small or big as
desired, while any of other features can
show up within this window on S. 5G060.
Exists:
Dyslexic's Software: All it does is highlight one word or sentence at a time.
If reader has trouble, it will
verbally (osc) announce it. Existing product called: Click-Reader from CAST
for US$20.
-if word is in larger print (headline)/italics, it will read material in
louder voice.
-Click-Reader: Reading template for any text and pictures. Includes
customizable auditory supports for
decoding, visual tracking, and organization.
-manufactured by: CAST - Center for Applied Special Technologies. 508-531-
8555. 39 Cross St., Peabody,
MA 01960.
.-Related patent: US Patent No 4875432: color on "score" board changes when
the score is tied in (volleyball)
"game".
.-(The level of "score" / "status" effects the type of color change found on
S/ Nr of any product / sys; eg: 7G)
Software showing nature of situation simply by way it's edited, saving screen
space from excessive text.
-Also see the seperate file + "Artist's" "Status".
-Nature of problems represented in how images altered: type of dyslexic or
young reader's problem shown by
type "edition".
"Score":
-"Educ": system can have timer and or other electronic analyses for how user's
reading skills are improving, eg:
ability to read or write correctly; speed of reading.
--system may force/suggest user to speed up reading / increase window size
when their "score" improves.
-How "scores": when u deemed (not) to have made error= sys= nr.
US Patents: Search Strategy: dyslexi*. Up to 8.96. Searched db via key word of
full patent text.
264

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Understanding user's problems.
D: "Scoring" -> UIP DB Development - UIP-Tailors SW= for reader. What's scored
and (W5): "Scoring"
levels / types of user's (eye / cognitive /reading) difficulties; "BA";
"educ's" "score"; "status". Related patents
follow:
4556069 RE34015. 4706686-4421122 4408616 4407299 5474081 4528989 4706686
4889422 2838681
3842822 5067806 3952728
-Following are comparatively maybe less pertinent:
4216781 5048947 5331969 3893450 4030211 4735498
4102564 4211018 5260196
Teaching methods:
Ways of "editing" / helping (+dyslexic) readers: "Educ" / "EGH" / "TGH".
Related US patents follow:
4379699 4979902 536093? 5336093 5543867 3906644 4007273 4764973 5114346
4123853 4090311
4770635 5366377 4354843 4643679 4747682 3955564 4007548 4708567 4961640
5328373 5451163
4940346 3828316-Character adressing in a word oriented computer system.
-Following are comparatively maybe less pertinent:
4136361 4661074 5145377 5312257 5421729 4351831 4346085 4346084 4479241
4456598 4430330
4636494 5253799 4498080 5315668 4021611 4089126 4498869 5360438 5302132
5387104 4592731
END MAIN PART OF ART'S READING HELP SOFTWARE
File: Art\Ar\ReadHelp*
LESS PERTINENT INFO TO UNDERSTANDING INVENTION
Introduction: Search and Replace / "Edit":
-User programs (pr) how software will make the desired alterations (nr).
-Software searches then alters particular words causing problems.
-'Editing is 'customized.
There is a plastic version of this electronic software driven invention. This
plastic version can be of plastic, or
its functions represented in software as well. Details:
Software/Plastic versions of Guiding window 5G060:
-Examples: see just one or more letters, words, sentences, paragraphs at a
time.
-window can have clear and or changeable colored see through plastic. Certain
colors backgrounds can enhance
reading and or increase comfort
265

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-certain shapes and or letters in the cut-out areas can be shown, if helpful_
Eg: user has trouble differentiating
between "b" and "d", so the top of cut out (blank) area has one or more "b"
letters and the bottom has one or
more "d" letters. User can refer to them whenever they need to better remember
their distinctions.
*-construction of plastic and or cardboard. Square's window size created by
adjust from one to three of the
sides.
System Analyzes Reader's Speed Via:
-eyeball "analyzer": watch eye movement, each movement represents: a letter,
syllable, word, word group;
mathematically calculates via (triangular) configuration what eye is seeing,
via its position to the shown text (s).
-reader hits key as they progress by: *letter, word, sentence, paragraph*.
-user scrolls text
Patents & Patentability:
Soflware signal processing is the patentable issue to some degree.
-Simple version (Mechanical): placed over printed text. Can scan by hand over
written text by hand or el. By
hand version less patentable?
.-Pat Search: need to check the modem capabilities of devices available for
assisting the partially sighted to
read.
PATENT SEARCH Strategy & some related US patent numbers:
5G061 Dyslexia Software: Q. Str: dyslexia* or dyslexic*
-Str APS 69' to 6.92: dyslexia or dyslexic:
--US PatNo's: +538880 Shows material little at a time? so reader moves eyes
minimally.
--83'-86': + 4379699 improves reading efficiency, increases light contrast.
However my invention changes
color in respect of adjacent letters. Whereas the existing patent increases
intensity of letters vis a vis the
environment.
--+ 4979902 Dyslexia reading device 1990: restricts field of vision. However
this may not stop my sw version
of vision restriction. 5421729 Color coded catalog and sales method %; 5420653
Method and apparatus for
amelioration of visual stress and dyslexia *.
Miscellaneous:
-new sw codes are used for "edited" "images". Both the sending and receiving
ends may have abbreviated
forms of interpreting these differently altered "images" to speed transmission
via: modem; cart.
-sw version: info given electronically: scanned / on-line / cart (floppy
disks, cd) -> sw converts text -> s/
printer.
-Software uses simple version (5G060) too. Combine with product 5G070.
266

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-this invention number was cut out from and a subset of 5G060, then changed to
5G061 in 7.95.
-Software version too. D: sw = c= display (desired effects and 2D (or 3D)
images). Has same and more
functions than the mechanical version.
Diagram of plastic version:
-Dl: flat (on electronic) version:
.. 1
The graphics printed onto the card is on the outer perimeter. The inner
perimeter is the see thru area. The bars
across the middle show a possible position at which the window is partially
closed with colored opaque material
(can maybe still readily read thru it). The sliding door (comes from the
bottom).
-colors used in the opaque shutter / any window (1) cover; plus the colors for
the outer perimeter can be chosen
by psychologists/dyslexia experts/u, according to the color(s) (combinations)
that show best results / preferred
by u.
Second related diagram:
-D2: ............
b d
..1.
Notes: The diagram has big square, with smaller square within - labefed 1.
1=cut out window; letters b & d are
printed onto outer (non-cut) area, above/below/to side of (reading) window.
-Epilepsy and Parkinson's have similar symptoms to Dyslexia. Hence these
products mentioned as helping any
one of these problems can be applied to helping the other illnesses. Eg: via
altering the way in which they focus
their minds.
OTD D: This N Sys (dyslectic's sw) - C
ACCESS ("behavior analyzer" studies (reading behavior) intern: only allows
those w (dyslectic/unusual)
reading style to gain access); ANALYZER (sys adjusts its modifications
according to u's
267

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
needs/behaviors/uip/pr); CART (reading text, sw, multi-media effects, uip,
access); EDUC (improves reading,
study habits, speed reading); M (text, uip, access*); MULTI-USER (each u's
differing reading needs met);
NOTIFIER (when reader not reading fast enough / as needed); OSC (); PR (how
alter text); Q(); S();
SCORE (speed, tests memory retention of read material); SENSOR (u's reading
speed); STATUS (); SYNTH
(adjust osc according to: uip, behavioral analyzer, pr, text); TDS (reading
speed, score); T (mo); UIP (sys
studies reader's (reading) style, eg: speed, comprehension = offering better
training / assistance programs (sw));
VISUAL ANALYZER (reader's eye movements).
OTD D2: This N Sys () - C =
ACCESS (password shows needed sw / current uip and score of u); ANALYZER
(tailoring uip to how data
'best presented); ARTIST (); BALANCE (osc adjusts sounds according to u's uip
for any type hearing
problem/needed assistance, eg: sound always louder in u's left ear); CAMERA
(scanner); CART (art, tutorial
sw); EDUC (tgh); K (joy stick); M (uip db); MO (); MOUSE (); MQ (); MULTI-USER
(); NR (); OSC Q;
PR (); PS (); Q(); R(); SCORE (studies level of situation (dyslectic problem,
u's interest in material,
marketability of material) via: asking (dyslectic) u questions to determine:
memory retention, speed of reading),
uses existing dyslectic / reading tests (sw)); SPEECH (); STATUS (compares u's
scores over time, graphs u's
improvement curve; analyzer = suggests future types of actions/sw u can use to
better achieve desired aims);
TDS (); U(dyslectic, general target audience of non impaired people); UIP
(reading / personal (interest)
habits); UQ ().
O- System tutors artists in improving their image making:
-D: Artist = Analyzer = C = U (human artist). U draws onto C / material
scanned by C / cart (of art work) / tr
from other C = C = sought after parameters (as pr) are selected = compared w
parameters of tutorial sw (pr)
score/analyzer = suggestions made = visual examples / written commentary /
score sheet / suggested books to
read (selected via matching of book's UIP w artist's uip (at that scoring
time)).
-This an old KN?
-similar to music instructor, yet this is more on the visual mode.
. Circumstances of developing this invention include: Mr. W.S., Sr. is
interested in the subject and has a large
electronic manufacturing plant. The SW version grew out of the hardware
product version. Inventor is healthy
and not dyslexic.
'Track: u's position in material (text) "tracked" (via sys similar to Speed
Reading SW: 5G070)
'Customize (UIP-Tailor): Sys converts text / "entertainment" / sw so its
material is converted / processed
according to uip. Eg: scan [digital] newspaper and be better able to read the
text; get periodicals/letters from e-
mail then convert; better play video "games".
268

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
% Virtual Reality: VR: walk around and have all elements converted as wanted.
"Camera" = "visual analyzer"
= converts as programmed.
* Shapes are altered. Image shape "editing-ar":
readers w difficulty seeing / *reading particular shapes, eg: polygons are
"edited" into curved shapes (circles).
-in event there are both readable and difficult shapes in same screen / file=
sw converts only difficult shapes
into ones compatible w= existing shapes.
--details in "Artist's" IMI sub-section "Edit". Within "Edit" see sub-section
'Image Coordinating SW".
=
. OTD D: U="Artist" - 5G061 Dyslexia SW (designated images of
functions/"guide"/wording) "edited" for
dyslexic) - C =
COLOR (adjusts coloring to reader's preferences) lI CRAWLER () // DRAW () /I
EDIT () // GUIDE () lI
%MULTI-USER () // S W() // WRITING INSTRUMENT (stylus inputted words ->
optical character
recognition sw -> digitizes text into letters -> "edits" as "designated").
.-text used in diverse type softwares are altered as well: word processing,
spread sheets, CAD, telephony sw, sw
utilized in (simple) LCD (s) for= any n/kn.
.-Following is somewhat repeated information: SW causes sections of "screen"
to have greater contrast /
differential (image) elements based on: uip, pr, kw. Certain words, images,
words pertaining to nr are specially
and automatically give special graphic attention (as in this 5G061) when
special attention could be of use.
Examples:
% See "Synth" for adapting sounds for those with auditory problems. Sounds are
altered in manners akin to
how visual text is "edited".
What can be "Edited":
-"routing": when u moves to different file/sw sys recalls what u was last
experiencing/reading (uip-db, kw) and
helps save u's time by accentuating materials in next file that may match u's
interest (in any manner).
Examples: U was reading about eye surgery in Chicago, then opens file of
telephone numbers, menus/tel #'s
pertaining to eye surgery are accentuated, then those #'s in Chicago are
accentuated even more (more bold or
brighter lettering or are highlighted). Naturally sys doesn't know all
possible interests in u, and only saves u's
eye scanning time, since u may read highlighted material first thinking that
has greater chance of being what he
wants.
269

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-converts certain words into other languages, eg: the Japanese are often upset
that English words (written in
katakana) are replacing theirs, in which case such English terms are changed
to Japanese (kanji or hiragana)
text.
-wording showing up on "entertainment" programs: films, television, sw,
"games".
-vision apparatus (electronic goggles / binoculars*): U able to read text they
see in real world while: driving,
walking. VR*.
-SW: text converted for programmer, while they are doing programming text. Eg:
authoring language sw has
their text / commands / prompts / etc. converted (for easier readability).
-anything that can be represented, eg: "status", "score", "notifier" is
edited. Eg: type problem, level of
seriousness.
-reader's speed (speed reading sw kn). "Scores" speed.
-type text or "entertainment", eg: only certain material in "entertainment"
mode is edited.
The user controls how this software works. Examples: U (user) controls the
level of contrast/added on
'assistance baggage' accorded (problematic) words / text. Eg: contrast level
of b versus d versus all other
letters.
Other ways text appears and or is transmittable:
All written text is made available to users via e-mail, conversion of printed
matter via scanner, disks. SW
functions w/ special hardware or home personal computers. (Large) color
monitors would help, but aren't
required. Works with all languages, including Japanese, Chinese, Arabic, other
European languages.
Making the same "edited" text easy or less unusual to read for non-dyslexics:
-shadows created by letters can be such that the light source for right half
comes from right, and left side has
own light source= resulting in right side having shadows going to left side.
Letters chosen (by writer) simply
need to have letters like "b" on right side (of s) and "d" on left side.
Dyslexics accustomed to the shadow form
of "editing" will more quickly.
Glasses or Contacts:
-same text read without eye wear by regular readers, shows up as normal text.
Eye wear changes images.
Allows different type readers to view same text. "Multi-user": those w
differing (degrees of) problems.
-Specially colored eye contact lenses might be used for color blind / dyslexic
people to help alleviate their
problems. Research needed. D: contact lens =). U= eye = ) = viewing area
[altered by lens]. Or change color
of: "C" "S"; eye glasses; shades over eye glasses; light bulb; colored surface
surrounding the "C" "S" (since this
color contrast may effect different people differently such as men who get
squirmy whenever they see red or
green due to their being color blind.
270

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
% Readers may have lenses which also allow u to see fairly normally objects
not on s, so u need not wear
special anything just for s viewing. Unlikely to work. See eye doctor.
+ User carries something like a compass which tells them at all times which
side is left which is right, however
this can also be done simply by carrying a card (printed on both sides) and
viable as long as reader knows what
is the top and bottom of card. Some dyslexics forget their left from right
sides. Use this idea w sys. Standard
compass useful too.
-D: "Visual analyzer": optical character reader /.some character recognition =
once designated text/images are
recognized (via uip-db) = then make assignment of alteration to designated
text via: color / typeface / etc = CRT
Display (S) / (Color) printer.
.-sw rejects repair - if character can't be read by machine - sys will
highlight that text.
-System only shows user what they want to see. In other words: "visual
analyzer" (only / especially) shows u
images / data what u (most) wants. S = gives preference to the images to the
degree their "score" is higher.
UIP-KW:
Certain words/letters are altered in their color in terms of
.-what word represents, eg: word cherry is shown in red, while'over ripe'
cherry can have a darker hue. Over
ripe cherries of certain varieties / from certain parts of world might have a
purplish hue as well.
.-uip-analyzer determines via (color) db the appropriate color(s), sounds
(osc, recorded sounds), etc = which
match the letter, word, paragraph, page, chapter.
.-applicable images can be inserted near the designated terms / concepts, so
images are on same page or near
designated words. -Designation for which terms receive images determined via:
u's request (k); sw; application
of program (uip).
.-Designation/selection/creation of applicable images via: "image analyzer" =
"artist" = uip.
.-Applications: same text / "entertainment" for differing audiences,
kids/adults can be "edited" to match their
uip. Images, colors, even the text itself (9G220 Channel Skipping, "editor")
can be altered as well.
User / "edited" (instruction/nr) "image" output = This N Sys (dyslexic
conversion sw) - C
ACCESS (); ANALYZER (); BILL (); CART (); EDIT Q; EDUC (); MULTI-USER
("edited" differently
for each u); NR (); OSC (); PR (); PS-Zone (); Q Q; R(); ROUTER (); SCORE ();
SENSOR (); SOUND
ANALYZER (); STATUS (); TDS (); T(); TILT (); TRACK Q; UIP ().
Additional Applications:
271

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Key boards' lettering. "K". The "edited" keyboard can be via: changing the
"image" on each key; the key
board is represented on the "screen" (shows what and how (w5) user is typing /
"drawing".
--"Computer's" (plastic) keyboard (k) (ink) can also have their letters
altered and or they might be on the
"Screen". Either letters painted onto k / key pad is an interactive screen /
each key has a small (LCD) screen
which is programmable.
."Game": players have to guess which letterings are incorrectly "edited".
Incorrect "editing": mirror images
(as a dyslexic may interpret what they view wo assistance). "Score" according
to number of times player
catches mistakes in what they see.
. Additional uses of multiple colors: Differing color(s) helps (re)train
people/u who are: color blind; sight
impaired; reading impaired (in some other manner); have eye sight problems;
have eye to cerebral cognition
difficulties (physical or psychological impairments).
. Labeling what's important: "Artist's" ="Designator": labels what needs most
attention (via va) = w a tag.
* System reads out what user is reading.
OSC ="image": each letter read / typed makes "designated" sounds.
--Sys knows letter*/word/line/paragraph u is reading at moment. In tern, sys
will read out those words (that
cause reader problems via pr/uip).
-see related existing patent mentioned in this Dyslexia filing.
% lettering in four dimension can be any one or more features in addition to
the three dimensional "editing".
* Braille: sight impaired readers suffering from some type of related
confusion - those words / letters can have
other factors better distinguishing themselves, eg: higher or thicker bumps or
have additional bump(s) nearby
specially alerting u/reader (nr).
% Material being read can be experienced in a wide array of ways: Different
letters / words / images have
differing corresponding: sounds / smells / tastes / audio modes (osc,
"speech").
-as reader reads / experiences material, the other modes may help user.
-just use your imagination!
Makes users more interested in reading and in computers in general.
File: Art \ Ar-Dys-Ed
272

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
PART: ART'S "EDITING" MODES
Introduction: since people with dyslexia need new ways to have the images
inputted into their brain, system
alters images in most effective manner according to user's preferences, or
other needs. Following are only
limited possible examples:
+ Letters portrayed in three dimension:
-each letter can be shown in three dimension, eg: the letter "b" has light
shed on it from the left, and "d" has
light shown from the right (or opposite lighting). The other form in which 3-D
takes place is to show the sides
of the letters, as if they were wooden blocks.
.--Shadows or sides also shown from: top or bottom, or front or back, or other
angles.
.-shades or sides: can be of different colors as "designated" according to:
which letters / words / type problem
of reader. U can "program" how shades appear, like any other "artist" element.
.--Size of shades / angle of
shading can be increased / decreased for changing emphasis.
-Each reader has different difficulties, eg: some in deciphering "b" and "d".
Also some can better read the same
difficulty after they've been "edited" in a fashion better suited to them, eg:
some prefer red or green sides.
:-"b" and "d" have different coloring; difficult letters are all
highlighted/colored differently from the remaining
text.
-Weaning: those people who can improve their reading can then slowly have the
designations of the difficult
letters/words be made less and less distinct so gradually all text is the
same. On difficult days the distinctions
can be made again.
Redesigning specific "letters" and words:
Section(s) of letters that better differentiate themselves may utilize special
typeface that exaggerates the
differences. Since language's lettering is simply an invention in and of
itself, there's no reason to slightly or
completely re-represent each letter in a different type "image".
-the straight lines in b and d can be emphasized, plus maybe the (upper) part
of the curve which meets the bar.
-n versus m, the middle line in m is emphasized.
-n versus u, or m versus w.
-c versus letter o - the open space in c is wider, while the right side of o
may be thicker.
-e versus c, the line in e is put into bold lettering. Or the capital E versus
3 or 8*.
-g versus p - p's bar and g's line going down emphasized, q's bar emphasized.
-p versus q altered in manner similar to b versus d.
-b versus h - bottom of curve on b emphasized, while open bottom of h made
wider and more emphasized.
-i versus I - dot emphasized, maybe stock of i bolder, while ] letter extra
tall, and i extra short.
-u versus o - open part of u opened up like h versus b.
273

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-s versus z - s made more curvaceous - its start and ending lines are extra
curvy, z made more squat and hence
zagged.
-q and p versus b and d - what is above or below is emphasized w extra
thickness.
-saw versus was, or dan versus and, whte versus with, or its versus ist - can
be differentiated by having: first
and last and or *middle letters of different letters from each other. Purpose
better help reader to ground
themselves into what's on the right versus left.
-etc.
. Color / Special-effects Compatibility:
system (automatically) "analyzes" which effects/colors are appropriate for
each situation, eg: red vis a vis green
has more contrast than grey versus white; * other effects are utilized when
necessary (according to uip).
-presence of certain shapes / textures which are in / near / between lines of
text may psychologically help
readers. Readers / instructors select which effects are desired.
-Type "edition" shows type difficulty: depending on type problem, each
"edition" can be different so reader
knows what type problem is by type "edition", eg: text changed to red
perimeter implies different problem /
*meaning from blue letter or text w blue shadows.
-User "programs" system: User can select what they want edited by selecting
from menu the type color codes
wanted or not wanted. In other words: User can "program" system (not) to seek=
then alter certain color group
problems.
Encapsulation:
What's encapsulated: Small or big sections of (problematic) text are found in
any encapsulated shape /
background / other "edited" format.
-Shapes: Squares, circles, spheres, cubes, triangular prisms, tubes, etc.
-Dividing text into smaller bite size pieces: each paragraph placed in
different squares, purpose being to break
up large pieces of text which commonly scares young or dyslexic readers. -Each
encapsulation can function as
"interactive image". I
.--tlip / spin encapsulation to see additional definitions or functions of
interactive image.
.-Spin the ball / cube: text written on sphere (which need turning (by mouse))
to proceed to additional text.
OSC sounds while its moved.
H-See KN's software that sounds when pages are turned.
--."Game": spin and land on whatever "image": this is part of game, eg: spin
the bottle, or whenever a (random
/
gambling) choice is needed.
Additional sample effects:
-Lines of tiny cubes in designated color(s) lined between Iines, or around
perimeter of"s" or printed page.
274

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--each line or word is of different color: helps stop blurring of text. Within
each word, each letter can have
(slight) variation in color.
--SW's images can also be shown in between lines, with or without a special
colored backing for these
implanted images.
--makes user feel more secure in the swirls of print. May serve as some type
of psychological grounding or
prompting or motivating or "mood" enhancer.
.-picture representing ("designated") words appear adjacent to text. Picture /
word is the interactive image.
Programmer "programs" in pictures via: "drawing" / "cut & paste" (w=
"camera"). Doubt is patentable.
--motion of picture depicts message as well. Eg: what it's pointing towards;
facial expression of its character
designating "mood".
-any accentuation can be flashing or moving to better catch attention. Flash
speed can be so user barely sees it
going on/off, and on 75% of time, off 25% of time.
-Marker: text is on one side of cube, and shadows / lines / markers emanate
from difficult text to other side of
cube.
. Additional "Editing" modes of letters / words:
-making them bigger/smaller.
-thickness altered, eg: the curve portions of letters b & d.
.-typeface altered (valuable on non color screens, and weaning of sys).
H- See "Artist's" "Status": Edition shows nature of situation, saving from
needing extra text cluttering screen.
. Background behind text:
-certain color backgrounds enhance readability, eg: via color contrast or not
triggering psychological symptoms.
See dyslexia medical studies.
-(background) images controlled by: uip / pr / what came w cart/el text. Eg:
read jungle fiction and see/hear
lions roar and monkeys swinging from trees. Background has "edited": "colors"
/ texture / text / sounds%
* Background effects altered for uip / application.
-OTD D: U = This N Sys () ~ C NR (); OSC (synth); VR% (); WA (); enhances
"mood"= for "designated"
tasks (conducted by u).
Speed reading sw (training) version: marker shows where reader should be at as
they're reading text. When
cursor lights upon difficult sections, it marks "designated" images
accordingly. This assistance only when
marker has arrived, helps induce slow readers to speed up, to gain benefit of
the "editing" function.
See 5G060.
PART: ART'S "EDITMG" MODES
File: Art \ Ar-Dys-IMI
275

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
"ART'S" GLOSSARY OF TERMS
Any concept (part) w/in each below group is normally interchangeable. Deeper
definitions divulged in other
files.
Accentuate: part of text is made more visible or altered more than remaining
text,'eg via: color, typeface, size,
boldening (made into bold lettering), highlight. "Edit".
Causes for editing: What needs editing and why. Alters sections of text
according to the software's criteria.
Examples: words difficult for dyslexics, hew words. See "Designate" in *main
IMI and "Artist". System
studies user's behavior and determines how what text creates more problem -
see UIP [User Information
Programming].
Customize: 'images are 'tailored to 'designated purposes. Can be an automated
'image/'text editing system
controlled /partly 'guided (along with user's input) by 'customization.
Designated text altered: SW search and replace; portions of text altered to
improve readability /
comprehension; desired accentuations made.
Dyslexic: Reading / Sight impaired. % Readers and viewers who stand to gain
via any type of "editing".
Dyslexic program: "Editing" (sw / pr); %sw; %pr.
Edit: Accentuate text. Convert image to help reader read. Examples makes
differences in letters <b> and <d>
stand out more.
Educate: Software teaches people to read: dyslexics, young readers, for new
secondary languages. Teaches
speed reading.
Help Read: improve reading ability, help the dyslexic, improve readability or
visibility. "Educ". Assist user in
%understanding material.
Image: Any element viewable on screen: text, pictures.
.276

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Letters / Characters: Any letter or digit in alphabet or mathematical
representation, or %"image". Letters can
be "edited" into any new letter, which may look similar or completely
different from the original (English)
language letter. Eg: b -> a triangle of similar size, d -> square.
New words: Software accentuates new words, such as unusually long terms, or
ones young reader has not read
before through the software. Can be a vocabulary builder: those pertaining to
a new subject matter user is
learning. Used with "Education" program.
Read: View material; experience material/program (with text or images*)
focusing more on the visual aspects.
% "Interact" with visually presented material.
Text: (Part of) text, letter, word, material, foparagraph, ("interactive")
"image" - see "Artist".
Weaning: This software can be designed as a crutch which later teaches users
to read on their own.
File: Art\ Ar-Dysl
Reading Assistance Software
File: Ar-DI. 5G061 Reading Assistance Software: This file is a subset of the
file titled: "Artist - Edit". <3, 3,
4-pat-sw-version, 1.5-mk, 3>
-t- New words receive special "editing" attention:
-What's designated: Sys seeks words which are "designated" according to:
subject; newness (to u, field of
study (new idea)); difficulty u has had in past occurrences as "analyzed" by
(test's) "score"; what u or his
supervisors determine he should learn / "interact" with (for more experience,
"educating" himself (in its
multiple uses and contexts)). What "educ" / "router" /"mood" / nr: "analyzes"
needs learning / attention.
-Wean user off this editing after they've seen word designated number of
times. The more characters in word /
type subject determines number of times u reads it in "edited" form, w/ eye
catching modes diminishing each
time they've read or written it.
-However, the level of special attention can be varied, or non-existent.
-User can at any time point click on the problematic word or "encapsulated"
paragraph and view corresponding
picture. In such case, the sys (might) continue to show picture for such word
certain # times more.
-this learning to read application is simply an example of how sys tags (UIP-
db, matches) certain material
(words), next "edits"/alters it accordingly. SW search and replace.
-.sw has (invisible on s) slot in which image can appear / change.
277

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-click on image to get: osc verbalizing what picture or text represent; video
program; any other system
triggering one of u's five bodily senses (see kn).
+ Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house
adjacents the word 'house'. Picture can
be same size as (large size) text; or number next to word matches number next
to picture elsewhere on screen or
printed material.
-system learns number of times user has come across such words (on the sys).
.--system or human teacher allots # times of viewing text balanced with
complexity of word.
-Weaning: After designated occurrences of said word / concept, pictures may no
longer appear (weaning reader
off assistance).
Weaning User off of the reading assistance system. Like learning to bike first
with training wheels, then they
slowly removing the extra help.
-the accentuating modes of designated text, might be reduced over time. This
reduction can apply to all / most
difficult words.
--"Designated" words w/ good "scores" showing reader doesn't have (much)
trouble can be weaned more
quickly.
-weaning off process is controlled: automatically or by u / by guardian
(doctor) or teacher or uip*.
-if user is having a bad day [difficulty reading], they can alter the degree /
type of differentiation sys makes for
(previously / newly) designated text / other problems.
-(In normal text) images might be boldened or underlined, herein the same can
be done, with additional changes
to its shadows, etc. Replaces other "editing" modes.
. Sporadic Changes. Problematic letters are sporadically designated
differently from remaining
letters/words/text. Examples: every third problematic letter so handled;
special handling handled via random
(sw) process.
-same type problem might be designated differently in different
times/situations. Eg: confusions between letters
b and d can be green versus red; and at other times white versus black.
-TDS: differing days problematic letters are represented in differing colors.
Value: user doesn't expect difficult
letters to always be so represented, eg: for reading newspaper, etc. where
such 'assistance baggage' may not
exist.
--sys helps wean u off of the assistance sw.
-helping wean u offofthis n: any difficult letters/words might simply have
differing typeface or color, so there
are two modes, normal appearance and second appearance which isn't different
vis a vis the other difficult
letters/words. Helps u to be extra careful when coming upon potential problem.
-the window size [via which text is read] can be made as small or big as
desired, while any of other features can
show up within this window on S. 5G060.
278

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Exists:
Dyslexic's Software: All it does is highlight one word or sentence at a time.
If reader has trouble, it will
verbally (osc) announce it. Existing product called: Click-Reader from CAST
for US$20.
-if word is in larger print (headline)/italics, it will read material in
louder voice.
-Click-Reader: Reading template for any text and pictures. Includes
customizable auditory supports for
decoding, visual tracking, and organization.
-manufactured by: CAST - Center for Applied Special Technologies. 508-531-
8555. 39 Cross St., Peabody,
MA 01960.
.-Related patent: US Patent No 4875432: color on "score" board changes when
the score is tied in (volleyball)
"game".
:(The level of "score" / "status" effects the type of color change found on S
/ Nr of any product / sys; eg: 7G)
Software showing nature of situation simply by way it's edited, saving screen
space from excessive text.
-Also see the seperate file +"Artist's" "Status".
-Nature of problems represented in how images altered: type of dyslexic or
young reader's problem shown by
type "edition".
"Score":
-"Educ": system can have timer and or other electronic analyses for how user's
reading skills are improving, eg:
ability to read or write correctly; speed of reading.
--system may force/suggest user to speed up reading / increase window size
when their "score" improves.
-How "scores": when u deemed (not) to have made error= sys= nr.
US Patents
-Search Strategy: dyslexi*. Up to 8.96. Searched db via key word of full
patent text.
Understanding user's problems.
D: "Scoring" -> UIP DB Development - UIP-Tailors SW= for reader. What's scored
and (W5): "Scoring"
levels / types of user's (eye / cognitive /reading) difficulties; "BA";
"educ's" "score"; "status". Related patents
follow:
4556069 RE34015. 4706686 4421122 4408616 4407299 5474081 4528989 4706686
4889422 2838681
3842822 5067806 3952728
-Following are comparatively maybe less pertinent:
4216781 5048947 5331969 3893450 4030211 4735498
4102564 4211018 5260196
279

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
Teaching methods:
Ways of "editing" / helping (+dyslexic) readers: "Educ" /"EGH" / "TGH".
Related US patents follow:
4379699 4979902 536093? 5336093 5543867 3906644 4007273 4764973 5114346
4123853 4090311
4770635 5366377 4354843 4643679 4747682 3955564 4007548 4708567 4961640
5328373 5451163
4940346 3828316-Character adressing in a word oriented computer system.
-Following are comparatively maybe less pertinent:
4136361 4661074 5145377 5312257 5421729 4351831 4346085 4346084 4479241
4456598 4430330
4636494 5253799 4498080 5315668 4021611 4089126 4498869 5360438 5302132
5387104 4592731
File: Art \ Ar-Dys2
5G061 Reading Assistance Software. File Ar-D2.
+New words receive special "editing" attention:
-What's designated: Sys seeks words which are "designated" according to:
subject; newness (to u, field of
study (new idea)); difficulty u has had in past occurrences as "analyzed" by
(test's) "score"; what u or his
supervisors determine he should learn / "interact" with (for more experience,
"educating" himself (in its
multiple uses and contexts)). What "educ" / "router" /"mood" / nr: "analyzes"
needs learning / attention.
-Wean user off this editing after they've seen word designated number of
times. The more characters in word /
type subject determines number of times u reads it in "edited" form, w/ eye
catching modes diminishing each
time they've read or written it.
-However, the level of special attention can be varied, or non-existent.
-User can at any time point click on the problematic word or "encapsulated"
paragraph and view corresponding
picture. In such case, the sys (might) continue to show picture for such word
certain # times more.
-this learning to read application is simply an example of how sys tags (UIP-
db, matches) certain material
(words), next "edits"/alters it accordingly. SW search and replace.
-.sw has (invisible on s) slot in which image can appear / change.
-click on image to get: osc verbalizing what picture or text represent; video
program; any other system
triggering one of u's five bodily senses (see kn).
+ Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house
adjacents the word 'house'. Picture can
be same size as (large size) text; or number next to word matches number next
to picture elsewhere on screen or
printed material.
-system learns number of times user has come across such words (on the sys).
280

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.--system or human teacher allots # times of viewing text balanced with
complexity of word.
-Weaning: After designated occurrences of said word / concept, pictures may no
longer appear (weaning reader
off assistance).
Weaning:
Weaning User off of the reading assistance system. Like learning to bike first
with training wheels, then they
slowly removing the extra help.
-the accentuating modes of designated text, might be reduced over time. This
reduction can apply to all / most
difficult words.
--"Designated" words w/ good "scores" showing reader doesn't have (much)
trouble can be weaned more
quickly.
-weaning off process is controlled: automatically or by u / by guardian
(doctor) or teacher or uip*.
-if user is having a bad day [difficulty reading], they can alter the degree /
type of differentiation sys makes for
(previously / newly) designated text / other problems.
-(In normal text) images might be boldened or underlined, herein the same can
be done, with additional changes
to its shadows, etc. Replaces other "editing" modes.
. Sporadic Changes. Problematic letters are sporadically designated
differently from remaining
letters/words/text. Examples: every third problematic letter so handled;
special handling handled via random
(sw) process.
-same type problem might b'e designated differently in different
times/situations. Eg: confusions between letters
b and d can be green versus red; and at other times white versus black.
-TDS: differing days problematic letters are represented in differing colors.
Value: user doesn't expect difficult
letters to always be so represented, eg: for reading newspaper, etc. where
such 'assistance baggage' may not
exist.
--sys helps wean u off of the assistance sw.
-helping wean u off of this n: any difficult letters/words might simply have
differing typeface or color, so there
are two modes, normal appearance and second appearance which isn't different
vis a vis the other difficult
letters/words. Helps u to be extra careful when coming upon potential problem.
-the window size [via which text is read] can be made as small or big as
desired, while any of other features can
show up within this window on S. 5G060.
Exists:
Dyslexic's Software: All it does is highlight one word or sentence at a time.
If reader has trouble, it will
verbally (osc) announce it. Existing product called: Click-Reader from CAST
for US$20.
-if word is in larger print (headline)/italics, it will read material in
louder voice.
-Click-Reader: Reading template for any text and pictures. Includes
customizable auditory supports for
decoding, visual tracking, and organization.
281

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-manufactured by: CAST - Center for Applied Special Technologies. 508-531-
8555. 39 Cross St., Peabody,
MA 01960.
.-Related patent: US Patent No 4875432: color on "score" board changes when
the score is tied in (volleyball)
"game".
.-(The level of "score" / "status" effects the type of color change found on
S/ Nr of any product / sys; eg: 7G)
Software showing nature of situation simply by way it's edited, saving screen
space from excessive text.
-Also see the seperate file + "Artist's" "Status".
-Nature of problems represented in how images altered: type of dyslexic or
young reader's problem shown by
- type "edition".
"Score":
-"Educ": system can have timer and or other electronic analyses for how user's
reading skills are improving, eg:
ability to read or write correctly; speed of reading.
--system may force/suggest user to,speed up reading / increase window size
when their "score" improves.
-How "scores": when u deemed (not) to have made error= sys= nr.
US Patents
-Search Strategy: dyslexi*. Up to 8.96. Searched db via key word of full
patent text.
Understanding user's problems.
D: "Scoring'-> UIP DB Development - UIP-Tailors SW= for reader. What's scored
and (W5): "Scoring"
levels / types of user's (eye / cognitive /reading) difficulties; "BA";
"educ's" "score"; "status". Related patents
follow:
4556069 RE34015. 4706686 4421122 4408616 4407299 5474081 4528989 4706686
4889422 2838681
3842822 5067806 3952728
-Following are comparatively maybe less pertinent:
4216781 5048947 5331969 3893450 4030211 4735498
4102564 4211018 5260196
Teaching methods:
Ways of "editing" / helping (+dyslexic) readers: "Educ" /"EGH" / "TGH".
Related US patents follow:
4379699 4979902 536093? 5336093 5543867 3906644 4007273 4764973 5114346
4123853 4090311
4770635 5366377 4354843 4643679 4747682 3955564 4007548 4708567 4961640
5328373 5451163
4940346 3828316-Character adressing in a word oriented computer system.
-Following are comparatively maybe less pertinent:
282

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
4136361 4661074 5145377 5312257 5421729 4351831 4346085 4346084 4479241
4456598 4430330
4636494 5253799 4498080 531'5668 4021611 4089126 4498869 5360438 5302132
5387104 4592731
File: Art\ Ar-Dys-App
ADDITIONAL APPLICATIONS TO DYSLEXIA READING INVENTION
File ar-dys-app.
+ "Educating" people in learning to read difficult words.
-What are "analyzed" as being difficult words:
all words likely to be new or over set number letters are "designated" as
likely to be needing special attention;
those words non dyslexics and dyslexics often have trouble with= according to
db. See <new words> section.
--a new way to introduce new words. Eg: for people learning new languages.
--user can click mouse on this differentiated word and 'software will show its
meaning. The type defiinition
given can be 'designated according to:
---uip; context of the word; native language of user; user's intelligence,
skills or technical ability or
experience...
-User can select (from menu) subject categories / root words / type word help
needed.
-"Designated" words can be "interactive images" which when clicked: give
(Webster/Britannica) definition;
show (moving) "images" depicting (definition / application to u (uip)) /
"route" u as "designated" (to related
files (by subject)) / osc gives examples for how concept sounds.
. Letter sizing: with enough space between lines, more difficult "images" can
be made (larger). % If made
smaller: its to make the mind concentrate on the smaller images (w different
coloring to help identify).
--the longer the word the (bigger) the typeface: for kids.
."Edited" text can be shown in following contexts:
Cross word puzzles; "games"; mm (multi-media); text that is below movies or
Karaoke; books; (journal)
articles; W W W; advertising; labels on products (on / off / power / volume %
other k); "nr" / printed caution signs
(used in facilities frequented by dyslexics), the writing can be so non-
dyslexics understand as well / aren't too
put off; Any type of (sw / pr) inst=ructions (booklet / "guide"); "interactive
images"; library (sw) catalogue
systems (for dyslexics).
. Non-SW "image" generation: Stenciling: have cut outs from plastic sheets
through which letters are (spray)
painted. Rub off letters. Pre-cut glued on lettering. Stickers w printing.
283

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-A two stage stenciling process can be used to created different colored /
textured effects. Example: shadows or
sections needing special accentuation.
Focuses User's Attention: Teaches people to focus; acts.like training wheels
for bicycle learners, user sees a
little at a time, increasing the amount shown, so they don't get overwhelmed.
Accentuating text is a form of
focusing on what the eye should better catch. Encapsulation limits the
overwhelming effect.
-Important words, sentences, paragraphs, chapters, headings can be 'designated
to show: (type of) importance
[according to color code].
File: Art \ Artist Misc *
ARTIST MISCELLANEOUS FILE *
-See KN: R24-1 Image Coordinating Software; 3C210 Color Selector
-Diagram: user = mouse / r = c - image generating or 'editing software =
screen or printer.
-'Designator: Colors, shapes or other images are utilized or "edited" to
achieve "designated" result. System
automatically determines via any invention "designation" criteria what needs
to stand out / be "edited". Results
in greater help to u: "nr"; what needs attention
-In other words: Change graphical appearance. Altering is any means to
manipulate images, eg: cut & paste;
crawling; (u) drawing.
- Image - term defined: any graphical design, or graphical interface, that can
be 'drawn or 'edited by 'artist.
-"Interactive" "Images" - term defined: for computers or interactive screens:
u / sys can create "interactive"
touch screens w/ its needed "images". Generated images (icons) have functions
triggered according to how they
are touched / activated. Software icon (related).
-Diagram: U / "Designated" functions = ("interactive images") - C =
'designated [kn] function.
-Reasons to 'draw: 'entertainment; function in 'game; creating presentation
packaged in 'mm or printed
material.
-'Status: "Editing" shows 'status of situation: type subject matter/ nr /
"routing" shown by how images are
"edited". Value: requires less text explanation cluttering screen. See: IMI's
"Score", "Status".
-('Artists') "WRITING INSTRUMENT" = Mouse, stylus, "tilt".
"Mouse"; "R"; (EI) pen or brush; "Computer's" cursor; % "Crawler"; "Tilt".
-How (tailored) "images" are "edited" and or "drawn" (by user/'tailor):
-Any alteration / generation can be part of the "artist" process. Can create
some related "artist" effect:. Eg: even
a stapler gun leaves a mark (shown in differing color), and whatever is
stapled is a "cut & paste" because this is
the most common function of the tool. "Mouse" controls below icon tools'
movements /"editing".
284

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
.-Image generation modes related to tools and functions as found in "Tool Crib
of the North" sales catalog 4966
August 1996. Page numbers mentioned are only one of possible multiple examples
in catalogue.
-Jig saw = cut portion of "cut and paste".
-carving sets / router (not "router")
-sanders / (wider) drills: getting deeper in "designated" areas brings up
corresponding layered colors. Pathways
of tool are shown.
-flashlights: what is shined upon has "edited" color
-screwdrivers leave mark that something was "cut & pasted" previously.
-Labeling each tool as an icon: the actual instruments can be represented as
icons on s= so user can click on
them to begin desired "artist" function.
-Cut / sand off sections of wood (images) "editing"
-Polishers / Sanders: the texture changes accordingly (w or wo (drastic) color
changes)
-"Color" sprayers. p39
-dust collectors p39
-Glues / Vices / (Pony spring) Clamps = (temporarily W5) "cut & paste".
-Work benches= have tools on the bench (for "artist"). A work bench can be a
file / icon w/ sub-parts (sub-
icons).
-Lawn and garden chain saws: more mobile and can more easily cut where
desired. p59
. Each / Most Artist KN also have an sw version - D: U = mouse / r k= c -
image generating sw = s/ printer /
[tr = another c] / access.
CONCLUDES THIS CENTRAL DISCRIPTION SECTION FOR ARTIST
File: Features Intro / BA
BEHAVIOR ANALYZER IN GENERAL
Use Our Masterminded Patent Application To Improve Your Ideas In Adapting To
Client Needs By Better
Understanding Them! Learn about our quick and easy licenses. Call (+1) 707-428-
5000
www.LicenseItToday.com
(Most of the 'BA part is filed under the 'Access part)
Intro. Also look under: UIP-Tailor, UIP-DB development. Applications for 'BA
include: UIP, UIP-Info,
'Games, many more!
285

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
BEHAVIOR ANALYZER'S'REACTION =
It uses multiple means in determining the behavior of who or what it is kindly
observing. This information is
available to the system thaf wishes to adapt a function for the user's tastes.
=
System adapts to user's mood. Different'moods of user= (help influence) result
in different command codes in
controlling system. A form of UIP-Tailor adjusting to user's behavior.
READ LATER:
-System determines the behavior /'mood of speaker='reacting as 'designated.
The behavior of the user= is
determined via the'sound analyzer. Different behaviors result in differing
'reactions.
-'Program the degree to which system alters itself= by =the'scored shift= in
user's behavior.
Examples:
3A280 Interactive Alarm: At designated time alarm is triggered, person must
use their voice to vocalize sound
to stop the alarming. Thereupon depending on person's voice tone machine
reacts in accompaniment.
Machine's microphone and "brain" knows how to respond. 'SA.
Purposes: causes sleeper to interact with machine, which gets their brain
working, and into awakened
interactive mode for the world. An interesting marketable novelty, gift for
your friend(s) who need help waking
up in the morning.
-Alarm waits certain time period before beginning alarm again (allows time to
deactivate alarm)
-Option: if word is sounded, machine restates person's word in different way
psychologically designed to help
waken them up. Interactive Alarm can respond differently each time/day
creating curiosity about the
"unknown" reaction of alarm to their voice (the suspense further helps waking
up). Initial outgoing sound in
morning can also change.
. Read Later D: U's created sounds (voice /'clap / machine generated (osc)) =
This N Sys [sa/access] - C
('computer)
BA [] // cart ('cartridge) [] // MULTI-USER [different sounds from different
u] // NR [when command is
triggered= u notified (by osc/beep)] // OSC [controlled by U's voice] // pr
(program) [adjust what sounds cause
what'reactions] // SCORE [type sounds for its characteristics or importance or
degree...] // SEEKS & REACTS
[to sounds] // SENSOR [] // SOUND ANALYZER [] // TDS T[I // TRACK [w5 sounds
made] // UIP [] //
VR[]//WA[].
-'Notifies 'game player when to do something according to w5 / UIP.
A3-13 EMOTION WATCHER: tells you how unrelaxed you are by how: product (ball,
top, doll, coin, etc)
spins in container, on CRT. Can output words, suggestions, slogans. Checks p
by: u (user) touching a pad
measuring your temp; sensing stress in voice (product exists) whenever
speaking (and hence operates whenever
286

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
machine's on). Mood Test(er). Mix with therapy machine product idea (notarized
13 Dec 91). Portable option
as well, w/ all functions built in.
-LeveVtypePscore of u's 'mood/stress can be shown in any manner: 'nr, 'screen,
'educational, 'artistic 'images=
changing by type'mood.
:-sys'analyzes how u reacts to their 'score.
-measures 'game player's 'scored performance
Changes in: (degree / color / type of) lighting or sound; synth; how system
'interacts w (with) u; any other
alterable function, such as those listed in: U[P-Tailor, R, K,'React...
BEHAVIOR 'SCORER=
-Determines the types and degrees of person's behavior= according to what the
system is 'programmed to 'seek=
and 'analyze.
+ R132- I Behavior - Medical Symptom Analyzer: System correlates patient's
behavioral with their medical
symptoms. Patient's graph for changing emotional state is matched with body
symptom graphs, giving
researchers additional needed analysis. Invention is the software's merging of
data. The system assists
psychiatrists and others in correlating mental w/ physical symptoms.
-patentability: Steven's guess is a facet of this might exist in market place.
Patentability might cover those
other areas not existing.
-Applications: correlating mental state w: diet; heart rate; metabolic
activity; genetics; pollutants or
poisons(internalized into body); etc. General research. Identifying medical
ailments by the deviant / changed
behaviors.
-sys correlates user's body symptoms and signals (eg cardiograph) with
subject's behavior (w5 they do). D:
organism -> sensors = c.
-"questionnaire" filled out by user = uip-db= which is used by the ba. Medical
symptoms are compared
against= this ba.
-OTD D: This N sys (system) _
ACCESS ; ANALYZER ; ARTIST ; C; CART (type analysis); S; EDUC (learn medicine,
use in medical
internships or classes); M (database of medical symptoms which tie up to
possible medical ailments (listed first
in order of greatest likelihood listed ailment is the actual diagnosis); MIC
(hears body parts); MULTI-USER
(remembers data/analysis/uip for different patients); NOTIFIER (when serious
medical conditions are found=
predicts future occurrences); OSC ; PR (how analyze patient); Q (mq to improve
"analysis"; doctor asks
questions, eg: what doctor should do, prescribe, how cure, how use sys to
better/further analyze patient); R;
SCORE (medical symptoms noticed/being studied); SENSOR ; SOUND ANALYZER (body
symptoms, eg:
287

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
coughs, breathing, heart beat, other oral functioning); SPEECH ; STATUS
(medical condition (changing));
TDS (w5 of each medical occurrence); T; UIP (behavioral and medical conditions
being analyzed); VISUAL
ANALYZER (analyzes medical images); WA ('walk about) (portable body monitoring
device (any type as
needed).
+ All types of medical equipment that can study patient, then turn results
into digital signals and intern create
the data to match with this sys, R132-1.
-utilizes R132-1-5, a subset
-Pat search strategy: (behavior* or psycholog* or psychiatric* or personalit*)
and (medic* or scien* or
physiolog*) and (soRware* or computer*)
-US Patents:
--4751642 Interactive sports simulations system with physiological sensing and
psychological conditioning.
Replace patent's 'psychophysiological manipulation' w: predicting user's
behavior / "mood" in "designated"
circumstances.
--4852578,4818234
--4951197 Weight loss management system = "ba": for causes in eating disorders
/ changes in behavior caused
by type diet.
-info gained is for: UIP-Info; building stronger 'game entities/players;
'guiding user while 'educating them.
A2-170 HANDWRITING ANALYZER: sw studies what p writes onto special display
("S") or paper (then read
via optical reader). Available in 28 languages. M seeks the characters and its
deviations that it can identify,
plus other general tendencies whether characters are or aren't identifiable.
Pen writing preferred (best are
fountain pens) for paper version. Manufacturer programs machine to seek
classical styles commonly accepted
for their implications.
-u asked to write something w/ "tilt"=pen which is= "analyzed"
: "Tilt": controls sys' functions
-copied to 5E020 in 8.95.
A2-610 BEHAVIOR SCALER: like system detecting if person is lying by stress...
in voice, detect how:
a] sexual another person feels. Even try it on yourself to see it works. Know
if you should pursue another for a
hot date.
b] reliable and or constant and or organized and or committed and or ability
to follow o lead
Op: gives readout of user's many other possible behavioral characteristics via
po, dd, crt; input user's face & it
will po/show on crt what they will look like at pp future date, or that of
their children...
TD: JK(until science has advanced enough to validate results)
-Portable option: Small and portable - keep in bag or pocket and look at later
to determine analysis, just turn on
switch to listen in for pre-programmed time length. And or use keeps hand on
switch as to when they want to
288

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
or not to receive input for analysis, eg: determined by timing of important
statements, whereas minor talking
might be less important for analysis.
4A09 Behavior Analyzer: (future product) Judges region of speaker, and maybe
social stature - all based on
word choice, accent, etc. Can seek all the possible questions to behavior and
type psychology of speaker
currently able to be done by human ear (as in over "T" conversation).
5A1080 Food - Behavior Change Analyzer: observes behavior changes in animals,
insects, bacteria, viruses,
people - according to types foods, when served (and still available), where
served and served under what
conditions. Observes changes in tastes made to standard foods, eg: more
salt...
.-4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" /
"analyzes" occurrences (for uip (db
improvement), intelligent monitor 2E251)
5A1090 Sounds & Music & Verbalized Words and Creature Sounds Analyzer: it
observes changes in behavior
according to such being emitted by itself, or observes what happens when
organisms make such changes
amongst themselves. It also notes to volume of sound made.
: 4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" /
"analyzes" occurrences (for uip (db
improvement), intelligent monitor 2E25 1)
A 1-290 Finger Print Reader: Analyzes a person's behavior by their
fingerprint. Also matches couples with
compatible fingerprints. Related to existing "C" systems based on horoscope,
blood type.
-finger Match(ing): dating service matching behavioral types associated with
genetic finger printing. Genetic
Finger Match(ing)
EXTERNAL EFFECT ON BEHAVIOR =
5A I 100 Smell Analyzer: observes changes in behavior upon emissions of any
smell (smoke, flowers, sex
smells, etc) or matter being studied.
.-4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" /
"analyzes" occurrences (for uip (db
improvement), intelligent monitor 2E251)
5A1110 Sight Analyzer: what do creatures see and how they respond to visions
from displays, pictures, other
animals (friendly/unfriendly put in cages near them.
.411020 Content & Date Verifier: of (any said) occurrences, eg: "tracks"
/"analyzes" occurrences (for uip (db
improvement), intelligent monitor 2E251)
HOW 'BA HELPS USER =
289

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
A 1-320 Activity Identification Software: senses fingers on keyboard and blips
if you aren't writing. It senses
when you are lacking in creativity, clarity, confidence by manner of keystroke
rhythms. Mix with Therapy
Machine, Taro Machine.
.-"Tilt": controls sys' functions. If "tilt" not used (correctly) it nr
(notifier) too.
++ R132-1-5 Biofeedback - Body function analyzer: System is a self analyzer,
teaching users why they are
acting and feeling the way they are. Portable wireless version also.
.-User can look at their medical analyzers and see how they are/were
performing (psychologically) intern user
gets to know themselves better.
What user learns: W5 effects their behavior:
-learn how to (intuitively) psych them up in the desirable manner.
-Ideal mind / body = symptoms / signals. Use with sporting equipment.
-Diet: effect on their human: "mood": optimism, depression; behavior
(determined via ba); sports ability: body
coordination, thinking style; thinking: studies, test scores, memory,
creativity; safety: reduction in human error
or poor quality control (when working w/ hazardous chemicals or other
dangerous jobs); quality of getting
along with other people (ba, "score").
-Sports: tennis player who is winning (statistics show at that point they are
historically (uip) 62% of winning
entire game/set) = should have heart beat (within set parameters) based on
their uip heartbeats in other
situations/times, 71 Jo of time. If user isn't winning, but their heart beat
is in this winner's heart beat pattern,
then chances - of user winning increases by 8% (since user has
confidence/right attitude/energy/feel). System
can teach player via R132 and or other behavioral analyzer systems to see
their behavior analyzed = shows on s
/ notifier = in tern user gets better at controlling themselves (internally~:
psyches themselves up to speed
up/relax/up or down creativity/etc)
: Miscellaneous: Portable version with wireless transmission. Also can develop
database of user's physical
profile.
-Usage of cardiograph is one example: level of excitement / physical activity
= determined by c
(analyzer)-behavior
analyzer = notifier (R131/R131-10)
-this system used as component for "behavioral analyzer" system(s)
-uip: determined/s for applicable user (human/animal) (by
species/task/situation/environment) what heart beat
represents which behavioral mode (how user feels/what they think) (with
designated percent chance of validity)
-
-D: *behavioral analyzer/sensor=tr=c (analyzer/behavioral analyzer/uip/*mfh) =
develops uip (for behavior
analyzer)/notifier (R31,R131-10) /s.
290

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
+-attach sys to sports equipment: treadmills, muscle building equipment,
waterproof Walkman for swimmers
(wa), pedometers, etc.
-utilizes R132-1.
.'Analyzes 'game entities/player's type actions/behaviors for: what they are
doing w5 and 'scored by
quality/effectiveness, etc.
'B.A. 'PREDICT =
-Having 'analyzed the different determinants / causes for the user's [current
/ foreseen] personality or'moods=
via the ba='predict can estimate the likely future scenarios / how systems can
be better 'tailored for user /
'designated systems / functions.
General Behavior Analyzer Info:
Phone Behavior Detectors: Used by tel call centers, e.g.: insurance claims
offices that will ping 'designated
verbalized statements by callers; and in tern have reduced fraud [by 25%).
Algorithms can sense: irritation,
duplicity, delight, sexual arousal. Archived records store and match keyed in
data by call taker, and can store
for long time [for UIP-Input]. System responds ['seek & react] to 'designated
key words, then transfers ['routes]
caller to boss/etc. See Wired Magazine, June 2005, page 44.
. PATENTS: key word search ofUS abstracts 1.74-2.97 www.qpat:
-Set 1: (psycholog* personalit*) and (study* studies analyz*)
--US Patents via main key words: 4354844 Behavioral and psych test instrument
5414644 3971034 stress
measurer, much like a lie detector *5209494 biofeedback game.
-Set 1 and (computer software)
--US Patents via Set I and computer SW ('software) kw:
5414644 4459114 +5596994 Automated and interactive behavioral & medical
guidance system 4699153
assesses verbal psychobiological correlates 4751642 4751642 Interactive sports
simulation system w/
physiological sensing & psy conditioning. *4007430 rhythmic biofeedback
5486999 categorizes health care
utilization
-USPTO Classifications: 2.97 searched 434/236*
--434/238 US Patents: 5338202 5040988 5573405-Behavior monitoring & training
device * 5573404
5511981 5399092
--434/322 US Patents: 4627818 psych testing method* 5551880-employee success
prediction system +
5465982-method and apparatus for disclosing a target pattern = ba-db
' Key Words maybe: biofeedback (handwriting adj analysis); behavior - problem
word, brings up eg: behavior
of chemicals...
-Str: (human near/5 behavior) and (study* studies analyz*)
291

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
--US Patents: 5227874 measures effectiveness of stimuli on decision making,
eg: ads on viewers.
Methods include "analysis" via: uip; "analyzer"; *"access"; frequencies of
user's voice, eg: voice lie detectors.
Cheaper systems can simply seek high frequencies representing stress.
+ SEE: "Access"' = "Behavior Analyzer", eg: it's "Group Behavior". "BA" there
has more details than this file.
-"mic" -> "analyzer" (system analyzes person's voice) -> system responds
according to pr (program) /*U's
control.
-D: Voice = "Sound Analyzer" ("mic" = sound to signal converter) / **M = C
('computer) = function
(application) / osc
Applications: #1: system's osc ('outgoing sound communicator) matches /
mimic's the user's voice so as to
solicit the desired response (emotion/feel rapporh/make them want to act in
certain manner (purchasing / work
productivity, behavioral modification). Psychologists established which type
of voice / sound frequencies are
most apt to achieve the desired effect according to: circumstances (UIP / U's
state of mind (at a particular
time)). *TDS: osc's sound modulation might be effected by the time of the day
(U may need more energizing in
early A.M.).
%#2 Info learned about U is fed into UIP. Existing UIP data may be: considered
more or less important than
the BVA's analysis (at that time of U's interfacing) according to PR. System
may adjust to U's fluctuating
moods.
%#3 Proiiuct's functions +might be (slightly) altered according to U's
determined (via: BVAIUIP) behavior.
-This being a new part, references to this part will not have used this
abbreviation, though descriptions will have
discussed this part's concept, which can be looked up in detail herein.
*-The OSC's sound quality (might be) is so excellent / similar in vocal
characteristics to u/listener it sounds like
the real person speaking to U. The sounds also have such color, they: make the
U's ears feel like they can
visualize the speaker / function (whether there is or isn't an S).
--Sys "analyzes" type (sound, behavioral) files targeted person better matches
= then communicates w them to
create maximum psychological impact (sales, "mood") as determined via
"analyzer" / K / pr. D: mic = bva / uip
= c = osc.
-C43 Lie Detector: Judge via person's voice's stress (on the tel), if they are
honest or not. (Useful for UIP) (D)
Drawing: C43=tel-c-remote
-See "Brain": sys' part adapts according to circumstances.
-OT.D D: Organism being studied (human, *animal, other) = This N sys (system)
(BA) - C
ACCESS (sys upon "access" monitors (2E251) organism); ANALYZER ; AP (%
scientific, fo psychological,
% medical, % business research projects); BRAIN ; C('computer) ; CAMERA (2E251
Intelligent Monitor);
CART (sw, db, differing cart for type organism or ap); EDUC ; GPS ;
K('keyboard) ; M(db, brain); MIC
(sound analyzer); *MO ;*MOUSE ; MQ ; MULTI-USER (differing researchers (u),
organisms being
studied); NR (w5 required parameters have/haven't* been met (via "score"
="analyzer")); OSC; pr (program)
PS ('positioning system) ; Q; R('remote control) ; SCORE ; SENSOR (motion);
SOUND ANALYZER ;
292

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
SOUND VISUAL ANALYZER* ;*SPEECH ; STATUS ; SYNTH ("analyzes" for sounds that
better
influence organisms (per pr/u/k)); TDS ; T* ; u (user) (researcher / *
organism being studied); UIP (uip of
organism /*u (studies/tests objectivity of researchers)); UQ ; VISUAL ANALYZER
; VR* ; WA ('walk
about) (use outdoors).
-Sub-Parts: BA-UIP; BA-BVA; BA-Tag: tags (then tracks) designated people
according to certain profiles.
12.95 Bib Disk US Patents = BA
-US Pat # 5121434 Speech analyzer and synthesizer using vocal tract
simulation.
-lnteractive sports simulations system for providing an actual physical trial
of the sports performance to be
enacted.
-4751642 Interactive sports simulations system with physiological sensing and
psychological conditioning.
5481265 4741320 5546943 4013294 4818234 4899106
Audiovisual means for simulating actual sports environment, sensors for
measuring the performance and
physiological performance of athlete... '
-
-search str bib 9.94: behavior* analyz*: Analysis and treatment% of swallowing
dysfunction 5143087.
"Edit": ba ('behavior analyzer) determines what u (subject) should experience.
-[Sys "tracks"="analyzes" u's behavior] = ba ('behavior analyzer) =
Conclusions (Score) utilized by "analyzer" /
UIP-DB.
.-"Router": locates then= retrieves needed data= for this part.
.-A code (access, el 'water'mark') encoded in sw/data* limits how sys /
program can be: utilized (to operate
device) / "edited" / copied. See: "Access", "Edit".
-"Bill"
-results from behavior "analyzed" are compared to a reference level (as in a
db or uip). Eg: US Pat 5461231
. kw:
-behavior* psycholog*, sociolog*, movement [moves, moving, move]
-animal*, human*, person*, people*
-study*, studies, analyz*, monitors, monitoring
. str: (behavior* psycholog*, sociolog*, movement [moves, moving, move]) and (-
animal*, human*, person*,
people*) and (study*, studies, analyz*, monitors, monitoring)
US Patents: 5465115 Video traffic monitor for retail establishments & the
like; 5433612 Electronic
accountability system - "tracks" u (user) and equipment = "ps-zone" / "track"
/."uip" (develops uip-db);
5428392; 5426425 Intelligent locator system = track / ba ('behavior analyzer)
/ ps; 5424745 Detection method
and system = track / ba / ps; 5386990; + 5250941 Customer activity monitor /
5245314 Location monitoring
system = ps / ps-zone / track / ba.
Improvement on US Patent:
293

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
5377258 Method and apparatus for an automated and interactive behavioral
guidance system: u receives
motivational messages (osc) to improve behavioral patterns; includes client db
(uip); voice stress "analyzer";
client response required]
OTD (Other Technical Details) Read Later. Drawing: u (user) = This N sys
(system) (BA / 5377258) - C
ACCESS // ANALYZER // EDIT (sys edits out less needed input from: u, uip-db)
// NR (penalizes u when .
u acts poorly (undesirable behavior) = electric shock to body /
"entertainment" sys N usage is limited (see KN))
// OSC (penalizes via harsh sounds = synth) II PR Il PS-Zone (u trained where
its safe / u is not needed for
work, eg: home, coffee room, recreation room, tv room) // Q (to build uip-db =
needed by sys to train u) // R
// SCORE (how well u's behavior is altering) II STATUS (of u's behavior) //
TDS (w5 u behaved -> builds
up UIP-DB) II TRACK // UIP.
-8/96
-Example of source that "analyzes" behavior: "Who do you think you are?", a CD-
Rom published by Harper
Collins Interactive. Also read its book version and bibliography, and speak
with the developers of this and
related books (as found in Library of Congress or Bowker's "Books in Print"
subject section) for type formats
depended on each KN application.
-BVA is a subset of both ba ('behavior analyzer) and "Sound Analyzer".
."Access = BA": identifies not only hackers but (similarly) also any
"designated" type of:
-incompetent employees / mentally ill people / terrorists / legitimate
accessors who (might be too curious
wondering beyond their "designated" "locations" on sys) / access controller
("tracks" W5 (what, where, when,
why and how) it monitors= punishes), since it can't always be trusted either.
-Determines such type accessors based on their: performance or work results
"score"; errors they make;
psychotic behavior; key word searches.
"Morning alarm" (and its "Work motivator"): system awakens and improves user's
wakeful "mood" according
to their behavior.
See 7J02 Language Trainer & Voice Analyzer: Teaches language learners to
pronounce new words. 'Predicts
how user will [incorrectly] speak, and 'guides accordingly. It's in own file.
End of this BA - General
File: Features Intro / BA*
BEHAVIOR ANALYZER - MISCELLANEOUS SECTION *
~
BA REACTION, BA SCORER, EXTERNAL EFFECT ON BEHAVIOR, HELPS USER, UIP-Tailor
BA RISK'ANALYZER: determines the predicted chance of'designated occurrence(s)=
via'score.
Examples of what's 'scored:
294

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-'Access' Behavior Analyzer: determines chances user is an illegitimate user.
-User's skills ability'scored.
-User's chance of making an error, or not performing up to the'designated
'score.
HOW'SCORES OF USERS ARE MADE. See: uip; uip-db; 'analyzer; access' ba; user's
(and their boss' and
coworkers and 'tracking systems) filing out or inputting into computerized
'interactive forms/questionnaires that
develop a personality profile of user;
-user's past performance (uip-db) is'scored (as in a graph)
-PLACE CONNECTION NOTE: in Access' ba ('behavior analyzer) - for above, below
to 'reaction.
'analyzer calculates the 'reaction of user in each typical case scenario= via
running possibly existing business
scenario type softwares, possibly used by businessmen trying to brainstorm
business strategies and or to learn
how business runs and the effects of business decision making...
INSECT BEHAVIOR ANALYZER: Electronically monitor insect behavior for research
benefits. What
15' behaviors might be monitored, and how? Possible methods: Visual Analyzer
follows movement patterns and
sends in digital reports. Can use other types of creative sensors.
BEHAVIORS ANALYZED: The personality / psycho-sociological elements, histories,
risks 'analyzed. The
person's:
-creativity [see article on enhancing creativity]
-value to company: skills; reliability; speed of work; their work history
-social skills: ability for them to get along w/ friends; peers; co-workers;
teachers...
-psychological profile
-sociological profile
See 3E061 Motion Tutor: 'Guides users to improve their movements.
END THIS FILE BA&
File: Features Intro / Balancer
BALANCER
8B110 Automatic Speaker Balancing System: The volumes from each speaker adjust
according to where you
are. Adjusts as you move.
295

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
PERSONALIZED SPEAKER BALANCE: Sound system automatically compensates for
person's location in
room. When they are closer to one speaker, the farther speaker gets louder.
For home, car, etc. speakers.
-Multi-User: senses where the "averaged" center of all people is and adjusts
speaker balance accordingly
-system identifies location of people via: motion "sensor", and or laser
tripping device, etc.
-identify location of people also by: the portable transmitters they are
wearing or carrying; can be attached to a
"R" control device which also has many other functions; sensors on seats, egt
in automobiles
-Extra fancy choice: If there are more than one persons in the room, and one
likes high base while the other
prefers it low; they system can make some compensation by adjusting according
to each person's locality in
their room. Each wears a different transmitting device; or program room so
that it stays thus permanently. The
option of this working on a transmitter basis is not required.
OTD:
"R" Control; = "S"; = "C"; - mp; = pp; = uk> = toy; ' all; = "mic"; = synth>
==portable> = "M"; = bp; = osc; vc; = score.
~
R198 Stereo turns to face the listener's REMOTE ("R") control transmitter.
[eg: give N# for our
balancer). 22 Feb 93 NK
Sound Follower & Balancer: As person walks, the speakers near them are
activated.
*-Ap: **-games; **-getting information while walking down hallways; **-
speakers may be portable, as well
as microphones
"*-couples as paging system in large buildings;
-television scream's position adjusts to best position by where person(s) are.
=
-system identifies person's, animal's location via movement sensors; then can
announce statements via speakers
nearest their location
*-same product might also be used to broadcast via the speakers according to
product's central control (not
based on positioning of human(s)
-related to product I C-291
O-Walk About:
+-According to user's location, the speakers balance their sounds accordingly.
-user's transmitter (PS); or systems motion detector determine locality of
person(s) and decides which speakers
need more or less sound.
--ifthere are more than one people, then system balances sounds according to
the rough center of the multiple
people
-ap: television, radio, any other music or sound generating device
0-The following was product number 1 C-050: Sound Walk About:
continue to hear the sound of what you are listening to regardless of where
you go in the house or other premise.
-when on speaker tel, you can continue to speak to person throughout your
room/premise since the covered area
has multiple microphone and speakers
296

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-when watching television or listening to sound system, you can hear almost
equally as well regardless of where
you go. Even different tv screens can automatically go on when you enter a
different location. (Ecologically
minded people don't want multiple tv's on at same time).
-person walking around has transmitter identifying their location and or
transmitting their outgoing voice via
their microphone.
-related to productNo 1 C-110
-OTD: remote control of balancer; pp; mp; date (at certain times the balancer
is programmed to over-ride where
people are and has a set balance that is needed); interactive%; basic; vc;
score%; md; cp; mq; access; UIP; clap;
distancer.
-BALANCE: ACCESS (sys works only for certain u (user) (who have access))/
C('computer) / CART (sw for
controlling balancer)/ CLAP (control)/ DISTANCER / K/ LOCATOR / MP / MQ /
MULTI-USER (each
person (u) has different preferred settings for balance and other (stereo)
settings)/ NOTIFIER / R('remote
control) / SENSOR (u's location)/ SPEECH / SP TEL (speakers for T('tel) are
balanced)/ STEREO (balance)/
SYNTH (according to u's location in area, sounds are synthesized differently
(to compensate) (for street noise,
acoustic structure of area, other need as pp)/ UIP (sys determines w5 balance
works)/ UQ / VISUAL
ANALYZER (determines location of one or more users)/ VR* / W5 (pp how balance
works) = BALANCE.
For two or more people, system uses the middle point in the (approximate)
center. Also titled "Balancer". See
IC-290.
--C93 Stereo turns to face the listener's remote ("R") control transmitter. 22
Feb 93. D: remote ("R") = C93
(osc/speakers)
-D: I remote ("R") = 2 tr/3 "sensor" = 4 "C" = 5 signal converter = 6
amplifier = 7 speakers/8 display/9 other
function
-OTD: 4* mode of balance shown on display ("S"); 4** cart (software
'cartridge) controls type of balance; *
entertain; 4 uk; 4 pp & mp controls balance; 4* multi-user (each user has
different setting for how they want
the balance to work for them, eg: user keys in code or certain button
signifying the program is to run according
to their previously entered pp); 7 8 9*speech; 3 senses people via: pressure
sensitive panels in chairs, *heat
sensors; for one or more user's their remote ("R") designates their location,
since "sensor" judges distance and
location of the remote ("R") (via changes in light/radio frequency wave
length, GPS); 1 can also manually
control which speakers are louder via buttons (arrow keys: < or > going up,
down /sideways). User(s)'
location also identifiable by user(s)' "remote": user can "uk" desired
function/how 7 8 9 adapt to user. 8: "C" or
TV/Cable scream adjusts/angles itself, to give user better view. 9: *telephone
nearest user's tr/remote rings.
-according to PD (GPS) location, osc ('outgoing sound communicator)
automatically balance accordingly.
Manually set the balance for two or more speakers in one or more rooms
-includes sound functions found in virtual reality (vr). Other examples: as
listener changes distance from
speaker(s) oso might be modulated to depict yelling (with beckoning that
listener come back closer for more
"interacti ve"/wh ispering.
297

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-R's K control how speakers are balanced, eg: sliding knob pushes to left or
right / arrows (2 to 4(going.in all 4
directions: N (invention) S W E)) control speakers (in similar manner as on
most stereos). Supplements other
described ways of controlling balancer. D: K('keyboard) ((arrow)
button(s)/sliding knob/ = r = tr (transmits) _
C('computer) (sound source (player/*recorder) = osc (speakers (2 or more)))
US Patents = Balancer
-str: balanc*, audi*, speakers.
++ US Patents: 5287102 "Whenever the pointer is located between the left most
and right most icons, the
volume is balanced substantially equally between the two speakers" I.B.M. =
"Balancer"
-see KN's own pat application.
OTHER ELEMENTS ADJUSTED FOR PERSON'S LOCATION~: S's angle, **blowing of wind
from HVAC
[Heating Ventilation Air Conditioner], *lighting (so that glare is reduced
allowing user to read "S" comfortably.
.-See "Brain": sys' part adapts according to circumstances.
-US Patent No: 3.497,622 Balanced Remote Control, 1980. This is very similar
to main section of this
"balancer" part.
.-"Tilt": controls sys' functions, eg: turn end of stick to left to the degree
the left speaker is to
increase/*decrease/alter (via synth) its (designated portion of) sound
frequencies.
END OF THIS BALANCE SECTION.
File: Features Intro / Basic*
BASIC *
READ THIS LATER
Optionally applies to [all] electronic central descriptions of our functions
listed in the functions section; and
under invention numbers, *plus their links.
OTD: #1+: every electronic hardware product has a "C" (computer) in its
diagram. This "C" is labeled 'C1'
within this "basic" Part. *#2: languages for software program, button labels,
printed instructions: English,
Japanese, Russian, German, Spanish, French, Italian, Mandarin Chinese.
(Connects to Cl: #2=C]). #3: Easy
and cost effective to repair. *#4: Automatically switches to the applicable
electrical currency: 100/110, or 220
volts. (#4=C1). #5: Long lasting design: one year warranty; designed to take
shock (can be dropped 8 cm to
hard floor without damage); semi-water proof; one version of product operates
in temperatures between -10 C
to +45 C. #6: Beeps a sound of one or more sounds upon activation or turning
of crucial feature(s), eg: on/off
switch. Different beep signals when: all systems are in working order, at the
time user turns on system, sound
for each separate key, etc. (D) Drawing: Status of system = tr (transmits) =
osc. (#6=C1). *#7: Has the other
hardware and software functions and buttons common to the related products.
(#7=Cl). #8: For consumer and
298

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
or commercial and or peaceful and friendly scientific applications only! Is
good for mankind. Ecologically
friendly. #9: Memorizes all previously entered programming signals after being
turned off. For example:
previous settings for: volume control; way in which machine should respond or
function in different situations.
User easily re-programs ("pp") to make alterations. (#9=C]). The old Part used
before 1994 for this was "me".
*#10: Product design, and the included "mp" & "pp" functions, are designed
with the intent to hopefully be
interesting, and as easy to learn and use. #10=C1. *#11: Specification tries
to keep manufacturing costs down.
*#12: One or more variations have sleek miniaturized product design. *#13:
Malfunction Alerter signals W5
(especially: why) a likely technical failure has occurred. Sensor= analyzer =
osc/display/printer. (#13=C1).
* 14#: Outer product casing & colors designed to maximize potential purchases
based on buyer psychology.
* 15#: Meets the other many common sense requirements of western manufacturers
and users. 16#: Option:
Battery Powered ("BP"). (BP=CI). Automatically recharges batteries (located in
back bottom of device) when
plugged into electric wall socket. Automatically powers system if other
electrical energy source fails. Display
can be made to show amount of energy in battery; warns 30 minutes or more
before battery goes out via sound
or light or notice on display ("S") or %notifier. %uses standard functions for
saving energy (device partially or
fully shuts down after 10 or more minutes of non use, product design requires
less energy for most functions,
system may save energy in same manner whether it is drawing from standard or
battery's electric current).
4E010 Motion Powered Re-Chargeable Batteries.
.--Solar powered option: product is connected to solar panels, or has the
panel(s) located on product where it is
most likely to receive maximum sun exposure; * portable solar panels; battery
as back-up (rechargeable and
non-rechargeable battery options). Solar panels/electrical outlet =
charger/analyzer/display = battery.
*17#: designed to be less obstructive in possible electronic interference with
other products, such as: air travel
safety, computers, other wireless products, etc. #18: Waterproof system
(buttons keep out water using special
diaphragms). #19: Designed to take normal wear and tear (semi-shock proof).
#20: Transmissions ("tr") via
one or more units in the system ("remote") can be via: wireless/wire. #21:
Product can be cased in: cc/cm/cp/cr.
#22: Standard, and more expensive upscale models of the standard system can be
developed. *#23 "Billing".
#24: +R28-1 Repair software analyzing system: Studies product's history.
END OF THIS BASIC SECTION
File: Features Intro / Billing
BILLING
This function creatively determines ways in which to charge users fees:
Fees can be charged digitally, and or come in the form of license fees paid as
royalties. Royalty rates can be
flat percentages of (wholesale) pricing (with or without a monthly minimum).
Applications - additional: Study u's behavior = UIP; "track".
3E190 GPS Billing Systems: See "PS" Part's "Track" sub-section.
299

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
'Customized billing based on: 'score for type function/service rendered
[higher 'scores 'designate'more
expensive function]; volume or promotional discounts; surcharges [based on
user's profile ('ba)]; country
currency; delinquency [penalties]; tax surcharges; services/functions offered
but not utilized [as determined by
'analyzer / 'tracker].
EXLUSIVE LICENSES: 'Access can restrict usage to, or away from 'designated
users and or markets (the
Japanese - South Korean region). Bills paid by [primary] licensee (authorized
user).
6B220 MONEY METER- ROYALTY GENERATOR:
Device shows through window the amount and rate at which the internal meter is
clicking away, paying for the
[parking] meter. Saves from having to collect coins, have coins, dealing with
broken meters, running to and
back to car. Pay only for invention features/services/what you use, some
people might over stay because they
are over paid. From economic point of view, people might get their business
done more quickly were they not
planning to spend a set predetermined amount of time doing something since
"the clock is ticking".
-cities might have lower rates per minute for shorter term parkers; limit
total parking time (shown on display
("S"), and such display ("S") will only go off after driver has driven the
required number of meters, not
reinserting more money into meter)
-signs can state at what rate driver should be setting their meter
-for people traveling to cities outside their state, the home state (or
wherever meter is registered) gets the
money, yet perhaps an equal number of people are traveling out of their state
so all balances out.
-if product is cheap enough, all car owners can get such devices at the time
they get their car safety check as
required by law
-saves space on sidewalks, can take away the parking meters
-device can flash, etc if car is illegally parked, eg: over time limit, ran
out of money
-color code(s): depending on type place and restrictions of parking as
programmed by driver, color(s) show up
for easy identification by parking meter police inspectors
-drivers with unpaid traffic tickets can't put more money into their parking
meters. Pay for meters at gas
stations, etc. [Money deducted automatically from person's checking account]
-o-account is deducted automatically for traffic violations: car's device
transmits coded message of license
number and province of issue, police grabs info on speeding cars, or receivers
might be done by computers
working without a human; parking violations: police simply key into their
system car's license or other number
which automatically creates a deduction from account
-car owners get periodic statements explaining type deductions made
-car owner might have special combination via which to activate certain
features, eg: parking, etc. Reduces
ability for unauthorized usage.
-"Tracker".
300

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
BILL - READ LATER SECTION MAYBE =
. Functions / Services / Information utilized:
-OTD (D) Drawing: U = This N sys (system) sub-part (what's can be made
available; pay for these) - C
('computer) =
ACCESS ; ANALYZER (have "brain" achieved desired purposes, or "analyze"
designated subject matter; like
hiring an automated thinker); cart (software 'cartridge); EDIT ; EDUC ; MULTI-
USER (allowing multiple
u); nr (notifier) (pay for this service); OSC; PR (pay for ability to
reprogram); PS-Zone ; Q; R; ROUTER
; SCORE ; SENSOR ; SOUND ANALYZER ; STATUS ; TDS ; T; TILT ; TRACK ; U; UIP ;
VISUAL
ANALYZER ; VR*; WA.
. Limiting "Access": based on amount u (user) can / may I did / promises to
pay.
-OTD D: U = This N Sys (level of "access" permitted = determined via;
type/leve] of usage to date) - C
('computer) =
ACCESS (type/* level of usage to date); ANALYZER (type/* level of usage to
date); CART (type cart used);
EDIT ; MULTI-USER (who u (user) is); nr (notifier) (u warned upon excessive
usage); PR ; PS-Zone ; Q
(type /*level of usage to date); ROUTER ; SCORE (level of usage to date);
SENSOR ; SOUND
ANALYZER ; STATUS (level of usage to date); TDS (level of usage to date); T;
TILT ; TRACK ; U; UIP
(type /*level of usage to date); VISUAL ANALYZER .
* Modes of transmission: (tr) to U/(U's) Sys or N: C = C; U's C= M; T;
"modem"; RF; infrared*; wire; OSC;
S; "game", "educ", "entertain". Mode of "interactive".
-OTD D: U = This N sys (system) sub-part ((what determines / how / type) mode
of tr) - C
ACCESS ; ANALYZER ; cart (software 'cartridge); EDIT ; EDUC ; MULTI-USER ; nr
(notifier) ; PR;
PS-Zone ; Q; R('remote control) ; ROUTER ; SCORE ; SENSOR ; SOUND ANALYZER ;
STATUS ;
TDS ; T; TILT ; TRACK ; U; UIP; VISUAL ANALYZER ; VR* ; WA.
. Miscellaneous: bills in any (major / hard currency). Credit checks usable.
Credit cards and other financial
instruments, eg: bank checking accounts may be verified, prior to offering
service / credit. U w (with) good
credit can still be blocked if / when they are (perceived = via: uip-db,
+"access", security personnel) villains,
hackers, or other undesirable elements (of society) (needing to be restricted
(for the benefit of society / (local)
economy).
-Gen D: u (user) / sys (seeking to gain "access" / to utilize) - C('computer)
(cart, access) = M = What's desired
(by U): function / service / db (information).
.-See article: "Copyright wrong? A fight brews over who gets to own the
future", US News & World Report",
Sept 18, 1995, page 99.
-patent search strategy for this general part: (bill or billing or bills or
(credit adj card*) and (information* or
(electronic* near5 service*) or internet or (information adj highway*) or
web*)
301

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-billing programs and fee schedules offered to u based on u's previous history
(what services / functions were
used (w5); all customers can qualify for any billing rate applicable, but
those offered may be different, since
seller will maximize likely chances of their increasing profit /*revenue.
. Faults and how overcome - additional:
-Problems: illegitimate "access", credit fraud, inability to pay. Solutions:
"track", credit rating reports
developed* / ordered, uip for targeting likely problein makers.
-Excessive expense: discounts given to charitable and educational and younger*
aged u (user) (w limited
services for such targeted audiences, and limited time).
. Charging users utilizing information / functions / (el) services. Limiting
"Access": based on amount u can /
may / did / promises to pay. Limits: Functions / Services / Information
utilized.
,
-R127 [Commuter's train ticket credit card: circuit emits frequency read by
device in ticket gate. JR (Japan
Railway) ]. Also copied to "Access", "PS", "Score", "Track".
END OF BILLING'S THIS SECTION
File: Features Intro / Brain *
BRAIN * (Artificial Intelligence)
This Older Function Is Now Changed Mostly To: 'Computer, 'Analyzer,
*'Coordinator, Etc Functions
Artificial Intelligence - Software that tries to emulate a human's brain
functions as best as possible, including
inventors, and bright and/or creative people we researched in the past decades
around the world.
(C, SW, Analyzer, UIP, Access) = Any of brain section in this file:
Synonymous with "Computer" part; similar to "Peter".
System tries to think like a human brain (where (w5) feasible), system tries
to know/learn (memory, analyzer)
its limitations. Uses the best state of the art in the field. Fuzzy logic.
DIAGRAM #1: 1 uk = 2 c = 3 tr (transmits) = 4 M/5 function. D]'s Read Later:
Explanation for previous
diagrams' parts is based on the number in the diagram. Commas below aren't
usually used to separate the part
numbers, eg: "25" is the same as "2, 5"
25: access/analyzer/uip can be changed via pp, mp, cart, u with higher
(overriding access/analyzer/uip, eg:
supervisor, C('computer) sys itself); character; 24 tds ('time date stamper)
(scores w5: when, *how, *what,
%why, who gained "access" into system - [may also be used for uip [database],
4E020 Content & Date
Verifier]; 25 "S"; 23 %distancer activates/deactivates lock; 245 "C", 4E020
Content & Date Verifier, 2E251
Intelligent Monitor; 245 %interactive (activates/deactivates
access/analyzer/uip, 2E251).
302

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
13: signals for activation/deactivation of Analyzer/U1P/Aocess can be received
and or activated via: microphone
("mic") (sound signals activate/deactivate access/2E25 1); tel ("T"); mo; tr;
%fs (correct image eg: signature);
remote ("R").
2: *tilt (2E251 activated by N's movement); *distancer (eg: clapper); 245 mp;
24 mq (prior to
activation/deactivation; for uip database upgrade, Analyzer/UIP/access); 24
multi-user (Analyzer/UIP/access;
individual requires own password or other activator/deactivator to gain
access); 245* notifier (who, what,
when, %where, why gained access, and or is using system, and or
Analyzer/U1P/osc); 25 osc (if
Analyzer/UIP/password or other activator / deactivator effected desired
function, eg: gained access); 24 uip
(Analyzer/UIP/access draws on UIP's database to mq prior to
Analyzer/UIP/allowing user access to user; 24
questions for Analyzer/UIP/access - change according to user's uip (mq an
action user made on system in one of
[important] previous activities); 24 pp; 24%score (2E251).
2 the necessity for any AnalyzerlUlP/access features might occasionally be
trivial, but may at minimum assist
in marketing, and helps organize differences between multi-user; uip.
24tds of user's past access is used develop/alter Analyzer/UIP/access.
Excessive or insufficient usage (as
determined by: Analyzer/UIP/Access) can exclude/limit u (user) from some/all
functions, trigger "notifier", and
inform the user's supervisor via tel ("T"), mo, e-mail; helps in billing u; nr
(notifier) sent (to supervisor,
security) for unusual quantity / type activity.
24 the type of uq can consequently (according to system's uip, mp, pp)
affect/control
Analyzer/UIP/password/manner needed to activate/deactivate; 5 speaker.
-includes known (c) systems which "Analyze"/UIP/restrict "access" of people /
other systems to: use, work w
(with) particular el N.
. Read Later (D) Drawing: This N (invention) -2E251 Remote Controlled Camera:
(sys monitors people according to their access/"Analyzer"/UIP/(code)).
-3E040 3E041 Telephone Noise Canceler: (sound sources identified by their tr
(transmits) (analyzer/access/uip
code transmitted) are processed/handled differently as pr; system better hones
into/away sounds w (with) or wo
such tagging transmitters)
-3G010 T('tel) Ring....(only for calls coming from particular CID, "Analyzer",
UIP)
-4E020 Registrar
-E020 form of remote control
-5E080 analyzes for better acoustics
-5E090 Wireless Music Band: (access limits usage of certain portable el N)
-5G061 Dyslexia Software: (speed at which info given determined by u's
UIP/access: either u gets info faster
(inhibits uninitiated computer hackers) / SW ('software) slows down when
c/security guards need more time to
"analyze" the "access" level of u (who is being questioned (by c); 5G070 Speed
Reading Software)
-7G050 &= 7G051 PVC Perforation Alerter & 7G052 Flexed Level Notifier: (type
"Analyzer"/UIP/access
determines: type of pvc needed (for extralless protection: to save
money/trouble); which types of occurrences
(chemical contact, perforations) need nr (notifier) to u/sys/monitor)
303

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-9G220 Channel Scanner Skips Stations Having Commercials: (analyzer/access/uip
determines what (w5) u
(user) needs to view (access), communications/data that can selected include:
t, mo data, a/v material, db, m
access, usage of R('remote control) functions. sys (system) blocks:
commercials, aspects of data (which are
coded as restricted to certain access coded u)
-"Bill"
% Read Later This N Part (Brain, Analyzer, UIP, Access):
-2E251 Intelligent Monitor: ; 3E040 3E041 Telephone Noise Canceler:
-3G010 T('tel) Ring Delayer: (w5 sys delays ring (on a caller by caller
basis))
-5E080 System self analyzes best synthesis for acoustics of room/hall:
-7G050 7G051 PVC Perforations Alerter: ; 7G052 Flexed Level Notifier:
-9G220 Channel Scanner Skips Stations Having Commercials:
%-o-C112 Computer predicts human error. Input UIP (working conditions of
person). System predicts errors
they're likely to make. 30 Sept 92 YD.
-utilizes fuzzy logic
-Sys analyzes u's actions -> database (behavior). Eg, Ubiquitous computing:
u(user) carries (tiny) "c" that
communicate with other "c" embedded in: appliances, t, cars, walls, KN. Eg:
Xerox's Parc Tab, and other
products mentioned in "Popular Science" Feb 95 from p.47.
2D-021 Sys reacts to external products according to
"analyzer"/uip/"access"/w5:
Eg: Incoming-Call Identifier - Screener / External Element Identifier. Calls
from desired tel numbers have a
different ring. Hereby caller knows whether to pick up the call or not. -
(Designating different type connections
/ (incoming) calls related to another of our ideas?): sys (system) responds
differently depending on which other
N/sys/existing product wants to "interact" with it.
--sys knows identity of other part/sys via its: "access" / code / tel #/ uip
(behavioral characteristics of N, or'U:
how it moves / functions / responds (to stimulate from central "C" or "M") /
visual analyzer / sound analyzer.
-D: Central Product / Sys = C = sensor / analyzer / uip analyzer / caller ID
sys part = tr/rc = External Product /
Sys.
-OTD: NOTIFIER (when desired contact has been made with part or organism); PS
(location of external
product is a determining factor in deciding if any/type connection/contact is
to be made); R; ROUTER (routes
external product by their type nature); S (shows status).
=-UIP=Analyzer: A sensor that connects tq u (user) (human body, eg: finger
wrap; animal*) to read
electromagnetic signals generated by the skin. Proprietary software interprets
those signals and translates them
into actions. Being researched by company: Other 90% Technologies Inc.,
Sausalito - See Wall St. Journal
1995 (maybe 6.95) article titled: Mind Games: Soon You'll Be zapping Bad Guys
Without Lifting a Finger.
Finger wrap will sell for $100-$200.
304

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
OTD D: This sub-N (monitor) / C
-3E020 GPS Record Keeper: when object goes in / out of range / desired uip =
monitor (begins) "analysis".
-3E151 GPS Circumstance Correlator and Controller: when object goes in / out
of range / desired uip = monitor
(begins) "analysis".
-5E040 Recording prompted upon presence of certain sounds: when object goes in
/ out of range / desired uip =
monitor (begins) "analysis".
% See 4E020 Content & Date Verifier: Sub-N of "Brain".
% 9G220 CHANNEL SCANNER SKIPS PARTICULAR INFO: Sub-N
-This main sub-N is for skipping tv commercials.
-Dissemination of codes from 3rd company source, continually broadcasts
signals guiding entertainment system
to avoid channels which are in commercial mode at any one time. Charge
$20.00/mo.
-system codes type data/shows by: status /"analyzer"/uip/"access". In tern,
sys (system) knows (better) what
(w5) to focus on / "analyze".
-OTD: D (This N) =
ACCESS (to monitoring organization / u (user) / prevent non subscribers from
using service); ANALYZER
(uip); BILL; CART (sw of uip, pre-recorded entertainment); M (monitoring
service); MIC (voice); MULTI-
USER (each u wants differing stations to enjoy); NOTIFIER (connection w (with)
monitoring service
terminated or if problem); OSC (w5 advertising starts/stops; W5 (what, where,
vhen, why and how) desired
programs are (about to be) broadcast); PR (uip; synth; osc; stereo); PS
(broadcast shown in room u (user) is in
at time); Q (how use sys); S; SCORE (u's past usage pattern, eg: w5 for type
entertainment; T('tel) (mo; u's
sys / this N= monitor service's c); +UIP ; VISUAL ANALYZER ;= WA .
% Other (far out) applications: u nr (notifier) when services are cheaper due
to drop in usage by other users.
-utility users of: electricity; (long distance / cellular / expensive)
telecommunications (t); satellite usage; M
usage (database, number crunching, etc); gas (cooking, heating) *.
--u nr (notifier) when services are being less used, hence charges drop at
these (unexpected) times, or prices rise
at unexpected surges in usage.
-System determines via its "analyzer"/uip/"access" the content of material
--especially useful when material / broadcaster / service provider doesn't
supply codes / access which helps u's
selection sys (system) select for their tastes/needs.
-"analyzer"/uip/"access": u's situation changes by the hour (for business),
hence u's needed info changes
accordingly ="analyzer" determines what needs selecting = this N.
35.
END OF "BRAIN *" SECTION
305

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
File: Features Intro / Camera*
CAMERA *
3A930 INTERACTIVE MICROSCOPE: when I) colors, or shapes change beyond certain
point, or 2) certain
color(s) begins to take prominence in a microscopic growth - triggers alarm
-the brain of system memorizes the (timed picture) point of reference from
which it should notify the user of
change
-UP approximate level of change wanted before being notified
-motion "sensor" {might have clock which date stamps & memorizes when certain
movements were made, and
possibly visually store such occurrences, eg: small organism gives birth, or
moves across screen} -has date,
time calendar, which can also date stamp each picture
-built in alarm designed to go off at certain time (based on clock only) and
or if something changes significantly
enough in image
-saves man hours
-microscope applicator: injector will inject, spray or drop in chemical(s),
food, etc into area(s) being observed
by microscope.
Injection occurs at appointed hour on its clock and or when certain changes
have taken place
-at desired timing/occurrence(s), invention can (on microscope slide): cut; or
connect two parts/regions; agitate,
etc via: laser, cutting instruments, needles,'shaking device, etc. These
functions can be handled via a small
joystick type device; comm&er type mouse which shows on screen what needs to
be altered and thefi device
handles rest on its own.
-display shows what was done and how and how effected, and kept in memory
-computer with its software, which operates one or many microscopes
simultaneously, can record new general
scientific tendencies and chart riumerous graphs and tables from collected
data
-software has [all] functions common to {many} any database or scientific
softwares.
.413020 Content & Date Verifier: of (any said) occurrences
6B110 CAMERA ALERTER: Signals cameraman when technical difficulties are
occurring during filming.
For still or motion cameras.
-when excessive movement(s) occur, device will emit light, [sound] via
externally broadcast means (non-
camera people might know about problem), and or through eye viewer (seen by
cameraman). Purpose: redo
tape while actors, set, etc are still in place; perhaps cameraman was not so
aware (or director isn't yet aware of
cameraman's poor abilities).
-catches: low light; when item being photographed moved to quickly (cameraman
simply ignores this warning
when the blur from excessive speeds is wanted)
83
.306

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-signals to cameramen whenever any normal technical filming problem occurs:
poor light; bad sound
frequencies (too high pitched)
-for still and motion cameras of all types
OTD:
Signals whenever these problems occur: certain colors that are not well
reproduced (or reproducible) onto film;
Codes: all; "S"; "C"; pp; mp; uk; date; educ; "mic"; synth; portable; sst;
"M"; bp; alerter; osc; vc; score; teach;
cart; cp; for still & motion cameras.
6B100 REMOTE ("R") CONTROL: control the rolling of film; direction of camera
(camera might show what
it is catching on a tv screen - allowing user to better direct camera); light;
speed; etc.
-control with wire for on/off exists
6B160 KEY CHAIN CAMERA: portable or regular camera attached to key chain. Has
auto focus and
exceptional ability to take pictures in all light conditions, especially dark
and work with infrared flash (can't be
seen when flashed by humans). Takes picture fairly quietly.
-purpose: picture people attacking user, or criminals at large; special
occasions when you really wish you had a
camera
-may shoot in black and white if quality of photo is easier in this mode
0 -might hold 20 to 36 pictures; or only 8 or so if this will allow camera to
be much smaller
-has feature which will take all except last two (or so) pictures in quick
sequence automatically (camera will
refocus between each shot)
6B170 ELECTRONIC POSE: prior to taking picture on still or video camera,
device entertains and or cheers
up and or makes people being photographed more relaxed and or photogenic. by:
-flashing lights and or sounds
-display shows moving or stationary: character(s), faces,
-doll pops out, with or without sound and surprise
-audio states things or makes sounds
-device is built into or separate from camera, video camera
* 3C-440-083005 CAMERA'S ENTERTAINER: Creates surprises for better pictures.
Examples: something
pops out one second before the camera's flash; has 1,000 different possible
audio messages. Similar to KN
(invention) from A or B dir.
-Tripod'Entertainer: puts kids, adults into good moods for photo taking.
307

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
*.-Costumes: - each of three legs made to look' like that of a creature's eg:
dragon, pig, chicken, angel, madam,
witch, elephant, goat, dog, cat, fish, etc.
*.-attach electronic entertainment, eg: flashing lights, with or without
sounds (OK for still life) - sounds can
even be of laughter, etc.
-4A-41 product number is merged herein
-Only the below is wanted for the patent application. The above helps explain
the basics.
Device can move, even in unexpected ways to create interesting reactions for
photo. There is just a second or
more from the time the device pops out something unexpected to the time the
camera takes the shot.
-the device may have many different options of creating excitement, thereby
allowing several different picture
takings.
+ the "surprise generating device" may also be part of cameras, even the
disposable kind
-the surprising device reduces the chance of shock to the camera, so there
might be at least a second between
surprise and camera shot =
Possible types of surprises:
+-something pops out and dangles
+ a verbal announcement, sound or music is created which can be humorous,
shocking, etc.
-surprises can also be a sound which is selected from a memory of 10,000
possible sounds, words, and
interesting unexpected phrases.
OTD: "R"; "S"; pp; mp; uk; mouse; date (activation of surprises); interactive;
toy; entertainment; portable; sst;
bp; osc; vc; score; tgh; md; cart; cm; character.
3C-490-083005 THREE DIMENSIONAL CAMERA: Computerized system analyzes shape and
reproduces
image into plastic. Special camera memorizes each section's distance from
lens. Pictures are taken from
multiple angles. System merges all data to compose dimensions of object. Data
is for analysis and or
transmitted to the reproducing device. Example applications: Copying
sculpture, machine parts; easily redesign
objects with accuracy.
3 DIMENSIONAL, ETC: Camera shows the heights and depths for all elements in
the photographed frame.
This information is merged with a real life photograph. Each distance factor
(from the camera, etc) is coded by:
a different color/shade; or, small numbers throughout the photograph showing
the distance(s); or additional
photographs which exemplify distances...
OTD: "S"; "C"; pp; mp; uk; mouse; educ%; toy%; basic; (microphone and
synthesizer: convert sounds into
corresponding images and then onto objects, eg: sing in a deep voice and make
string sculpture, sing in a high
voice and create image of laughing monkey)%; printer; au; t; c; ose; speech%;
vc%; egh%; score; cart; tr; mo;
cm; uq; mq; access; pi%; character; clap%; distancer (used to generate
images)%; multi-user; remote%; notifier;
air pad; visual analyzer (compares final product with what "C" said device
should look like).
308

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Sys allows for self-guiding in three-dimensional world. Applications:
"locator"; judging distance ("distancer")
of object/villain/their speed; understanding relationship between designated
elements (object/person) w (with)
environment.
* 2E-100 GENERAL DATA ON VIEW FINDERS (N 2E100 to 2E130): for moving pictures
~(video,
cinematography), still life (color, black/white; with images onto film and or
stored in memory).
-D 1: 1 camera lens = 2 camera = 3 image conversion/computer = 4 image
transmission = 5 view finder
-D2: 7 "printer"/8 "mfh" = 3 computer ("C") = 6 "UK"/9 "osc"
Notes on D1: 12 3 for: any type offilm, eg: video, cinematography, still
motion photography; 3: huge memory
OTD for general data: I access; 1-7 air pad; artist; 9 balance; basic; 3 cart
(software 'cartridge) (image editing,
information processing/organizing (type menus)/transmission modes)); cc; au;
ch; 5 7 character; composition; 3
date; 5 display ("S"); educ; entertain; 3 "C"; float; 7 fs; game; interactive;
3 locator; md; 8 mflh (for live
broadcast, editing possibilities, storage in "MFH" of images); 8 "mic"; 3 mo;
3 9 motion sounder; 3 mouse; 3 6
mp; 3 5 6 mq*; 3 multi-user; 3 6 notifier; 9 osc; 3 8 uip; portable; 3 6 pp; 7
printer; rcp; 6 remote ("R"); 3 6
score; 3 sound analyzer; 3 9 speech; 3 sp tel*; 3 stereo; 3 connects w/ any
video display/retrieval/recording
system; toy; tr; uk; uq; vc; visual analyzer; 3 4 5 6 8 9 wa.
Additional Applications for 'it' [this new general product category section
2E100 - 2E130]: any one or more of
the following applications/products in 'its' fields may be used separately and
or together; with or without 'it':
$ 2E110 CAMERA LIGHT ANALYZER: Determines from which direction additional
light is needed.
Suggests ideal type light sources to integrate with existing lighting, via use
of its light frequency analyzer. This
invention doesn't cover how this could be done.
-(Camera's /"Lens"') Lighting Analyzer/Demonstrator: the source from which
more light might be needed and
or how much more light (watts needed). Mk? Cost to produce?
-D: light "sensor" = "analyzer" = computer ("C" / "camera") = display/other
output
-OTD: u k / sys "analyzes" colors visible via "camera" lens -> in tern the
necessary light / other factors
necessary for desired effect (known via~: uip; pr; q; analyzer) are made known
-> to u / sys (system) -> sys / u
adjusts sys accordingly -> improved imaging (onto film / memory=c / "printer"
/ projection (onto wall) / slides).
-for semi-professionals, yet top professionals don't need it.
-camera gizmos been around since 1800's
-To make more patentable: Sys or u says one side of human face needs more
light, because it's a face, it adjusts
suggested light needed (eg, because reader read idea in article). U says they
do/don't want light evenly
balanced.
-Patent search strategy:
.-(guide* or tutor* or analyz*) and direction* and light*
309

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-guide* and direction* and light* and,angle*
-problems needing to be overcome: sys knowing how to suggest (via "analyzer")
in which direction
additional/less lighting is needed.
* 2E-120 AIR PAD VIEW FINDER: Exists
-Watch yourselves when making videos by looking into the viewfinder while
filming. Good for indoors or
outdoors.
--the viewfinder can be with wires; wireless version transmits from camera to
view finder ~via: cellular tel ("T")
technology
-Watch what is happening in another room, or part of the world. An advanced
version of AT&T's Video Tel
("T")
-also view TVNCR on system
-D: camera = computer ("C") = transmission = display ("S")
* 2E-130 IMAGE-DATA PRINT OUT: Conveying of images to non-film medium:
=print out, fax/tv teleconference transmissions/receptions of the view.
Application: show images to directors at a
different location - helps get quick approvals from ~directors/customers while
~things are in place.
--transmission(s) ~via tel lines, wire, radio frequency, cellular tel lines
-sender = visual/%audio signals = computer ("C") and software = alter the
images = print/transmit.
The receiver of the transmission may tell the filmer what they want by
altering the image ~this way.
--effective for situations for which time is crucial, eg: live tv news casting
-Date Marker: "TDS" each screen ("S") and or segment of shots taken.
* 2E250 VCR CAMERA: An improvement of Sony's miniaturized camera.
1 Camera = 2 base/3 recorder =4 tr/5 editing/6 play back/ 7 other.
OTD: 2 image converter; 2tr air pad (viewer/control camera); artist (edit
images recorded, eg: add graphics);
basic; 2 cart (editing); cc; 2clap; 2composition (combine edited visual
effects with
composed/edited/synthesized audio); cp; 2date; 2display; 2 distancer
(activates/deactivates camera/system);
entertain; 2 "C"; 123 float; I camera works (under water 5000 meters below sea
level, and in all weather
conditions); 2fs (fs out images made); %game; 7 satellite; 2gps (system will
state/show the location in which
view was made, help analyze correlations between location and audio/visual
data collected for/from such
locations); satellite controls w5 images are shot/recorded/"tr"; interactive
(camera shoots in certain instances:
when 3"visual analyzer" is triggered in any way like a motion being sensed,
type of image made is
automatically 3routed/edited according to how "visual analyzer" analyzed
image); 2"locator" seeks desired
object/situation needing to be shot, and directs camera; md; 7 mfh;
2microphone; 2mouse (editing AN);
2mp; 2mq; 7notifier; 7 osc; portable; 2pp; 7 printer (prints images copied;
2remote; 2sound analyzer;
310

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
speaker; 7 %stereo (enjoy images made with tv/vcrNTR/stereo system; Itilt;
2uk; 2uq; 2vc; 2visual
analyzer; %vr; %wa.
R30 VCR RECORDS SUPER-SLOW MOTION. Captures 500 frames per second in real
time.
-[Nac Inc 2 May 92 NK]
-visual recording system can also be "Camera" (still photo onto film / digital
memory)
-2E251 Intelligent Monitor: allows more precise "analysis" for changes in
smaller time periods. Converts
images into digital format.
OTD:
This N (Intelligent Monitor 2E251, Slow motion recorder) = ARTIST *:; CAMERA:;
CART *:;
COMPOSITION *:(visual display (s) matches the osc ('outgoing sound
communicator) (by tempo; theme (eg:
upbeat music has upbeat images)); ENTERTAIN:; MFH:; MORNING **:; MULTI-USER*:;
NOTIFIER:(visual analyzer = C('computer) = notifier); OSC:; PR:; PRINTER
*:(desired photos (from
sequence)); PS:(camera tracks pd); Q*:; R:; S:; SCORE:(visual analyzer = c =
score; *tds); SYNTH:;
TEL:(tr); UIP *:
+ R30-1 SELF ADJUSTING CAMERA MONITOR: Automated camera recording system
alters itself
according to occurrence. Occurrences include: existing security system detects
possible trouble; visual analyzer
detects interesting changes in unmanned research laboratory. Camera intern:
increases number shots per minute
(so can be played slow motion later), or activates microphone, or goes into
zoom or wide angle, or turns itself
on/off.
-ACCESS **:(visual analyzer effects control of system (on/off)), eg: security
application, capture people when
sys (system) analyzes there appears to be a villain;
o-additional situations (triggering "camera" sys responses): access code
denied (yet person tries physical / c
entry anyway); security system alerted (to possible villain), eg: see
"access"; uip shows situation, eg: one or
more of w5 plus other uip data occurring (simultaneously) (increases chances)
that situation might want to be
photographed (for security, research applications); visual analyzer = detects
particular changes in lab
experiment.
-"camera" responses (to such situations): increases number shots taken per
minute / increases recording speed;
zoom; wide angle; "mic" w= "camera" activated; sound analyzer
activated/controlled; security/observer nr
(notifier) to situation.
-D: situation (triggering sys (R30-I ) to react) = sensor = c (analyzer) =
recording (a/v) / nr (notifier) (notifier) /
m (uip)
R47 MINIATURE CAMERA [Hoya-Schott Corp, 2-7-8, Nakaochiai, Shinjuku-ku, Tokyo
161 03-3952-5011 1
Aug 92 NK]
-D: camera = tr (transmits) (wire/wireless) = C ('computer) / standard film
using mechanism = "M"
311

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-lens follows (points to) desired object(s) according to camera's pr/uip.
Images obtained used to develop uip.
-OTD:
ACCESS **:; CAMERA:; CART *:; S:; ENTERTAIN:(see other people at party); "M":.
PS:(guides which
camera needs to capture which object/person and at which angle lens should be
pointed (due to tr (transmits)
from pd)); this identical N (invention) probably in C('computer) dir (better
N).
PP/MP:; Q*:; MULTI-USER*:; NOTIF[ER:(alerts to unusual activity as system
intelligently determines via
changes in pixels which in tern correspond to certain images designed to
trigger an alarm), this is the KN
"visual analyzer" code; OSC:; PRINTER *:; R:; SCORE:; SYNTH:; TDS *:(each
scene); TEL:(tr); UIP *:.
R82 DIGITAL STILL CAMERA has built-in transmitter: pictures taken
transmittable via tel lines. [Olympus
Optical Co: 2-3-I, Nishi-Shinjuku, Shinjuku-ku, Tokyo 163-09. Tel 03-3340-2121
NK 16 May 94]
-2E251 Intelligent Monitor
R118 SYSTEM RECORDS VIEW BEHIND VEHICLES for truck drivers, eliminates blind
spot. [Clarion, 17
Feb 93 YD, Before 92 - MF]
-OTD:
CAMERA:; CART *:; CLAP: (for desired view/controlling "camera"); Display
("S"):; PD:; PP/MP:;
MQ/UQ *:; MULTI-USER*:; NOTIFIER:; OSC:; PRINTER *:; REMOTE ("R"):; SCORE:;
STEREO:;
UIP *: ("scores" past near accidents of driver); UK:; WA ('walk about) (to
improve driving perfon-nance /
training).
A4-71 C T1NY PORTABLE CAMERA. Keep for emergency photos. Smaller size permits
easy portability w/
some loss in quality.
Applications: catch hit and run drivers; thieves; give to police officers
Captures visual images and translates them into two or three-dimensional
images in electronic media (digital) /
film (video/color negative type). (D) Drawing: camera=tr/rc=c=tr/rc=viewer/r -
Many optional features,
examples: Camera can zoom / pan as directed by c/system/user/"remote". Viewer
lets user see what camera
sees. Light/flash (direction of light can be controlled). Auto-focus.
%-Location of PD (Positioning Device) / person (based on signals they
generate: heat, vibrations, visual
movement detected by camera's "sensor" directs angle of camera's lens.
-Camera angle controlled via r, pr (program) on sight, and or from * remote
location.
-OTD: % visual analyzer =uip/notifier. + "Track", "Track" = "Visual Analyzer".
-o-C86 Electronic Camera records still & moving images. Ricoh 3 Oct 92 NK & 8
Mar 93. D: R('remote
control) = C86
-4E020 Content Date Stamper: Registers and organizes previous occurrences.
.312.

CA 02635954 2008-06-30
WO 2007/081519 PCT/US2006/048704
-Advanced Photo System (APS) (primarily for portable cameras) described in
"Popular Science" 6/96, p.86.
Digital cameras.
"Camera - Control" IMI. Each of its imi belongs in another bigger imi. Camera
is wo brain by itself, hence
don't expand herein. Focus: w5 camera focuses; expanded in "va". track:
expanded in track
VA: camera sees then responds accordingly; expanded in VA
2E110 CAMERA LIGHT ANALYZER: Determines from which direction additional light
is needed. Suggests
ideal type light sources to integrate with existing lighting, via use of its
light frequency analyzer. This invention
doesn't cover how this,could be done.
-for semi-professionals, yet top professionals don't need it.
-camero gizmos been around since 1800's
-To make more patentable: sys (system) or u says one side of human face needs
more light, because it's a face,
it adjusts suggested light needed (eg, because reader read idea in article). U
says they do/don't want light evenly
balanced.
-<3, 3, 2, 3-mk>
2E251 REMOTE CONTROL CAMERA: Camera=functions are controlled as dictated by
distant computer.
Computer records according to what its visual analyzer is seeking: what, when,
how, why. Examples of when
recording takes place: cells in petri dish divide; particular people enter or
exit (system determines person via
their transmitter or other means); there is any type of threat or disaster.
This is an application of the visual
analyzer which is another invention.
-<$, 4, 3>
-Remote control camera itself is not new.
--Exists: c controls camera, eg: when: every 30 seconds, or when joystick
moves. When there are no more parts
coming down assembly line, sys stops itself. C ('computer) moves camera under
a preprogrammed manner, eg:
panning every so often - probably not adapting to environmental changes.
--Maybe exists: probably minor pixels change on frame-to-frame due to
electrical static. But sys ignores such.
It searches for big changes. Then sys follows the big change's movement. But
might not have improved above.
--Maybe Patentable: sys identifies (particular) person (via uip (access,
color, height, w5), then camera follows.
Then sys automatically goes to top 3rd part of person. Sys knows to go to top
of image.
---nr when bottom of Petri dish is filled.
---point camera into nuclear plant, point at unusual area (hot), camera (infra-
red) then moves its head to other
important areas (thereafter, which might intern be effected).
-2E210 Image searcher: camera seeks particular images, intern shoots, follows,
pans, etc accordingly (to pr).
313

DEMANDE OU BREVET VOLUMINEUX
LA PRESENTE PARTIE DE CETTE DEMANDE OU CE BREVET COMPREND
PLUS D'UN TOME.
CECI EST LE TOME 1 DE 5
CONTENANT LES PAGES 1 A 313
NOTE : Pour les tomes additionels, veuillez contacter le Bureau canadien des
brevets
JUMBO APPLICATIONS/PATENTS
THIS SECTION OF THE APPLICATION/PATENT CONTAINS MORE THAN ONE
VOLUME
THIS IS VOLUME 1 OF 5
CONTAINING PAGES 1 TO 313
NOTE: For additional volumes, please contact the Canadian Patent Office
NOM DU FICHIER / FILE NAME:
NOTE POUR LE TOME / VOLUME NOTE:

Representative Drawing

Sorry, the representative drawing for patent document number 2635954 was not found.

Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: IPC expired 2023-01-01
Application Not Reinstated by Deadline 2015-06-16
Inactive: Dead - No reply to s.30(2) Rules requisition 2015-06-16
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2014-12-19
Inactive: Abandoned - No reply to s.30(2) Rules requisition 2014-06-16
Inactive: S.30(2) Rules - Examiner requisition 2013-12-16
Inactive: Report - QC failed - Minor 2013-11-27
Inactive: First IPC assigned 2012-03-21
Inactive: IPC assigned 2012-03-21
Inactive: Correspondence - PCT 2012-03-01
Inactive: IPC expired 2012-01-01
Inactive: IPC removed 2011-12-31
Letter Sent 2011-12-20
Request for Examination Received 2011-12-12
All Requirements for Examination Determined Compliant 2011-12-12
Request for Examination Requirements Determined Compliant 2011-12-12
Letter Sent 2010-02-22
Reinstatement Requirements Deemed Compliant for All Abandonment Reasons 2010-02-02
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2009-12-21
Inactive: Notice - National entry - No RFE 2008-11-25
Inactive: Inventor deleted 2008-11-04
Inactive: Inventor deleted 2008-11-04
Inactive: Cover page published 2008-11-03
Inactive: Cover page published 2008-10-24
Inactive: Notice - National entry - No RFE 2008-10-20
Inactive: Inventor deleted 2008-10-20
Inactive: Inventor deleted 2008-10-20
Inactive: Applicant deleted 2008-10-17
Inactive: First IPC assigned 2008-08-20
Application Received - PCT 2008-08-19
National Entry Requirements Determined Compliant 2008-06-30
Application Published (Open to Public Inspection) 2007-07-19

Abandonment History

Abandonment Date Reason Reinstatement Date
2014-12-19
2009-12-21

Maintenance Fee

The last payment was received on 2013-12-05

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Basic national fee - standard 2008-06-30
MF (application, 2nd anniv.) - standard 02 2008-12-19 2008-12-19
Reinstatement 2010-02-02
MF (application, 3rd anniv.) - standard 03 2009-12-21 2010-02-02
MF (application, 4th anniv.) - standard 04 2010-12-20 2010-12-03
MF (application, 5th anniv.) - standard 05 2011-12-19 2011-12-05
Request for examination - standard 2011-12-12
MF (application, 6th anniv.) - standard 06 2012-12-19 2012-12-05
MF (application, 7th anniv.) - standard 07 2013-12-19 2013-12-05
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
STEVEN KAYS
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Description 2008-06-30 315 15,252
Description 2008-06-30 313 15,253
Description 2008-06-30 302 15,235
Description 2008-06-30 310 15,246
Description 2008-06-30 93 4,078
Cover Page 2008-10-24 1 24
Reminder of maintenance fee due 2008-10-20 1 111
Notice of National Entry 2008-10-20 1 193
Notice of National Entry 2008-11-25 1 194
Courtesy - Abandonment Letter (Maintenance Fee) 2010-02-15 1 171
Notice of Reinstatement 2010-02-22 1 164
Reminder - Request for Examination 2011-08-22 1 122
Acknowledgement of Request for Examination 2011-12-20 1 177
Courtesy - Abandonment Letter (R30(2)) 2014-08-11 1 166
Courtesy - Abandonment Letter (Maintenance Fee) 2015-02-13 1 173
Correspondence 2008-07-17 1 33
PCT 2008-09-08 2 90
PCT 2008-06-30 3 126
PCT 2008-06-30 4 189
PCT 2008-06-30 29 2,050
PCT 2008-07-04 1 47
Fees 2008-12-19 1 26
PCT 2008-07-24 1 50
Correspondence 2012-03-01 3 77