US20100106574A1 - Computing Environment Transaction System to Transact Computing Environment Circumventions - Google Patents

Computing Environment Transaction System to Transact Computing Environment Circumventions Download PDF

Info

Publication number
US20100106574A1
US20100106574A1 US12/603,098 US60309809A US2010106574A1 US 20100106574 A1 US20100106574 A1 US 20100106574A1 US 60309809 A US60309809 A US 60309809A US 2010106574 A1 US2010106574 A1 US 2010106574A1
Authority
US
United States
Prior art keywords
rule
recited
computing environment
circumvention
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/603,098
Inventor
Shawn Cartwright
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gametek LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=26907424&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20100106574(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Individual filed Critical Individual
Priority to US12/603,098 priority Critical patent/US20100106574A1/en
Publication of US20100106574A1 publication Critical patent/US20100106574A1/en
Assigned to THEADOS CORPORATION reassignment THEADOS CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CARTWRIGHT, SHAWN D.
Assigned to GAMETEK LLC reassignment GAMETEK LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: THEADOS CORPORATON
Assigned to GAMETEK LLC reassignment GAMETEK LLC CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR ENTERED AS THEADOS CORPORATON PREVIOUSLY RECORDED ON REEL 027641 FRAME 0952. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNOR SHOULD BE ENTERED AS THEADOS CORPORATION. Assignors: THEADOS CORPORATION
Priority to US13/617,173 priority patent/US10607237B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/60Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor
    • A63F13/61Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor using advertising information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0209Incentive being awarded or redeemed in connection with the playing of a video game
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0211Determining the effectiveness of discounts or incentives
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0222During e-commerce, i.e. online transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0239Online discounts or incentives
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0273Determination of fees for advertising
    • G06Q30/0274Split fees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0273Determination of fees for advertising
    • G06Q30/0275Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]

Definitions

  • the present invention relates generally to the creation, integration, and transaction of instances when predefined rules that govern a particular environment are circumvented. Particularly, the present invention relates to providing an ability to circumvent predefined rules of a computing environment through a transaction where the ability is integrated within the computing environment and is exploited as the computing environment is navigated.
  • Some environments may not offer a sanction, reprimand, retribution, or punishment when a rule is broken, bur rather may be structured that it is virtually impossible to circumvent or break an environment rule. Accordingly, on balance, most people when navigating in an environment try their best to adhere to the environment rules, or in the case where there is no risk for rule breaking, do not attempt to break or circumvent rules as the environment structure makes it difficult to break the environment rules. Even if one were to choose to break an environment rule, in most environments there are not mechanisms that allow for rule breaking that either mitigate or completely remove risk.
  • breaking rules is traditionally kept secret in fear of retaliation, reprimand, and rebuke from non-sanctioning parties.
  • breaking rules is traditionally kept secret in fear of retaliation, reprimand, and rebuke from non-sanctioning parties.
  • gaming enthusiasts have enjoyed a number of action, action-adventure, adventure, and strategy games, such as, DOOM®, QUAKE®, AGE OF EMPIRES®, ULITMA ONLINE®, etc.
  • the object of these games is to wage battle with various beings in an effort to win a war or improve your standing within the game and/or gaming community.
  • These games are typically structured such that the player is given access to increasingly superior weaponry and/or skills as they advance through increasingly difficult game levels.
  • garners would be able to have access to these superior weapons, or alternatively, additional ammunition for their existing weaponry, and/or superior skills earlier in the gaming experience, thereby increasing the gamers chances of completing computer game levels.
  • a hint may provide information such as button combinations that would allow gamers to circumvent and/or break the predefined rules of a computer game (e.g. obtain a superior weapon instantaneously without having to complete a game level or having to find it in the computer game environment).
  • these practices place a significant burden on garners as they are required to spend their time and energy tracking these hints down. Also, there is no guarantee that the hint actually works as advertised.
  • the gamer is thus exposed to the possibility of trying numerous hints before finding one that achieves the desired computer game predefined rule circumvention and/or rule breaking (e.g. obtaining a superior weapon). Moreover, there is a disconnect in the activities surrounding the actual playing of a computer game and incorporating a found hint in the game being played. That is, the hints are not integrated within the computer game environment and exist external to the computer game.
  • a more advantageous practice contemplates providing enhanced entertainment options for a computer game wherein a mechanism is offered to gaming developers for integration with within a computer game that offers the ability to gamers to circumvent and/or break the predefined rules of the computer game while the game is being played.
  • This practice further contemplates the ability to transact the instance in which the gamer accepts the offers provided by the mechanism while the game is being played.
  • Such practice would eliminate the time and effort expenditure required by existing practices and protect the gamer from using faulty hints.
  • the enhanced entertainment option would provide interactive advertisements that are seamlessly integrated within the computer game allowing users to purchase products and/or services or receive desired information while the game is being played.
  • the present invention is directed to providing systems and methods that provide computer environment operators a mechanism for integration within the computing environment that allows participating users of the computing environment the ability to circumvent and/or break predefined rules of a computer game environment through a transaction.
  • the systems and methods described herein comprise a core transaction server, a multimedia transaction server and a browsing application. These components may exist in a single standalone computer or act as components of a networked computing environment.
  • a computer game environment cooperates with the core transaction server to integrate, transact, manage, and execute instances where the predefined rules of the computer game environment are broken.
  • the cooperating computer game environment in this context, is capable of offering and executing, and transacting enhanced entertainment options.
  • the browser application is employed to accept input from a participating user indicative of a desire to have access to the capability of circumventing the predefined rules of one or more cooperating game environments and/or to request access to execute interactive advertisements integrated within the enhanced computer game environment.
  • This input is processed and stored by the core transaction server for use when executing and transacting instances of rule breaking and/or interactive advertisement execution.
  • the core transaction server also cooperates with the multimedia transaction server to retrieve for and present to the cooperating computer game environment with requested and/or targeted multimedia for presentation to participating users when interacting with the computer game environment.
  • an account is established through a series of inputs received through the browsing application for participating users.
  • the account information is stored on the core transaction server for future use.
  • the core transaction server cooperates with the computer game environment to provide data representative of integrated enhanced entertainment options.
  • the core transaction server cooperates with the multimedia transaction server to supply the computer game environment with multimedia data for use in transacting the enhanced entertainment options.
  • a participating user interacts with a computer game environment supporting the enhanced entertainment options to exploit one or more of the available options through an account transaction.
  • the core transaction server cooperated with the computer game environment to track, execute, and manage enhanced entertainment options transactions by updating the participating users account information (e.g. debiting the account when an option is executed) and providing the requested entertainment option data through the cooperation with the multimedia transaction server.
  • the enhanced entertainment options include the option to circumvent one or more of the predefined rules of the computer game environment such that the predefined rule is broken while the participating user plays the game (or games) offered by the computer game environment.
  • the entertainment enhancement options may include the option to interact with one or more integrated interactive advertisements, such that the interaction with the integrated interactive advertisements initiates the execution of a desired event, function, action, or scenario.
  • FIG. 1 is a system diagram of an exemplary computing environment in accordance with the herein described systems and methods
  • FIG. 1A is a system diagram of an exemplary computing network environment in accordance with the herein described systems and methods
  • FIG. 1B is a system diagram showing the interaction between exemplary computing components in accordance with the herein described systems and methods
  • FIG. 2 is a block diagram showing the interaction between participating parties employing the systems and methods described herein;
  • FIG. 2A is a general block diagram showing the interaction between exemplary computing environment components in accordance with an illustrative implementation of the herein described systems and methods;
  • FIG. 2 A′ is a detailed system diagram showing the interaction between exemplary computing environment components in accordance with an illustrative implementation of the herein described system and methods;
  • FIG. 2B is a detailed system diagram showing the interaction between exemplary computing environment components in accordance with an alternative illustrative implementation of the herein described system and methods;
  • FIG. 2C is a detailed system diagram showing the interaction between exemplary computing environment components in accordance with an alternative illustrative implementation of the herein described system and methods;
  • FIG. 2D is a detailed system diagram showing an alternative exemplary interaction between exemplary computing environment components in accordance with an alternative illustrative implementation of the herein described system and methods;
  • FIG. 2 D′ is a block diagram of illustrative data flow between exemplary computing environment components in accordance with the herein described system and methods;
  • FIG. 2E is a block diagram showing the operation of an illustrative interface component in accordance with herein described systems and methods;
  • FIG. 3 is a screen shot of an exemplary gaming computing application having therein incorporated the rule circumvention features of the herein described system and methods;
  • FIG. 4 is a screen shot of an exemplary computing application having therein incorporated integrated advertisement features of the herein described system and methods;
  • FIG. 4A is a screen shot of an exemplary computing simulation application showing the real-time transaction in accordance with the herein described system and methods;
  • FIG. 5 is high level flow diagram of the processing performed by the herein described system and methods when performing rule circumvention and integrated advertisement operations
  • FIG. 5A is a detailed flow diagram of the processing performed to authenticate a participating user and to create a session for an authenticated participating user in accordance with the herein described systems and methods;
  • FIG. 5B is a detailed flow diagram of the processing performed when transacting the capability to circumvent a predefine rule in accordance with the herein described systems and methods;
  • FIG. 5C is a detailed flow diagram of the processing performed when offering and executing interactive advertisements in accordance with the herein described systems and methods;
  • FIG. 5D is a detailed flow diagram of the processing performed when integrating interactive advertisements in accordance with the herein described systems and methods;
  • FIG. 5E is a detailed flow diagram of the processing performed a participating user updates their purchasing power to purchase capabilities to circumvent rules in accordance with the herein described system and methods;
  • FIG. 5F is a detailed flow diagram of the processing performed to authenticate a request to update purchasing power by a participating user in accordance with the herein described systems and methods.
  • FIG. 5G is a flow diagram of the processing performed to track relevant data surrounding the transaction of rule circumvention capabilities and interactive advertisements.
  • Computing environments are defined by a set (or sets) of predefined rules. These rules help to describe how a particular computing environment (e.g. computer game) is to be navigated. Specifically, in the context of computer games, these rules may also describe the objective of a particular computer game, how to play a particular computer game, and provides structure for the various levels within a computer game.
  • a computing environment operator e.g. a computer game developer
  • when configuring the computing environment e.g. designing the game
  • participating users e.g.
  • the computing environment “cheats” may be employed to more easily achieve the desired levels and/or features.
  • a participating user e.g. a gamer
  • various reference sources e.g. game cheating books, the Internet, electronic message boards, etc.
  • the participating user e.g.
  • the present invention aims to ameliorate the shortcomings of existing practices surrounding the circumvention of the predefined rules (herein “circumventions”) of a computing environment (e.g. computer game) such that the circumvention is integrated as part of the computing environment (e.g. computer game) and the execution of the circumvention is realized through a monetary transaction.
  • a computing environment e.g. computer game
  • participating users e.g. computer gamers
  • the execution of the rule circumvention is monetized to the benefit of the computing environment operator (e.g. computer game developer) and the participating user (e.g.
  • the computing environment operator e.g. computer game developer
  • the participating user e.g. computer gamer
  • the computing environment operator e.g. computer game developer
  • the participating user e.g. computer gamer
  • the computing environment operator is provided with an additional revenue stream generated from the execution of integrated rule circumventions and the participating user (e.g. computer gamer) is afforded the ability to pay for proven, reliable, and fully functional rule circumventions in lieu of searching various reference sources and executing discovered “cheats” that may be hurtful to the cooperating computing environment (e.g. computer game).
  • inventive concepts described herein may be extended for use to integrate and transact interactive advertisements within a computing environment (e.g. computer game environment (i.e. providing an entertainment enhancement option)).
  • a computing environment e.g. computer game environment (i.e. providing an entertainment enhancement option)
  • the data is representative of one or more interactive advertisements, that when interacted with during general computing environment interaction (e.g. game play), trigger the execution of one or more predefined scenarios.
  • the gamer might traverse through a city having simulated store fronts.
  • these simulated store fronts are static, that is non interactive and are provided merely as background scenery or to add realism to the computer game environment.
  • the invention may be used to integrate an interactive advertisement in the computer game (i.e. rendering the computer game to be an enhanced computer game or a computer game with enhanced entertainment options—EEO) such that the previously static storefronts become interactive so the gamer can interact with the advertisement through the computer game to obtain the advertised product or service.
  • an interactive advertisement in the computer game i.e. rendering the computer game to be an enhanced computer game or a computer game with enhanced entertainment options—EEO
  • EEO enhanced entertainment options
  • An exemplary scenario is a computer gamer, playing the game around meal time, traverses through a simulated city comes upon a “pizza joint”.
  • the computer gamer being entrenched in the computer game, forgets that he/she has not eaten all day. Conventionally, the gamer would have to stop play of the computer game to obtain, order, and/or food.
  • the “pizza joint” is interactive so that the computer gamer can interact with the simulated representation of the “pizza joint” to order a pizza for delivery to the computer gamer's house.
  • the present invention would act to transact the pizza order between the gamer and cooperating real-world pizza restaurants using the computer gamer's transaction account.
  • the systems and methods disclosed herein support the realization of such scenario.
  • exemplary rule circumventions may include access to additional ammunition (or other resource—e.g. additional turns), information about the game environment, and numerous other items can be quantified by the game designer as suitable computer game rule circumventions that can be created, integrated, and transacted.
  • advertisers may provide suitable interactive advertisements for integration within a computer game allowing for the purchase of desired products and/or services.
  • an integration partner may work with computer game developers to offer a rule circumvention transaction system for integration within one or more of the cooperating computer game developer's computer games.
  • the rule circumvention transaction system would exploit the rules of an already developed and deployed computer game to provide a mechanism by which the existing rules of a given computer game can be circumvented through the execution of at least one transaction.
  • This transaction may include, but is not limited to the exchange of monetary consideration, the exchange of established good will (e.g. membership points as part of a membership reward program), and the exchange goods and services (e.g. cooperating users are provided credits for circumventing rules if the cooperating user assists subscribing additional users to use and pay for rule circumvention abilities).
  • the computer game developers and/or participating advertisers working alone, or in concert with a technology integration partner will make their computing environment (e.g. computer game) available to interact with one or mechanisms that circumvent one or more of the identified computing environment rules (e.g. to realize a circumvention opportunity).
  • these requirements include the rights of control over the computer game circumvention (i.e. who has the authority to edit, modify, and offer the computer game circumvention).
  • the computer game designer controls the resources of the game thereby having the ability to create and provide the computer game circumvention to game participants.
  • the computer game circumventions offered to participating garners may give some control over a game's resources (e.g. ammunition, lives, etc) for a predetermined price.
  • the circumvention designer can decide the nature and extent of such control based on any number of factors such as cost, purchase history, demographic data, etc.
  • the integration of interactive advertisements can either he initiated, designed, and deployed by the computer game developer in cooperation with the advertisers seeking to place interactive advertisements or by a third party multimedia developer working in between interested advertisers and computer game developers to provide content representative of interactive advertisements for placement in a computer game.
  • an advertiser seeking to place their advertisements in spaces already contracted to their competitors may approach a third party multi-media developer to create and generate the interactive advertisement for placement in a particular game.
  • the advertiser if properly resourced, may instead, choose to work with the game developer directly to create and place the desired interactive advertisement.
  • a computer game circumvention and/or interactive advertisement is identified and created, it is integrated within the computing environment and coupled to a transaction system for transacting.
  • the integration of the computer game circumventions and/or depends heavily on the size, scale, and complexity of the computer game in which the circumvention and/or interactive advertisement is to be offered.
  • an exemplary transaction system for use to transact computer game circumventions and/or interactive advertisements may include security to protect the integrity of the transaction and the computer game circumvention and/or interactive advertisement being transacted and communication means to inform participating users of the availability of a circumvention and/or interactive advertisement and information regarding the price and description of the computer game circumvention and/or interactive advertisement. Additionally, this system may track and store participating users' information such as demographic information, buying habits, preferences or tastes. This information is subsequently used to determine the popularity of circumventions and/or interactive advertisements and to assist in identifying and creating new computer game circumventions and/or interactive advertisements that can be tailored to participating users' preferences. Further, the exemplary transaction system may include inventory, sales, and tracking information for the various rule circumventions offered and sold.
  • the system may include one or more pricing mechanisms that set prices for computer game circumventions based on a variety of factors. These factors include: participating users' preferences, cost, supply and demand. Further pricing may be realized through auctions, reverse auctions, forecasting techniques or other methods.
  • a rule circumvention event e.g. computer game circumventions and/or interactive advertisements
  • transaction request e.g. computer game circumventions and/or interactive advertisements
  • transaction processing e.g. receiving additional ammunition automatically or additional lives
  • transaction fulfillment e.g. transaction fulfillment occurs.
  • a participating user requests a circumvention to circumvent one or more of the predefined rules of a computer game (e.g. receiving additional ammunition automatically or additional lives).
  • the request is processed by the systems of the present invention to determine if the request can be successfully fulfilled. This determination may involve checking the profile and account balance of the requesting participating user to see if they are qualified for the requested circumvention and ensuring the participating user has requested a valid circumvention. If the participating user qualifies, the user's account is debited and the requested circumvention is provided (i.e. transaction fulfillment occurs).
  • the transaction occurs in a real time two-way transaction. It should be noted, however, that a user may still have access to the rule circumvention system if they do not qualify.
  • computing environment operators e.g. game developers
  • a participating user navigating in a computing game environment requests more ammunition.
  • the user is processed and if qualified, received the ammunition immediately—the accounting for which is settled latter.
  • This permits the participating user to continue in their computing game environment (i.e. continue playing the game) without the usual interruption of transaction processing.
  • Additional features of rule circumvention comprise any of: keeping a tally for each user, each instance a rule is circumvented, aggregating the instances to generate a billing statement, and reconciling payment from participating users against outstanding billing statements.
  • the process is similar when transacting interactive advertisements except that the present invention may or may not perform transaction fulfillment for products and/or services ordered through the transaction system.
  • the transaction system electronically delivers the products and/or services requested by the participating users.
  • a participating user may come across an interactive advertisement for a software upgrade and may decide to purchase the software upgrade through an interaction with the interactive advertisement.
  • the transaction system is capable of delivering the software upgrade (i.e. if it is in inventory) to the requesting participating user.
  • the order for a desired product and/or service requested through the transaction of an interactive advertisement is communicated by the transaction system of the present invention to the vendor of the requested product and/or service.
  • the vendor then delivers the requested product and/or service.
  • the computer game content provider be the vendor to deliver the requested service and/or product (an electronic data product and/or service) as part in parcel with a selected circumvention.
  • the systems and methods of the present invention are capable to deliver the requested product and/or service.
  • the systems and methods described herein enable the procurement and transaction of computer environment rule circumventions and/or interactive advertisements.
  • FIG. 1 shows computing system 100 that may support the present invention.
  • Computing system 100 comprises computer 20 a that may comprise display device 20 a ′ and interface and processing unit 20 a ′′.
  • Computer 20 a may support computing application 180 .
  • computing application 180 may comprise computing application processing and storage area 180 a and computing application display 180 b.
  • Computing application processing and storage area 180 a may contain rule circumventions data store 180 a ′.
  • computing application display 180 b may comprise display content 180 b ′.
  • a user may interface with computing application 180 through the use of computer 20 a. The user (not shown) may navigate through computing application 180 to obtain various computer environment rule circumventions and/or access various interactive advertisements.
  • Computer environment rule circumventions and/or interactive advertisements may be retrieved by computing application 180 from rule circumventions data store 180 a ′ of computing application processing and storage area 180 a and shown to a user (not shown) as display content 180 b ′ on computing application display 180 b.
  • the user may choose to purchase certain computer environment rule circumventions and/or access various interactive advertisements.
  • Transacted computer environment rule circumventions and/or interactive advertisements may be stored in cooperating data store 180 a ′ and associated to created and stored user accounts. Such user accounts may be used in operation to facilitate the transaction of computer environment rule circumventions and/or the execution of interactive advertisements and may be communicated to cooperating circumvention and interactive advertisement content providers (not shown).
  • FIG. 1A illustrates an exemplary network environment, with a server in communication with client computers via a network, in which the present invention may be employed.
  • a number of servers 10 a, 10 b, etc. are interconnected via a communications network 160 (which may be a LAN, WAN, intranet, the Internet, or other computer network) with a number of client computers 20 a, 20 b, 20 c, or computing devices, such as, mobile phone 15 , land-line telephone 16 , and personal digital assistant 17 .
  • a communications network 160 which may be a LAN, WAN, intranet, the Internet, or other computer network
  • client computers 20 a, 20 b, 20 c, or computing devices such as, mobile phone 15 , land-line telephone 16 , and personal digital assistant 17 .
  • the servers 10 can be Web servers with which the clients 20 communicate via any of a number of known protocols, such as, hypertext transfer protocol (HTTP) or wireless application protocol (WAP).
  • HTTP hypertext transfer protocol
  • WAP wireless application protocol
  • Each client computer 20 can be equipped with browser 180 a to gain access to the servers 10 .
  • personal digital assistant 17 can he equipped with computing application 180 b and mobile phone 15 can be equipped with computing application 180 c to display and receive various data.
  • a user may interact with a computing application running on a client computing devices to obtain a variety of rule circumventions.
  • the rule circumventions may be stored on server computers and communicated to cooperating users through client computing devices over communications network 160 .
  • a participating user may purchase a computing environment rule circumvention and/or request the ordering of a product and/or service (including the display of advertisement information) through an interactive advertisement by interfacing with computing applications on client computing devices, thereby creating a enhanced entertainment option transaction.
  • These transactions may be communicated by client computing devices to server computers for processing and storage.
  • Server computers may host computing applications for the processing of circumvention and interactive advertisement transactions and cooperating data stores for the storage of such transactions.
  • the systems and methods described herein can be utilized in a computer network environment having client computing devices for accessing and interacting with the network and a server computer for interacting with client computers.
  • the systems and methods providing the creation, integration, and transaction of rule circumventions and interactive advertisement can be implemented with a variety of network-based architectures, and thus should not be limited to the example shown.
  • the present invention will now be described in more detail with reference to a presently illustrative implementation.
  • FIG. 1B shows the cooperation of various computing elements when transacting computer game circumventions and interactive advertisements (i.e. entertainment enhancement options) within a computer game environment.
  • a participating user may employ computing application 180 operating on client computer 20 a to send a request for computer game circumvention content and/or interactive advertisement content 110 to content provider's server 10 a over communications network 160 .
  • content provider's server 10 a may process send the request and retrieve environment features and/or elements (i.e. computer game circumventions) content and/or interactive advertisements content from environment features and elements database 10 b for communication to client computer 20 a over communications network 160 as shown by arrow 110 ′.
  • participating user may employ computing application 180 to communicate requests to purchase products and/or services offered by the interactive advertisements.
  • the interactive advertisement products and/or services may be requested by participating users by interacting with the interactive advertisement or, alternatively, the products and/or services may be offered to participating users based on conditions (e.g. a participating user passes a rendition of cellular phone shop in a computing application game and is prompted on whether he/she would like to purchase a cellular phone or, alternatively, if already owning a cellular phone, whether he/she would like to pay their bill, or some other consumer scenario).
  • conditions e.g. a participating user passes a rendition of cellular phone shop in a computing application game and is prompted on whether he/she would like to purchase a cellular phone or, alternatively, if already owning a cellular phone, whether he/she would like to pay their bill, or some other consumer scenario).
  • FIGS. 2-2C are detailed block diagrams of an exemplary systems operating the described methods of the present invention.
  • rule circumvention system environment 201 comprises participating user 202 , computing environment operators 203 , rule circumventions 205 , rule circumvention transaction system 200 , and payment reconciliation 230 .
  • participating users operating in a computing environment interact with rule circumvention system 200 to obtain rule circumventions 205 which are granted by computing environment operators 203 and, for which, payment may be reconciled by payment reconciliation process 230 .
  • computing environment operators 203 may comprise game developers that offer a computer game to participating users 202 .
  • computing environment operators 203 have integrated therein rule circumvention transaction system 200 which allows the participating user, for a fee, to circumvent one or more of the rules of the computer game.
  • the rule circumventions 201 are then transacted between the participating users 202 and the computing environment operators 203 through rule circumvention transaction system 200 (e.g. rule circumvention transaction system 200 may operate to have users establish user accounts such that when a specific rule circumvention is desired (e.g. adding more ammunition), the rule circumvention can be transacted in real time as the participating user is navigating through the computing environment) and payment is reconciled by payment reconciliation process 230 .
  • payment reconciliation process 230 is shown to exist as a separate process from the rule circumvention transaction system 200 , that such description is merely exemplary as payment reconciliation (as is seen in FIGS. 2A-2C ) may be part of rule circumvention transaction system 200 .
  • rule circumventions 205 are shown to exist separate and independent from rule circumvention transaction system 200 , that such description is merely exemplary as rule circumventions may be a part of rule circumvention transaction system 200 .
  • FIG. 2A shows a general block representation of the interaction of components of an exemplary rule circumvention system.
  • rule circumvention system 200 comprises a computing application 206 , content server 211 , core transaction server 223 , and payment processing 230 .
  • Computing application 206 cooperates with content server 211 , having at least one instruction set for integrating rule circumvention content in computing application 206 .
  • computing application 206 cooperates with core transaction server 223 , having at least one instruction set to instruct core transaction server 223 to transact instances where rule circumventions are initiated and executed in computing application 206 .
  • core transaction server cooperates with content server 211 .
  • core transaction server 223 also cooperates with payment processing module 230 to reconcile payment by end user 202 for transacted rule circumventions.
  • end user operates computing application to navigate through a computing environment (not shown).
  • a computing environment e.g. computer game
  • the participating user may desire to circumvent one or more of the rules of the computing environment.
  • computing application cooperates with content server 211 to obtain rule circumventions.
  • the instances of rule circumventions are transacted by core transaction server 223 cooperating with computing application 206 and content server 211 .
  • the transactions are then reconciled by payment processing module 230 .
  • FIG. 2 A′ shows a first exemplary detailed implementation of computing environment rule circumvention system.
  • rule circumvention system 200 comprises client computing application 204 , browsing computing application 206 , multimedia server 208 , adapter 210 , multimedia transaction server 211 , core transaction server 223 , third party integrator computing application 229 , database 228 , and payment processing engine 230 .
  • Core transaction server 223 further comprises core transaction server (CTS) computing application 222 .
  • Multimedia transaction server 211 further comprises multi-media transactions server computing application 212 and data cache 220 .
  • CTS computing application 222 may comprise (but is not shown) an Internet information server transaction server, Internet information server Web server, Internet server application program interface, CTS login dynamic link library (DLL), and stored procedures).
  • MTS computing application 212 may comprise (but is not shown) an Internet information server, ISAPI, multimedia transaction server (MTS DLL), stored procedures.
  • third party integrator computing application may comprise Internet information server Web server, ISAPI, Web transaction DLL, and stored procedures. It is appreciated, however, that the exemplary implementation described herein is merely exemplary, as the systems and methods disclosed herein may operate on various computing environment platforms including but not limited to, JAVA, LINUX, WINDOWS® (and it's family of products), and UNIX computing environment platforms.
  • participating user 202 cooperates with client computing application 204 to perform functions related to the transaction of computing environment rule circumventions (not shown).
  • Exemplary functions include but are not limited to creating user accounts for use when transacting computer game rule circumventions and/or interactive advertisement interactions, requesting computer game rule circumventions and/or interacting with interactive advertisements, executing computer game rule circumventions and/or interactive advertisements, and providing payment (e.g. through a user account) for executed computer game circumventions and/or for requested products and/or services from interactions with interactive advertisements.
  • Client computing application 204 cooperates with multimedia server 208 to realize one or more of these described functions.
  • Multimedia server 208 comprises a computing environment or a portion of a computing environment capable of processing data representative of multimedia content.
  • multimedia server 208 cooperates with multimedia transaction server 211 through adapter 210 .
  • Adapter 210 serves as an interface to translate data in required protocols between multimedia server 208 and multimedia transaction server 211 .
  • data is communicated between multimedia transaction server (MTS) 211 and multimedia server 208 through adapter 210 .
  • MTS multimedia transaction server
  • Data arriving MTS server 211 is processed by MTS computing application 212 and communicates data to cooperating system 200 components. Once processed, some of the data may be stored in cooperating data cache 220 , or alternatively be communicated between the MTS computing application 212 and core transaction server 223 .
  • core transaction server 223 communicated data from multimedia transaction server 211 is further processed by CTS computing application 222 . A portion of the core transaction server data is communicated to database 228 through the CTS computing application 222 .
  • data processed by core transaction server 223 may be further processed by payment processing operation 230 .
  • core transaction server 223 may serve to assist in retrieving desired login information (requested by cooperating web browser 206 as part of a user login authentication and verification process).
  • the CTS computing application is invoked to cooperate with database 228 to communicate data to and from database 228 . This requested data is then communicated browsing computing application 206 .
  • rule circumvention system 200 comprises third party integrator computing environment 229 having third party integrator computing application 218 .
  • Third party integrator computing application 218 is partly populated by data retrieved from database 228 . This data is presented to end user 202 through browser computing application 206 cooperating with client computing application 204 .
  • end user 202 may employ system 200 to establish an account for use when transacting rule circumventions within a computing environment.
  • system 200 provides the rule circumvention content for integration within a given computing environment.
  • the end user 202 has access to client computing application 204 cooperating with browser computing application 206 and multimedia server 208 .
  • the multimedia client has the capability, inter alia, to execute a computer game having therein rule circumventions.
  • End user 202 can establish an account on rule circumvention system 200 by providing data through client computing application 204 cooperating with browsing computer application 206 .
  • end user 202 may cooperate with one or more data input interface devices (e.g.
  • exemplary payment processing data includes but is not limited to credit card account information, Internet payment processing information (e.g. PAYPAL), bank information (e.g. online bank payment processing) and other similar electronic payment processing options data.
  • end user and/or content manager or entertainment enhancement option manager
  • An account established, end user 202 may employ entertainment rule circumvention system 200 to transact and execute desired rule circumventions.
  • the end user interacting with a computer game being displayed through client computing application 204 by multimedia server 208 may engage one ore more integrated rule circumventions integrated within the computer game.
  • the integrated rule circumvention is displayed to the end user 202 by multimedia server 208 through client computing application 204 .
  • a request is sent by multimedia server 208 to multimedia transaction server 211 through adapter 210 .
  • Multimedia transaction server 211 first processes the request by determining whether the participating user has an established account on the entertainment enhancement options transaction system 200 .
  • rule circumvention system 200 proceeds to perform processing to transact the desired rule circumvention for the end user.
  • core transaction server 211 invokes CTS computing application 222 to cooperate with database 228 to obtain data representative of a rule circumvention transaction.
  • the rule circumvention transaction information is communicated to the multi-media transaction server 211 through core transaction server 223 .
  • MTS computing application 212 gathers the rule circumvention transaction information for communication through adapter 210 to multi-media server 208 . It is at the adapter 210 that the appropriate triggers and flags are initiated and set that allow for the rule circumvention to occur with the computing environment supported by multi-media server 208 .
  • client computing application 204 is used to display computing environment content information (e.g. gaming content) to participating end users 202 .
  • computing environment content information e.g. gaming content
  • rule circumvention system 200 allows end user 202 to interact with multimedia client 204 to simultaneously interact with a particular computing environment (e.g. a computer game) while verifying and updating user account information.
  • end user 202 cooperated with client computing application 204 which in turn communicates with browsing computing application 206 and third party integrator computing application 229 to verify and/or modify user account information on database 228 .
  • rule circumvention system 200 allows users to have real time control over their account while the computing environment is being navigated. With this ability, participating users 202 are provided with significant flexibility and control over the incidence of engaging in rule circumvention. Specifically, an end user navigating through an environment may choose to engage a particular rule circumvention only to find that their account is past due or is under-funded. The end user 202 is not left in the lurch, but rather is free to, while navigating through the computing environment, update their account information to bring it to a funded state such that the desired rule circumvention may be engaged.
  • Payment processing 230 cooperated with core transaction server 223 to obtain transaction information for participating users who have engaged in rule circumvention.
  • Payment processing module 230 comprises at least one instruction set for processing of payments according to some predefined payment processing methodology (e.g. credit card transaction, debit card transaction, PAYPAL, etc.). Such payment processing may occur in real time as participating user 202 engage in rule circumventions or may be configured to perform batch payment processing such that payment processing is performed at a subsequent time to when a participating user 202 engaged in a rule circumvention.
  • some predefined payment processing methodology e.g. credit card transaction, debit card transaction, PAYPAL, etc.
  • inventive concepts described herein extend beyond the instance where a computer game is played on a web browser computing application, rather, the inventive concepts described herein can be implemented in various computing application executing in various computing environments (networked and non-networked) having varying configurations.
  • FIG. 2 A′ contemplates the use of a client computing application 204 , browsing computing application 206 and, a third party integrator computing application 229 , that such is merely exemplary as these computing application may exist in the same computing application (not shown).
  • this configuration of computing applications addresses the instances in which the computing environment operator (e.g. game developer) operates a computing application independent of the end users browsing computing application (e.g. web browser) which both are independent of a third party integrator computing application (e.g. rule circumvention transaction integration partner).
  • FIG. 2B shows an alternate implementation of rule circumvention system 200 ′.
  • the operation of rule circumvention system 200 ′ dos not include multimedia transaction server 211 (as is seen in rule circumvention system 200 of FIG. 2 A′).
  • multimedia server 208 no longer communicates through the adapter 210 and multimedia transaction server 211 when offering and receiving data from core transaction server 223 .
  • multimedia transaction server 211 With the absence of multimedia transaction server 211 , more transaction and rule circumvention processing is left to be performed on adapter 210 and core transactions server 223 .
  • FIG. 2C shows a second alternate implementation of rule circumvention system 200 .
  • rule circumvention system 200 ′′ does not include multimedia transaction server 211 (of rule circumvention system 200 as is seen in FIG. 2B ). Instead, adapter 210 cooperates with MTS instruction set 216 which in turn cooperates with data cache 220 . The remaining operations as described in FIG. 2 A′ remain unchanged. In this context, without multimedia transaction server 211 , more operations performed by multimedia transaction server 211 are offloaded to core transaction server 223 and to adapter 210 .
  • FIG. 2D shows a third alternate implementation of rule circumvention system 200 .
  • rule circumvention system 200 ′′′ does not include multimedia transaction server 211 (of rule circumvention system 200 as is seen in FIG. 2B ) and does not include adapter 210 .
  • core transaction server 223 cooperates directly with multi-media server 208 to perform functions described above. The remaining operations as described in FIG. 2 A′ remain unchanged.
  • more operations performed by multimedia transaction server 211 and adapter 210 are offloaded to core transaction server 223 and to adapter multimedia server 208 .
  • FIGS. 2 D′ and 2 E shows more detailed description of the data flow between the cooperating components of rule circumvention systems 200 , 200 ′, 200 ′′, 200 ′′′.
  • MTS computing application 212 communicates with other system components (not shown) via a native communications protocol.
  • MTS computing application 212 cooperates with application program interface (API) 214 which in turn communicates with MTS transaction instruction set 216 .
  • API 214 cooperates with communications module 232 to communicate data to and from core transaction server (not shown).
  • MTS transaction instruction set 216 in turn, cooperates with Active Data Objects 234 which cooperates with ODBC 236 .
  • ODBC in turn, cooperated with stored procedures 218 , which in turn cooperates with data cache 220 .
  • FIG. 2E shows the data flow and cooperation of components to realize communication between the adapter and the multimedia transactions server (not shown).
  • application interface 238 cooperates with communications protocol module 232 to realize MTS communications.
  • the application interface 238 receives and communicates information from the adapter and correspondingly, the communication protocol module 232 communicates information to and from the multimedia transactions server or core transaction server.
  • FIGS. 3 , 4 , and 4 A illustrate screen shots that display various features of the computing environment rule circumvention system.
  • rule circumvention system may be incorporated in computing application 180 displaying an interactive game through gaming pane 300 .
  • Gaming pane 300 may comprise gaming content 305 and rule circumventions dialog box 310 .
  • dialog box 310 may warn the user that he/she is low in ammunition in the interactive search and destroy game 305 that is being navigated.
  • a user may choose to purchase additional ammunition and proceed, or alternatively, proceed without securing any rule circumventions.
  • this rule circumvention would not be offered to garners. Rather, gamers would be forced to proceed with low ammunition using skill to advance in the game. Typically, gamers would proceed with low ammunition only to be defeated.
  • the user maybe relegated to start the game from the very beginning, rendering all of his/her invested time moot.
  • the herein described systems and methods may offer users interactive advertisements (which as described above may in themselves act as rule circumventions) by which users can purchase a variety of products or services.
  • These advertisements may be integrated within a number of computing applications in accordance to the context of the computing application.
  • real world products and/or services advertisements may be integrated in the game's landscape such that a user may interact with the cyber world advertisements to transact real world products and/or services.
  • the present invention may be employed by computing application 180 supporting a cyber environment having display pane 400 .
  • Display pane 400 may comprise interactive content 405 and interactive content dialog box 410 .
  • a user may be engrossed in a role playing computing application game for hours not realizing that the dinner hour is soon upon him/her.
  • the user may be required to navigate through city streets and neighborhoods having storefronts and other real world constructs.
  • a cyber realm storefront ABC Pizza
  • dialog box 410 may appear to the user of computing application 180 providing a friendly reminder that dinner time is approaching.
  • the user may proceed to enter the store in the cyber world and place an order for a real world pizza.
  • the system of the present invention would communicate the order to the appropriate parties and the real world product would be delivered to the user.
  • the user is now given the ability to transact real world products through the cyber realm storefront.
  • the systems and methods described herein arc not limited to communicating with participating users using merely dialog boxes, but rather is capable of communicating with participating users in any manner supported by the computing environment, including but not limited to, heads up displays, sound, video, or any other integrated and/or stand-alone medium presentable and operable by the participating user.
  • the interactive advertisement offering is not limited to the provided example, but rather, can be triggered by various conditions and scenarios.
  • FIG. 4A shows a screen shot of an exemplary computing simulation application 413 describing the integration and real-time transaction features of the herein described systems and methods.
  • screen shot 415 comprises simulation content 420 , rule circumventions information 425 , and transaction information 430 .
  • a participating user may operate computing simulation application 413 to interact with simulation content 420 .
  • Computing simulation application 415 may be configured that is has access to rule circumventions content provider computer server 10 a (of FIG. 1B ) such that rule circumventions may be offered through computing application 413 to the participating user while interacting with computing application 413 .
  • the game is directed to a “shot-em up” type game where the participating user is called upon to slay unworldly beasts using a variety of weaponry.
  • rule circumvention information 425 is displayed to offer rule circumventions to the participating user.
  • the rule circumvention is integrated into computing application 413 .
  • Rule circumventions information 425 comprises information about the possible rule circumventions and the cost of the rule circumventions.
  • transaction information 430 is offered to the participating user to inform him/her of their outstanding balance. The participating user may elect to accept the offered rule circumvention, using rule circumvention information 425 and transaction information 430 to help him/her in their decision, to enhance his/her interaction with computing application 413 .
  • FIG. 5 shows the processing performed when a participating user establishes an account for us with the herein described rule transaction system.
  • processing begins at block 500 and proceeds to block 502 where a check is performed to determined if the participating user has an account. If the user does not have an account, processing proceeds to block 520 where an a check is performed to determine if an account is to be created. If it is not, processing terminates at block 518 . However, if the user wishes to establish an account, processing proceeds to block 522 where demographic and payment method information is gathered and a user profile is created at block 524 . From there processing proceeds to block 506 .
  • processing proceeds to block 504 where the user is prompted to enter in their login information. From there processing proceeds to block 506 where interactive advertisements are offered to the participating users.
  • the rules to be circumvented are then gathered at block 508 and provided to the user as he/she navigates through the computing environment at block 510 .
  • Payment authorization is procured at block 512 in the instance a rule circumvention is executed.
  • a check is then made at block 514 to determine if the user belongs to an awards program. If the user is subscribed to an awards program, the awards account is update at block 516 and processing then terminates at block 518 .
  • processing proceeds to block 526 where a check is made to determine if an awards account is to be created. If it is not, processing terminates at block 518 . However, if an awards program account is to be created, processing proceeds to block 528 where an awards account is created and processing proceeds to block 516 and proceeds there from.
  • the order of the offerings e.g. interactive advertisement offering then rule circumvention offering, etc.
  • the order of offerings is dependent on how the computing environment is navigated.
  • FIG. 5A shows the processing performed when a participating user engages the rule circumvention system (RCS) to circumvent one or more rules of a computing environment having rule circumvention integrated therein.
  • RCS rule circumvention system
  • processing begins at block 530 and proceeds to block 531 where a check is performed to determine if the rule circumvention system is to be invoked. If the rule circumvention system is not to be used, processing proceeds to block 547 wherein the computing environment is availed to the participating user with rule circumventions. However, if the rule circumvention system is to be engaged at block 531 , processing proceeds to block 532 where identification information is collected (identification information may include a user identifier (e.g.
  • GameUserID computing environment identifier
  • ProviderID computing environment identifier
  • Context ID operation identifier
  • processing proceeds to block 533 wherein the participating user is prompted to login into the rule circumvention system.
  • User login information is received at block 552 and securely transmitted to the rule circumvention system's multimedia transaction server at blocks 534 .
  • a check is then made against the RCS database at block 536 to determine if the identification information provided is valid. If the identification information is valid, processing proceeds to block 540 where the user login is recorded. Processing then proceeds to block 541 where the results of the login are transmitted to the computing environment operator. However, if at block 536 , the check returns a false answer, processing proceeds to block 541 and proceeds from there.
  • processing proceeds to block 542 where a check is performed to determine if the user has been authorized to have access to one or more rule circumventions. If the user is authorized, processing proceeds to block 543 where data about the user who logged in is retrieved. The user data is then cached at block 544 . From there, a login success message is displayed at block 545 and processing proceeds to block 546 wherein the participating user is provided access to the rule circumvention system. Also after block 544 , identification information (e.g. media identifier—MediaUserID and session identifier—SessionID) are created at block 548 and associated with the computing environment at block 549 .
  • media identifier MediaUserID
  • SessionID session identifier
  • processing proceeds to block 550 where an error message is transmitted to the participating user. The error is then displayed at block 551 and processing reverts to block 552 and proceeds there from.
  • FIG. 58 shows the processing performed after a participating user successfully logs onto the RCS and engages in a transaction for one or more rule circumventions.
  • processing begins at block 553 and proceeds to block 554 where a participating user initiates a rule circumvention purchase.
  • processing then proceeds to blocks 555 where identification information (e.g. product information and session ID information) is transmitted to the RCS transacting module. From there a check is performed at block 557 to determine if it is valid identification information. If it is a valid, processing proceeds to block 560 where the an authorization is transmitted to the computing environment. The user is then provided the requested rule circumvention at block 561 and a confirmation message is displayed at block 564 .
  • a purchase receipt is provided at block 562 and the transaction is recorded at block 563 for subsequent processing (e.g. user account reconciliation and payment processing).
  • processing proceeds to block 565 where an error message is transmitted to the participating user.
  • a check is then performed at block 566 to determine if the error is fatal to the transaction. If the error is fatal, an error message is displayed and processing terminates at block 569 .
  • processing proceeds to block 567 where a corrective message is displayed and corrective action (e.g. capitalization of under-funded user accounts) is performed at block 568 . From there processing reverts to block 554 and proceeds there from.
  • FIG. 5C is a flow diagram of the processing performed when integrating an interactive advertisement in a computing environment.
  • processing begins at block 570 wherein the RCS is invoked and proceeds to block 571 where a condition to offer interactive advertisements is met (e.g. participating user utilizes an area of the computing environment having interactive advertisements or other condition is met for the interactive advertisement transmission).
  • processing then proceeds to block 572 where identification information (e.g. session identifier and advertisement information) is transmitted to the rule circumvention transaction module.
  • identification information e.g. session identifier and advertisement information
  • the rule circumvention transaction module is described above and is seen in FIGS. 2-2E . From there a check is performed against a data cache at block 573 to determine if the identification information is valid.
  • the interactive advertisements may be stored in a data cache to optimize processing.
  • the advertisement may be generated in real time depending on one or more conditions (e.g. user is known to like a particular recording artist) or selected from a library of advertisements, wherein the selection is performed using a selection algorithm dependent on various factors including but not limited to user preferences and demographics.
  • the advertisement is provided to the user at block 577 and inserted into the user's computing environment at block 578 for display at block 579 .
  • the advertisement may also be formatted to one or more pre-determined formats for seamless integration into hosting computing environment.
  • an advertisement delivery receipt is created at block 580 and the transaction is recorded at block 581 for subsequent processing (e.g. transaction reconciliation and advertiser billing for advertisement placing).
  • processing proceeds to block 582 where the transaction is committed for subsequent processing.
  • a notification is then sent of a bad advertisement condition or session is created at block 583 and an advertisement filler may be created and displayed at blocks 584 and 585 .
  • FIG. 5D shows the processing performed when delivering an interactive advertisement to a participating user.
  • processing begins at block 520 ′ and proceeds to block 521 ′ where the advertisement location information and session identifier is transmitted to the rule circumvention transaction module.
  • processing then proceeds to block 522 ′ where the identification information is converted (e.g. the session identifier is converted to the user identifier).
  • the identification information is converted (e.g. the session identifier is converted to the user identifier).
  • From there processing follows two paths. Specifically, at block 528 ′, user data and preferences are retrieved from a cooperating data store to generate user data 529 ′ for use by selection algorithm 527 ′. Also, from block 522 ′ processing proceeds to block 523 ′ where the advertisement location data and preferences are retrieved from a cooperating data store. This data is delivered as advertisement inventory data to selection algorithm 527 ′. Additionally, advertisement location data 526 ′ is retrieved from a cooperating data store at block 525 ′ and is provided to the selection algorithm 5
  • the selection algorithm 527 ′ processes the user data, location data, and advertisement inventory data to select an appropriate advertisement for delivery to the participating user based on these —i.e. where the advertisement is to be placed in the computing environment).
  • the advertisement is ether retrieved a data store at block 530 ′ or directly from the advertiser at block 531 ′ or generated in real-time at block 545 ′.
  • the selected, retrieved advertisement is then translated to a format appropriate to the advertisement location at block 532 ′.
  • the formatted advertisement is then transmitted at block 533 ′ for display to the participating user at block 534 ′.
  • an advertisement delivery receipt is created at block 535 ′ and the advertisement exposure is recorded at block 536 ′.
  • FIG. 5E shows the processing performed when a user modifies their account (e.g. adds money to their account or makes a purchase off their account) on which the RCS operates.
  • processing begins at block 586 and proceeds to block 587 where the participating user purchases a rule circumvention (RC) or adds a money to their account.
  • RC rule circumvention
  • From there processing proceeds to block 588 where the identification information (session identifier) is transmitted to the rule circumvention transaction module.
  • a check is then performed at block 589 to determine if the identification information is valid. If the identification information is valid, processing proceeds to block 591 where the transaction is recorded (the transaction recording may include but is not limited to the generation of a balance that is transmitted for display and viewed).
  • processing proceeds to block 594 where an error message is transmitted to the computing environment.
  • a check is then performed by the rule circumvention system at block 595 to determine if the error stemming from blocks 589 is fatal. If the error is fatal, an error message is displayed and processing terminates. However, if the error is proven not to be fatal, processing proceeds to block 596 , where a suggested corrective action message is displayed. Corrective action (e.g. entering in user name and password) is then taken at block 597 . Processing then reverts to block 587 and proceeds there from.
  • FIG. 5F shows the processing performed when a participating user requests funds to be added by the rule circumvention system to their account.
  • a participating user will offer some verification of funds (e.g. credit card, routing information for a bank account, etc.) on which the RCS operates to perform user account maintenance.
  • processing begins at block 501 ′ and proceeds to block 502 ′ where the participating user requests additional money.
  • processing then proceeds to block 503 ′ where identification information (e.g. user identifier and amount requested) is transmitted to the rule circumvention transaction module.
  • a check is then performed at block 504 ′ to determine if the identification information is valid. If it is, processing proceeds to block 506 ′ where payment authorization commences. However, if at block 504 ′, an error occurs such that the identification information is not validated, processing proceeds to block 508 ′ and proceeds from there.
  • processing proceeds to block 508 ′ where the result of the payment authorization is transmitted to the computing environment. However, if the payment authorization is successful, processing proceeds to block 507 ′ where the purchase (i.e. additional funds are added to the account) is recorded and proceeds to block 508 ′. From block 508 ′, processing proceeds to block 509 ′ where a check is performed to determine if the purchase had been authorized. If it was authorized, processing proceeds to block 510 ′ where the user's balance is retrieved and then cached at block 511 ′. A success message is transmitted to the participating user at block 512 ′ and the updated balance is provided at block 514 ′ for display at block 515 ′.
  • the payment authorization is successful
  • processing proceeds to block 507 ′ where the purchase (i.e. additional funds are added to the account) is recorded and proceeds to block 508 ′. From block 508 ′, processing proceeds to block 509 ′ where a check is performed to determine if the purchase had been authorized. If it was authorized, processing proceeds to block 510
  • processing proceeds to block 515 ′ where an error message is transmitted. From there a check is performed to determine if the error that lead to a non payment authorization was fatal. If the error was fatal, processing proceeds to block 519 ′ where an error message is displayed. However, if the error is not fatal a corrective message is displayed at block 517 ′. Corrective action (e.g. entering new user information), is then performed at block 518 ′. From there, processing reverts to block 502 ′ and proceeds there from.
  • an error message is transmitted. From there a check is performed to determine if the error that lead to a non payment authorization was fatal. If the error was fatal, processing proceeds to block 519 ′ where an error message is displayed. However, if the error is not fatal a corrective message is displayed at block 517 ′. Corrective action (e.g. entering new user information), is then performed at block 518 ′. From there, processing reverts to block 502 ′ and proceeds there from.
  • FIG. 5G shows the processing performed when reconciling user accounts and advertisement usage for rule circumvention events.
  • the reconciliation of such accounts on rule circumvention events provides computing operators (e.g. game developers) and their rule circumvention transaction integration partners with information representative of rule circumvention usage and revenue generated from the transaction of such rule circumvention events.
  • processing begins at block 537 ′ where the participating user balance is updated to show the execution of at least one rule circumvention. From there, processing proceeds to block 538 ′ where the revenue from such rule circumvention transactions are recorded. The participating user purchase is then recorded at block 539 ′. Processing then proceeds to block 540 ′ where the integration partner revenue is provided.
  • processing begins at block 541 ′ where advertisement exposure is recorded. From there processing proceeds to block 542 ′ where the revenue from advertisement usage is recorded. The revenue generated for the computing environment operator is then calculated and provided at block 543 ′. In the instance that the computing environment operator is a third party, in addition to the calculation of the revenue for the computing environment operator, a calculation and payment of funds is made to the third party for supplying the product and/or service requested through the interactive advertisement. The advertiser cost is then recorded at block 544 ′.
  • Such processing may be representative of the instance in which an advertiser cooperates with a computing environment operator to transact one or more advertisement rule circumventions (e.g. place an advertisement in already committed advertisement space).
  • the systems and methods described herein also contemplate an alternative implementation where the participating user is an advertiser.
  • the advertiser of products and services in computing environments such as, interactive TV, online movies, streaming media, or video clips, may circumvent already established advertising rules over their competitors, such as better placement of advertisements in the computing environment for their products and/or services.
  • the participating advertisers transacting advertisement rule circumvention can better target and reach a larger audience.
  • These participating users i.e. advertisers
  • the present invention provides system and methods to create, integrate, and transact the circumvention of rules in a computing environment. It is understood, however, that the invention is susceptible to various modifications and alternative constructions. There is no intention to limit the invention to the specific constructions described herein. On the contrary, the invention is intended to cover all modifications, alternative constructions, and equivalents falling within the scope and spirit of the invention.
  • the present invention may be implemented in a variety of computer environments (including both non-wireless and wireless computer environments), partial computing environments, and real world environments.
  • the various techniques described herein may be implemented in hardware or software, or a combination of both.
  • the techniques arc implemented in computer programs executing on programmable computers that each include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device.
  • Program code is applied to data entered using the input device to perform the functions described above and to generate output information.
  • the output information is applied to one or more output devices.
  • Each program is preferably implemented in a high level procedural or object oriented programming language to communicate with a computer system.
  • the programs can be implemented in assembly or machine language, if desired.
  • the language may be a compiled or interpreted language.
  • Each such computer program is preferably stored on a storage medium or device (e.g., ROM or magnetic disk) that is readable by a general or special purpose programmable computer for configuring and operating the computer when the storage medium or device is read by the computer to perform the procedures described above.
  • the system may also be considered to be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner.

Abstract

A system and methods allowing the creation, integration, and transaction of rule circumventions and/or interactive advertisements in computing environments is provided. In an illustrative implementation, the present invention comprises a core transaction server, a multimedia transaction server, and browser application. A computing environment cooperates with the core transaction server to obtain data representative of computing environment rule circumventions for integration within the computing environment as well as computing environment circumvention transaction information. The core transaction server cooperates with the multimedia transaction server to obtain data representative of the desired computing environment rule circumvention and with the browser application to obtain inputs from computing environment to establish accounts for use when transacting computing environment rule circumvention transactions.

Description

    FIELD OF THE INVENTION
  • The present invention relates generally to the creation, integration, and transaction of instances when predefined rules that govern a particular environment are circumvented. Particularly, the present invention relates to providing an ability to circumvent predefined rules of a computing environment through a transaction where the ability is integrated within the computing environment and is exploited as the computing environment is navigated.
  • BACKGROUND OF THE INVENTION
  • Today, we face many challenges in our daily lives that demand the expenditure of valuable resources. These challenges are presented as part of an environment (e.g. non-computing and/or computing environments) that is itself governed by a set of operating rules. In an ideal world, a person navigating through these environments would have the ability to change or re-define those rules to assist in disposing of encountered challenges. For every rule there is a sanction, a retribution, a reprimand, and in some cases a punishment which can be levied by a governing authority and/or environment operator for breaking or circumventing the environment rule. Some environments may not offer a sanction, reprimand, retribution, or punishment when a rule is broken, bur rather may be structured that it is virtually impossible to circumvent or break an environment rule. Accordingly, on balance, most people when navigating in an environment try their best to adhere to the environment rules, or in the case where there is no risk for rule breaking, do not attempt to break or circumvent rules as the environment structure makes it difficult to break the environment rules. Even if one were to choose to break an environment rule, in most environments there are not mechanisms that allow for rule breaking that either mitigate or completely remove risk.
  • To stay competitive in a particular environment and to optimize the position in the environment by exploiting the predefined rules, rigorous physical and/or mental training, or the use of advanced tools may be required. However, for the non-scrupulous, the same maybe be achieved by circumventing and/or breaking the predefined rules. The rules may be broken, for example, through bribery, cheating, and deception. Such rule circumvention and/or breaking has allowed for some significant events in our society today. For example, some ventures, and even some governments can base their existence on the practice of breaking environment rules, or at the least circumventing the predefined environment rules to more quickly achieve a desired goal. Subscribing to social conventions, however, breaking rules is traditionally kept secret in fear of retaliation, reprimand, and rebuke from non-sanctioning parties. Considering the benefits that may be realized from circumventing and/or breaking predefined rules of an environment, if given the choice, most would to circumvent and/or break the environment predefined rules to assist them with their daily challenges.
  • Human nature dictates our need to achieve. This is apparent in the field of gaming. Gaming enthusiasts are willing to pay for the opportunity to have the ability to circumvent and/or break the predefined rules of the computer game. This is especially the case where the player has spent a significant amount of time and energy in overcoming various challenges within the game to reach the desired goal of completing the game, but is unable to overcome a particular posed challenge. In such a circumstance, the player will likely be willing to pay for the ability to overcome this posed challenge through the circumvention of a predefined rule that helps define the challenge. In recent years, gaming enthusiasts have enjoyed a number of action, action-adventure, adventure, and strategy games, such as, DOOM®, QUAKE®, AGE OF EMPIRES®, ULITMA ONLINE®, etc. The object of these games is to wage battle with various beings in an effort to win a war or improve your standing within the game and/or gaming community. These games are typically structured such that the player is given access to increasingly superior weaponry and/or skills as they advance through increasingly difficult game levels. In an ideal world, garners would be able to have access to these superior weapons, or alternatively, additional ammunition for their existing weaponry, and/or superior skills earlier in the gaming experience, thereby increasing the gamers chances of completing computer game levels.
  • Current practices and conventions require garners to ferret through computer game reference information, such as computer game hint books and computer game hint Websites to find what are touted as credible and reliable hints that are advertised, if used, would help gamers more easily play a computer game. A hint may provide information such as button combinations that would allow gamers to circumvent and/or break the predefined rules of a computer game (e.g. obtain a superior weapon instantaneously without having to complete a game level or having to find it in the computer game environment). However, these practices place a significant burden on garners as they are required to spend their time and energy tracking these hints down. Also, there is no guarantee that the hint actually works as advertised. The gamer is thus exposed to the possibility of trying numerous hints before finding one that achieves the desired computer game predefined rule circumvention and/or rule breaking (e.g. obtaining a superior weapon). Moreover, there is a disconnect in the activities surrounding the actual playing of a computer game and incorporating a found hint in the game being played. That is, the hints are not integrated within the computer game environment and exist external to the computer game.
  • Moreover, currently, computer game developers are not afforded the ability to monetize the existing practice of rule circumvention. Typically, computer game developers invest significant resources, both labor and capital, to create a computer game having a specific set of rules (e.g. collect four bottles in a particular level and the game will advance the participating user to the next game level). In some instances, the computer game (or other computing environment) is configured such that the participating user is required to complete an entire level before advancing and are configured to only to perform a save at the beginning of a particular game level. Such game configuration, which is often the case, frustrates participating garners as they are required to repeat a portion or more of a particular level each time the game is played. Such frustration leads gaming enthusiasts to search for rule circumvention techniques to avoid the games rigid configuration.
  • A more advantageous practice contemplates providing enhanced entertainment options for a computer game wherein a mechanism is offered to gaming developers for integration with within a computer game that offers the ability to gamers to circumvent and/or break the predefined rules of the computer game while the game is being played. This practice further contemplates the ability to transact the instance in which the gamer accepts the offers provided by the mechanism while the game is being played. Such practice would eliminate the time and effort expenditure required by existing practices and protect the gamer from using faulty hints. Moreover, the enhanced entertainment option would provide interactive advertisements that are seamlessly integrated within the computer game allowing users to purchase products and/or services or receive desired information while the game is being played.
  • From the foregoing it can be appreciated that there exists a need for comprehensive systems and methods that offer computing environment operators the ability to monetize the circumvention of rules in the environment such that participants of an environment are allowed to circumvent environment rules using an integrated mechanism which is invoked through a transaction.
  • SUMMARY OF THE INVENTION
  • The present invention is directed to providing systems and methods that provide computer environment operators a mechanism for integration within the computing environment that allows participating users of the computing environment the ability to circumvent and/or break predefined rules of a computer game environment through a transaction. In an illustrative implementation, the systems and methods described herein comprise a core transaction server, a multimedia transaction server and a browsing application. These components may exist in a single standalone computer or act as components of a networked computing environment. In operation, a computer game environment cooperates with the core transaction server to integrate, transact, manage, and execute instances where the predefined rules of the computer game environment are broken. The cooperating computer game environment, in this context, is capable of offering and executing, and transacting enhanced entertainment options.
  • In the contemplated implementation, the browser application is employed to accept input from a participating user indicative of a desire to have access to the capability of circumventing the predefined rules of one or more cooperating game environments and/or to request access to execute interactive advertisements integrated within the enhanced computer game environment. This input is processed and stored by the core transaction server for use when executing and transacting instances of rule breaking and/or interactive advertisement execution. The core transaction server also cooperates with the multimedia transaction server to retrieve for and present to the cooperating computer game environment with requested and/or targeted multimedia for presentation to participating users when interacting with the computer game environment.
  • In implementation provided, an account is established through a series of inputs received through the browsing application for participating users. The account information is stored on the core transaction server for future use. In addition, the core transaction server cooperates with the computer game environment to provide data representative of integrated enhanced entertainment options. Further the core transaction server cooperates with the multimedia transaction server to supply the computer game environment with multimedia data for use in transacting the enhanced entertainment options. In operation, a participating user interacts with a computer game environment supporting the enhanced entertainment options to exploit one or more of the available options through an account transaction. The core transaction server cooperated with the computer game environment to track, execute, and manage enhanced entertainment options transactions by updating the participating users account information (e.g. debiting the account when an option is executed) and providing the requested entertainment option data through the cooperation with the multimedia transaction server.
  • The enhanced entertainment options include the option to circumvent one or more of the predefined rules of the computer game environment such that the predefined rule is broken while the participating user plays the game (or games) offered by the computer game environment. In addition, the entertainment enhancement options may include the option to interact with one or more integrated interactive advertisements, such that the interaction with the integrated interactive advertisements initiates the execution of a desired event, function, action, or scenario.
  • Other features of the present invention are described below.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A system and methods for the creation, integration, and transaction of rule circumventions arc further described with reference to the accompanying drawings in which:
  • FIG. 1 is a system diagram of an exemplary computing environment in accordance with the herein described systems and methods;
  • FIG. 1A is a system diagram of an exemplary computing network environment in accordance with the herein described systems and methods;
  • FIG. 1B is a system diagram showing the interaction between exemplary computing components in accordance with the herein described systems and methods;
  • FIG. 2 is a block diagram showing the interaction between participating parties employing the systems and methods described herein;
  • FIG. 2A is a general block diagram showing the interaction between exemplary computing environment components in accordance with an illustrative implementation of the herein described systems and methods;
  • FIG. 2A′ is a detailed system diagram showing the interaction between exemplary computing environment components in accordance with an illustrative implementation of the herein described system and methods;
  • FIG. 2B is a detailed system diagram showing the interaction between exemplary computing environment components in accordance with an alternative illustrative implementation of the herein described system and methods;
  • FIG. 2C is a detailed system diagram showing the interaction between exemplary computing environment components in accordance with an alternative illustrative implementation of the herein described system and methods;
  • FIG. 2D is a detailed system diagram showing an alternative exemplary interaction between exemplary computing environment components in accordance with an alternative illustrative implementation of the herein described system and methods;
  • FIG. 2D′ is a block diagram of illustrative data flow between exemplary computing environment components in accordance with the herein described system and methods;
  • FIG. 2E is a block diagram showing the operation of an illustrative interface component in accordance with herein described systems and methods;
  • FIG. 3 is a screen shot of an exemplary gaming computing application having therein incorporated the rule circumvention features of the herein described system and methods;
  • FIG. 4 is a screen shot of an exemplary computing application having therein incorporated integrated advertisement features of the herein described system and methods;
  • FIG. 4A is a screen shot of an exemplary computing simulation application showing the real-time transaction in accordance with the herein described system and methods;
  • FIG. 5 is high level flow diagram of the processing performed by the herein described system and methods when performing rule circumvention and integrated advertisement operations;
  • FIG. 5A is a detailed flow diagram of the processing performed to authenticate a participating user and to create a session for an authenticated participating user in accordance with the herein described systems and methods;
  • FIG. 5B is a detailed flow diagram of the processing performed when transacting the capability to circumvent a predefine rule in accordance with the herein described systems and methods;
  • FIG. 5C is a detailed flow diagram of the processing performed when offering and executing interactive advertisements in accordance with the herein described systems and methods;
  • FIG. 5D is a detailed flow diagram of the processing performed when integrating interactive advertisements in accordance with the herein described systems and methods;
  • FIG. 5E is a detailed flow diagram of the processing performed a participating user updates their purchasing power to purchase capabilities to circumvent rules in accordance with the herein described system and methods;
  • FIG. 5F is a detailed flow diagram of the processing performed to authenticate a request to update purchasing power by a participating user in accordance with the herein described systems and methods; and
  • FIG. 5G is a flow diagram of the processing performed to track relevant data surrounding the transaction of rule circumvention capabilities and interactive advertisements.
  • DETAILED DESCRIPTION OF ILLUSTRATIVE IMPLEMENTATIONS Overview:
  • Computing environments (e.g. computer games) are defined by a set (or sets) of predefined rules. These rules help to describe how a particular computing environment (e.g. computer game) is to be navigated. Specifically, in the context of computer games, these rules may also describe the objective of a particular computer game, how to play a particular computer game, and provides structure for the various levels within a computer game. Conventionally, a computing environment operator (e.g. a computer game developer), when configuring the computing environment (e.g. designing the game), will define the rules for the computing environment (e.g. computer game) such that these rules cannot be circumvented. However, participating users (e.g. diehard computer gaming enthusiasts) have taken on the challenge of finding “cheats” to circumvent one or more of the predefined rules for a particular computing environment (e.g. computer game) such to more easily navigate through the particular computer environment. In the context of computer games, the “cheats” operate to make the game easier to play.
  • Consequently, instead of wasting hours upon hours to discover optimum ways of navigating a particular computing environment through the circumvention of one or more rules established for a computing environment (e.g. achieve a particular level within a computer game or to obtain one or more desired features within the computer game), the computing environment “cheats” may be employed to more easily achieve the desired levels and/or features. Currently, a participating user (e.g. a gamer) is required to search through various reference sources (e.g. game cheating books, the Internet, electronic message boards, etc.) to find what are advertised as reliable and functional cheats for a particular computing environment (e.g. computer games). The participating user (e.g. gamer) then is required to modify their computer game environment to incorporate the desired “cheat.” Such modifications may entail executing sometimes incompatible executable software code which may have a significant and detrimental impact on the underlying computing environment (e.g. computer game). Also, execution of the “cheat”, in most cases, must be performed each time the computing environment is encountered (e.g. game is played) placing an undue burden on the participating user (e.g. gamer).
  • Furthermore, existing practices do not capitalize on a substantial value proposition that can be offered to computing environment operators (e.g. game developers). Namely, game developers (or other computing environment operators) do not exploit the numerous instances in which participating users (e.g. gamers) circumvent one or more of the predefined rules of a given game (or a given computing environment). Generally, game developers (or other computing environment operators) overlook this significant value added proposition given that current practices do not include the transaction of instances when such environment (or game) rules are circumvented.
  • The present invention aims to ameliorate the shortcomings of existing practices surrounding the circumvention of the predefined rules (herein “circumventions”) of a computing environment (e.g. computer game) such that the circumvention is integrated as part of the computing environment (e.g. computer game) and the execution of the circumvention is realized through a monetary transaction. In doing so, participating users (e.g computer gamers) are afforded the ability to circumvent one or more of the predefined rules of the computing environment (e.g. computer game) in real time as the user navigates through the computing environment (e.g. the game is being played providing an enhanced entertainment environment). Moreover, the execution of the rule circumvention is monetized to the benefit of the computing environment operator (e.g. computer game developer) and the participating user (e.g. computer gamer). Specifically, the computing environment operator (e.g. computer game developer), in using this invention, is provided with an additional revenue stream generated from the execution of integrated rule circumventions and the participating user (e.g. computer gamer) is afforded the ability to pay for proven, reliable, and fully functional rule circumventions in lieu of searching various reference sources and executing discovered “cheats” that may be hurtful to the cooperating computing environment (e.g. computer game).
  • Moreover, the inventive concepts described herein may be extended for use to integrate and transact interactive advertisements within a computing environment (e.g. computer game environment (i.e. providing an entertainment enhancement option)). In this context, instead of providing data to computing environment operators (e.g. computer game content providers) representative of a computing environment (e.g. computer game) circumvention, the data is representative of one or more interactive advertisements, that when interacted with during general computing environment interaction (e.g. game play), trigger the execution of one or more predefined scenarios.
  • For example, in a simulation computer game, the gamer might traverse through a city having simulated store fronts. Conventionally, these simulated store fronts are static, that is non interactive and are provided merely as background scenery or to add realism to the computer game environment. In a contemplated implementation of the present invention, the invention may be used to integrate an interactive advertisement in the computer game (i.e. rendering the computer game to be an enhanced computer game or a computer game with enhanced entertainment options—EEO) such that the previously static storefronts become interactive so the gamer can interact with the advertisement through the computer game to obtain the advertised product or service.
  • An exemplary scenario is a computer gamer, playing the game around meal time, traverses through a simulated city comes upon a “pizza joint”. The computer gamer, being entrenched in the computer game, forgets that he/she has not eaten all day. Conventionally, the gamer would have to stop play of the computer game to obtain, order, and/or food. In the enhanced computer game, the “pizza joint” is interactive so that the computer gamer can interact with the simulated representation of the “pizza joint” to order a pizza for delivery to the computer gamer's house. Specifically, the present invention would act to transact the pizza order between the gamer and cooperating real-world pizza restaurants using the computer gamer's transaction account. The systems and methods disclosed herein support the realization of such scenario.
  • Identifying Computer Environment Circumvention Opportunities:
  • In the context of a computer game, exemplary rule circumventions may include access to additional ammunition (or other resource—e.g. additional turns), information about the game environment, and numerous other items can be quantified by the game designer as suitable computer game rule circumventions that can be created, integrated, and transacted. Similarly, advertisers may provide suitable interactive advertisements for integration within a computer game allowing for the purchase of desired products and/or services.
  • Specifically, an integration partner may work with computer game developers to offer a rule circumvention transaction system for integration within one or more of the cooperating computer game developer's computer games. The rule circumvention transaction system would exploit the rules of an already developed and deployed computer game to provide a mechanism by which the existing rules of a given computer game can be circumvented through the execution of at least one transaction. This transaction may include, but is not limited to the exchange of monetary consideration, the exchange of established good will (e.g. membership points as part of a membership reward program), and the exchange goods and services (e.g. cooperating users are provided credits for circumventing rules if the cooperating user assists subscribing additional users to use and pay for rule circumvention abilities).
  • Creating Computing Environment Rule Circumventions:
  • Once identified, the computer game developers and/or participating advertisers working alone, or in concert with a technology integration partner, will make their computing environment (e.g. computer game) available to interact with one or mechanisms that circumvent one or more of the identified computing environment rules (e.g. to realize a circumvention opportunity). Generally, there are several requirements that are considered when creating computer game circumventions. These requirements include the rights of control over the computer game circumvention (i.e. who has the authority to edit, modify, and offer the computer game circumvention). In the context of a computer game, the computer game designer controls the resources of the game thereby having the ability to create and provide the computer game circumvention to game participants. In this capacity, the computer game circumventions offered to participating garners may give some control over a game's resources (e.g. ammunition, lives, etc) for a predetermined price. The circumvention designer can decide the nature and extent of such control based on any number of factors such as cost, purchase history, demographic data, etc.
  • Comparatively, the integration of interactive advertisements can either he initiated, designed, and deployed by the computer game developer in cooperation with the advertisers seeking to place interactive advertisements or by a third party multimedia developer working in between interested advertisers and computer game developers to provide content representative of interactive advertisements for placement in a computer game. In operation, an advertiser seeking to place their advertisements in spaces already contracted to their competitors may approach a third party multi-media developer to create and generate the interactive advertisement for placement in a particular game. Alternatively, the advertiser, if properly resourced, may instead, choose to work with the game developer directly to create and place the desired interactive advertisement.
  • Integrating Computing Environment Rule Circumventions:
  • Once a computer game circumvention and/or interactive advertisement is identified and created, it is integrated within the computing environment and coupled to a transaction system for transacting. The integration of the computer game circumventions and/or depends heavily on the size, scale, and complexity of the computer game in which the circumvention and/or interactive advertisement is to be offered.
  • Moreover, an exemplary transaction system for use to transact computer game circumventions and/or interactive advertisements may include security to protect the integrity of the transaction and the computer game circumvention and/or interactive advertisement being transacted and communication means to inform participating users of the availability of a circumvention and/or interactive advertisement and information regarding the price and description of the computer game circumvention and/or interactive advertisement. Additionally, this system may track and store participating users' information such as demographic information, buying habits, preferences or tastes. This information is subsequently used to determine the popularity of circumventions and/or interactive advertisements and to assist in identifying and creating new computer game circumventions and/or interactive advertisements that can be tailored to participating users' preferences. Further, the exemplary transaction system may include inventory, sales, and tracking information for the various rule circumventions offered and sold. Optionally, the system may include one or more pricing mechanisms that set prices for computer game circumventions based on a variety of factors. These factors include: participating users' preferences, cost, supply and demand. Further pricing may be realized through auctions, reverse auctions, forecasting techniques or other methods.
  • Transacting Computing Environment Rule Circumventions:
  • Generally, there are three steps performed when transacting a rule circumvention event (e.g. computer game circumventions and/or interactive advertisements): 1) transaction request, 2) transaction processing, and 3) transaction fulfillment. During the first step a participating user requests a circumvention to circumvent one or more of the predefined rules of a computer game (e.g. receiving additional ammunition automatically or additional lives). The request is processed by the systems of the present invention to determine if the request can be successfully fulfilled. This determination may involve checking the profile and account balance of the requesting participating user to see if they are qualified for the requested circumvention and ensuring the participating user has requested a valid circumvention. If the participating user qualifies, the user's account is debited and the requested circumvention is provided (i.e. transaction fulfillment occurs). The transaction occurs in a real time two-way transaction. It should be noted, however, that a user may still have access to the rule circumvention system if they do not qualify. In this context, computing environment operators (e.g. game developers) may choose to provide access to the rule circumvention system described herein to unqualified users for various reasons, including but not limited to, promotional purposes (e.g. providing a new unqualified user a sample rule circumvention in the hopes of attracting a new rule circumvention customer), market research purposes (e.g. to test the acceptance by users of a new rule circumvention), and technical testing purposes.
  • For example, a participating user navigating in a computing game environment requests more ammunition. The user is processed and if qualified, received the ammunition immediately—the accounting for which is settled latter. This permits the participating user to continue in their computing game environment (i.e. continue playing the game) without the usual interruption of transaction processing. Additional features of rule circumvention comprise any of: keeping a tally for each user, each instance a rule is circumvented, aggregating the instances to generate a billing statement, and reconciling payment from participating users against outstanding billing statements.
  • The process is similar when transacting interactive advertisements except that the present invention may or may not perform transaction fulfillment for products and/or services ordered through the transaction system. In the instance that the transaction is fulfilled by the transaction system, the transaction system electronically delivers the products and/or services requested by the participating users. For example, a participating user may come across an interactive advertisement for a software upgrade and may decide to purchase the software upgrade through an interaction with the interactive advertisement. In this instance, the transaction system is capable of delivering the software upgrade (i.e. if it is in inventory) to the requesting participating user.
  • Alternatively, the order for a desired product and/or service requested through the transaction of an interactive advertisement is communicated by the transaction system of the present invention to the vendor of the requested product and/or service. The vendor then delivers the requested product and/or service. It may be the case that the computer game content provider be the vendor to deliver the requested service and/or product (an electronic data product and/or service) as part in parcel with a selected circumvention. In such instance, the systems and methods of the present invention are capable to deliver the requested product and/or service.
  • Although, the transaction of rule circumventions has been described above, such description is merely introductory and should be read with the detailed description of transacting rule circumventions found below.
  • It is appreciated and understood that although the systems and methods described herein have been directed to the identification, creation, and transaction of circumventions of rules within a computer game, that the inventive concepts described herein are not limited to such exemplary implementation, but rather are applicable to various computing environments having one or more predefined rules.
  • As will be described below with respect to FIGS. 1-5G, the systems and methods described herein enable the procurement and transaction of computer environment rule circumventions and/or interactive advertisements.
  • Illustrative Computing Environment
  • FIG. 1 shows computing system 100 that may support the present invention. Computing system 100 comprises computer 20 a that may comprise display device 20 a′ and interface and processing unit 20 a″. Computer 20 a may support computing application 180. As shown, computing application 180 may comprise computing application processing and storage area 180 a and computing application display 180 b. Computing application processing and storage area 180 a may contain rule circumventions data store 180 a′. Similarly, computing application display 180 b may comprise display content 180 b′. In operation, a user (not shown) may interface with computing application 180 through the use of computer 20 a. The user (not shown) may navigate through computing application 180 to obtain various computer environment rule circumventions and/or access various interactive advertisements. Computer environment rule circumventions and/or interactive advertisements may be retrieved by computing application 180 from rule circumventions data store 180 a′ of computing application processing and storage area 180 a and shown to a user (not shown) as display content 180 b′ on computing application display 180 b. The user (not shown) may choose to purchase certain computer environment rule circumventions and/or access various interactive advertisements. Transacted computer environment rule circumventions and/or interactive advertisements may be stored in cooperating data store 180 a′ and associated to created and stored user accounts. Such user accounts may be used in operation to facilitate the transaction of computer environment rule circumventions and/or the execution of interactive advertisements and may be communicated to cooperating circumvention and interactive advertisement content providers (not shown).
  • Illustrative Computer Network Environment
  • Computer 20 a, described above, can be deployed as part of a computer network. In general, the above description for computers applies to both server computers and client computers deployed in a network environment. FIG. 1A illustrates an exemplary network environment, with a server in communication with client computers via a network, in which the present invention may be employed. As shown in FIG. 1A, a number of servers 10 a, 10 b, etc., are interconnected via a communications network 160 (which may be a LAN, WAN, intranet, the Internet, or other computer network) with a number of client computers 20 a, 20 b, 20 c, or computing devices, such as, mobile phone 15, land-line telephone 16, and personal digital assistant 17. In a network environment in which the communications network 160 is the Internet, for example, the servers 10 can be Web servers with which the clients 20 communicate via any of a number of known protocols, such as, hypertext transfer protocol (HTTP) or wireless application protocol (WAP). Each client computer 20 can be equipped with browser 180 a to gain access to the servers 10. Similarly, personal digital assistant 17 can he equipped with computing application 180 b and mobile phone 15 can be equipped with computing application 180 c to display and receive various data.
  • In operation, a user (not shown) may interact with a computing application running on a client computing devices to obtain a variety of rule circumventions. The rule circumventions may be stored on server computers and communicated to cooperating users through client computing devices over communications network 160. A participating user may purchase a computing environment rule circumvention and/or request the ordering of a product and/or service (including the display of advertisement information) through an interactive advertisement by interfacing with computing applications on client computing devices, thereby creating a enhanced entertainment option transaction. These transactions may be communicated by client computing devices to server computers for processing and storage. Server computers may host computing applications for the processing of circumvention and interactive advertisement transactions and cooperating data stores for the storage of such transactions.
  • Thus, the systems and methods described herein can be utilized in a computer network environment having client computing devices for accessing and interacting with the network and a server computer for interacting with client computers. However, the systems and methods providing the creation, integration, and transaction of rule circumventions and interactive advertisement can be implemented with a variety of network-based architectures, and thus should not be limited to the example shown. The present invention will now be described in more detail with reference to a presently illustrative implementation.
  • Computing Environment Rule Circumvention Transactions
  • FIG. 1B shows the cooperation of various computing elements when transacting computer game circumventions and interactive advertisements (i.e. entertainment enhancement options) within a computer game environment. A participating user may employ computing application 180 operating on client computer 20 a to send a request for computer game circumvention content and/or interactive advertisement content 110 to content provider's server 10 a over communications network 160. In response, content provider's server 10 a may process send the request and retrieve environment features and/or elements (i.e. computer game circumventions) content and/or interactive advertisements content from environment features and elements database 10 b for communication to client computer 20 a over communications network 160 as shown by arrow 110′. Further, participating user may employ computing application 180 to communicate requests to purchase products and/or services offered by the interactive advertisements. The interactive advertisement products and/or services may be requested by participating users by interacting with the interactive advertisement or, alternatively, the products and/or services may be offered to participating users based on conditions (e.g. a participating user passes a rendition of cellular phone shop in a computing application game and is prompted on whether he/she would like to purchase a cellular phone or, alternatively, if already owning a cellular phone, whether he/she would like to pay their bill, or some other consumer scenario).
  • FIGS. 2-2C are detailed block diagrams of an exemplary systems operating the described methods of the present invention. As is shown in FIG. 2, rule circumvention system environment 201 comprises participating user 202, computing environment operators 203, rule circumventions 205, rule circumvention transaction system 200, and payment reconciliation 230. In operation, participating users operating in a computing environment (not shown) interact with rule circumvention system 200 to obtain rule circumventions 205 which are granted by computing environment operators 203 and, for which, payment may be reconciled by payment reconciliation process 230. In an exemplary implementation, computing environment operators 203 may comprise game developers that offer a computer game to participating users 202. Within the computer game, computing environment operators 203 have integrated therein rule circumvention transaction system 200 which allows the participating user, for a fee, to circumvent one or more of the rules of the computer game. The rule circumventions 201 are then transacted between the participating users 202 and the computing environment operators 203 through rule circumvention transaction system 200 (e.g. rule circumvention transaction system 200 may operate to have users establish user accounts such that when a specific rule circumvention is desired (e.g. adding more ammunition), the rule circumvention can be transacted in real time as the participating user is navigating through the computing environment) and payment is reconciled by payment reconciliation process 230. It is appreciated that although payment reconciliation process 230 is shown to exist as a separate process from the rule circumvention transaction system 200, that such description is merely exemplary as payment reconciliation (as is seen in FIGS. 2A-2C) may be part of rule circumvention transaction system 200. Likewise, it is appreciated that although rule circumventions 205 are shown to exist separate and independent from rule circumvention transaction system 200, that such description is merely exemplary as rule circumventions may be a part of rule circumvention transaction system 200.
  • FIG. 2A shows a general block representation of the interaction of components of an exemplary rule circumvention system. As is shown, rule circumvention system 200 comprises a computing application 206, content server 211, core transaction server 223, and payment processing 230. Computing application 206 cooperates with content server 211, having at least one instruction set for integrating rule circumvention content in computing application 206. Also, computing application 206 cooperates with core transaction server 223, having at least one instruction set to instruct core transaction server 223 to transact instances where rule circumventions are initiated and executed in computing application 206. In transacting rule circumventions, core transaction server cooperates with content server 211. As is shown, core transaction server 223 also cooperates with payment processing module 230 to reconcile payment by end user 202 for transacted rule circumventions.
  • In operation, end user operates computing application to navigate through a computing environment (not shown). In navigating through the computing environment (e.g. computer game), the participating user may desire to circumvent one or more of the rules of the computing environment. In this instance, computing application cooperates with content server 211 to obtain rule circumventions. When initiated and executed, the instances of rule circumventions are transacted by core transaction server 223 cooperating with computing application 206 and content server 211. The transactions are then reconciled by payment processing module 230.
  • FIG. 2A′ shows a first exemplary detailed implementation of computing environment rule circumvention system. As shown in FIG. 2A′, rule circumvention system 200 comprises client computing application 204, browsing computing application 206, multimedia server 208, adapter 210, multimedia transaction server 211, core transaction server 223, third party integrator computing application 229, database 228, and payment processing engine 230. Core transaction server 223 further comprises core transaction server (CTS) computing application 222. Multimedia transaction server 211 further comprises multi-media transactions server computing application 212 and data cache 220.
  • In an exemplary implementation, CTS computing application 222 may comprise (but is not shown) an Internet information server transaction server, Internet information server Web server, Internet server application program interface, CTS login dynamic link library (DLL), and stored procedures). MTS computing application 212 may comprise (but is not shown) an Internet information server, ISAPI, multimedia transaction server (MTS DLL), stored procedures. Lastly, third party integrator computing application may comprise Internet information server Web server, ISAPI, Web transaction DLL, and stored procedures. It is appreciated, however, that the exemplary implementation described herein is merely exemplary, as the systems and methods disclosed herein may operate on various computing environment platforms including but not limited to, JAVA, LINUX, WINDOWS® (and it's family of products), and UNIX computing environment platforms.
  • In operation, participating user 202 cooperates with client computing application 204 to perform functions related to the transaction of computing environment rule circumventions (not shown). Exemplary functions include but are not limited to creating user accounts for use when transacting computer game rule circumventions and/or interactive advertisement interactions, requesting computer game rule circumventions and/or interacting with interactive advertisements, executing computer game rule circumventions and/or interactive advertisements, and providing payment (e.g. through a user account) for executed computer game circumventions and/or for requested products and/or services from interactions with interactive advertisements. Client computing application 204 cooperates with multimedia server 208 to realize one or more of these described functions. Multimedia server 208 comprises a computing environment or a portion of a computing environment capable of processing data representative of multimedia content. Also, multimedia server 208 cooperates with multimedia transaction server 211 through adapter 210. Adapter 210 serves as an interface to translate data in required protocols between multimedia server 208 and multimedia transaction server 211.
  • In the provided implementation, data is communicated between multimedia transaction server (MTS) 211 and multimedia server 208 through adapter 210. Data arriving MTS server 211 is processed by MTS computing application 212 and communicates data to cooperating system 200 components. Once processed, some of the data may be stored in cooperating data cache 220, or alternatively be communicated between the MTS computing application 212 and core transaction server 223. Within, core transaction server 223, communicated data from multimedia transaction server 211 is further processed by CTS computing application 222. A portion of the core transaction server data is communicated to database 228 through the CTS computing application 222. Alternatively, data processed by core transaction server 223 may be further processed by payment processing operation 230.
  • Moreover, core transaction server 223 may serve to assist in retrieving desired login information (requested by cooperating web browser 206 as part of a user login authentication and verification process). In this context, the CTS computing application is invoked to cooperate with database 228 to communicate data to and from database 228. This requested data is then communicated browsing computing application 206.
  • Also, rule circumvention system 200 comprises third party integrator computing environment 229 having third party integrator computing application 218. Third party integrator computing application 218 is partly populated by data retrieved from database 228. This data is presented to end user 202 through browser computing application 206 cooperating with client computing application 204.
  • In operation, end user 202 may employ system 200 to establish an account for use when transacting rule circumventions within a computing environment. Moreover, system 200 provides the rule circumvention content for integration within a given computing environment. In the illustration provided, the end user 202 has access to client computing application 204 cooperating with browser computing application 206 and multimedia server 208. The multimedia client has the capability, inter alia, to execute a computer game having therein rule circumventions. End user 202 can establish an account on rule circumvention system 200 by providing data through client computing application 204 cooperating with browsing computer application 206. Specifically, end user 202 may cooperate with one or more data input interface devices (e.g. keyboard, mouse, graphic tablet, voice recognition device, or other similar data input device—not shown) to provide data representative of a desired account to client computing application 204 cooperating with browsing computing application 206. Account data is then communicated by browsing computing application 206 via some communication protocol by the third party integrator computing application 218. The account information is stored in database 228 for use when transacting rule circumventions within a desired computing gaming environment. Included with the provided end user account information is user contact information and data representative and for use in payment processing for executed entertainment enhancement options transactions. Exemplary payment processing data includes but is not limited to credit card account information, Internet payment processing information (e.g. PAYPAL), bank information (e.g. online bank payment processing) and other similar electronic payment processing options data. Moreover, the end user (and/or content manager or entertainment enhancement option manager) may access end user account information using third party integrator computing application 218 to access desired account information stored in database 228.
  • An account established, end user 202 may employ entertainment rule circumvention system 200 to transact and execute desired rule circumventions. In this context, the end user interacting with a computer game being displayed through client computing application 204 by multimedia server 208 may engage one ore more integrated rule circumventions integrated within the computer game. In operation, the integrated rule circumvention is displayed to the end user 202 by multimedia server 208 through client computing application 204. When the desired entertainment option is engaged, a request is sent by multimedia server 208 to multimedia transaction server 211 through adapter 210. Multimedia transaction server 211 first processes the request by determining whether the participating user has an established account on the entertainment enhancement options transaction system 200.
  • Once, the account information is verified (and/or created), rule circumvention system 200 proceeds to perform processing to transact the desired rule circumvention for the end user. Specifically, core transaction server 211 invokes CTS computing application 222 to cooperate with database 228 to obtain data representative of a rule circumvention transaction. One obtained, the rule circumvention transaction information is communicated to the multi-media transaction server 211 through core transaction server 223. Specifically, MTS computing application 212 gathers the rule circumvention transaction information for communication through adapter 210 to multi-media server 208. It is at the adapter 210 that the appropriate triggers and flags are initiated and set that allow for the rule circumvention to occur with the computing environment supported by multi-media server 208. At multi-media server 208, additional content having the rule circumvention information and rule circumvention transaction information is provided to client computing application 204. As described previously, client computing application 204 is used to display computing environment content information (e.g. gaming content) to participating end users 202.
  • Moreover, rule circumvention system 200 allows end user 202 to interact with multimedia client 204 to simultaneously interact with a particular computing environment (e.g. a computer game) while verifying and updating user account information. In this context, end user 202 cooperated with client computing application 204 which in turn communicates with browsing computing application 206 and third party integrator computing application 229 to verify and/or modify user account information on database 228. In doing so, rule circumvention system 200 allows users to have real time control over their account while the computing environment is being navigated. With this ability, participating users 202 are provided with significant flexibility and control over the incidence of engaging in rule circumvention. Specifically, an end user navigating through an environment may choose to engage a particular rule circumvention only to find that their account is past due or is under-funded. The end user 202 is not left in the lurch, but rather is free to, while navigating through the computing environment, update their account information to bring it to a funded state such that the desired rule circumvention may be engaged.
  • As described, when a rule circumvention is transacted, the actual payment for the transacted rule may be reconciled at various times depending on the configuration of the payment processing. As shown in FIG. 2A′, payment processing 230 cooperated with core transaction server 223 to obtain transaction information for participating users who have engaged in rule circumvention. Payment processing module 230 comprises at least one instruction set for processing of payments according to some predefined payment processing methodology (e.g. credit card transaction, debit card transaction, PAYPAL, etc.). Such payment processing may occur in real time as participating user 202 engage in rule circumventions or may be configured to perform batch payment processing such that payment processing is performed at a subsequent time to when a participating user 202 engaged in a rule circumvention.
  • It is appreciated, however, that the inventive concepts described herein extend beyond the instance where a computer game is played on a web browser computing application, rather, the inventive concepts described herein can be implemented in various computing application executing in various computing environments (networked and non-networked) having varying configurations. Moreover, it is appreciated that although the example provided in FIG. 2A′ contemplates the use of a client computing application 204, browsing computing application 206 and, a third party integrator computing application 229, that such is merely exemplary as these computing application may exist in the same computing application (not shown). In the example provided, this configuration of computing applications addresses the instances in which the computing environment operator (e.g. game developer) operates a computing application independent of the end users browsing computing application (e.g. web browser) which both are independent of a third party integrator computing application (e.g. rule circumvention transaction integration partner).
  • FIG. 2B shows an alternate implementation of rule circumvention system 200′. As shown in FIG. 2B, the operation of rule circumvention system 200′ dos not include multimedia transaction server 211 (as is seen in rule circumvention system 200 of FIG. 2A′). In this context, multimedia server 208 no longer communicates through the adapter 210 and multimedia transaction server 211 when offering and receiving data from core transaction server 223. With the absence of multimedia transaction server 211, more transaction and rule circumvention processing is left to be performed on adapter 210 and core transactions server 223.
  • FIG. 2C shows a second alternate implementation of rule circumvention system 200. As is shown in FIG. 2C, rule circumvention system 200″ does not include multimedia transaction server 211 (of rule circumvention system 200 as is seen in FIG. 2B). Instead, adapter 210 cooperates with MTS instruction set 216 which in turn cooperates with data cache 220. The remaining operations as described in FIG. 2A′ remain unchanged. In this context, without multimedia transaction server 211, more operations performed by multimedia transaction server 211 are offloaded to core transaction server 223 and to adapter 210.
  • FIG. 2D shows a third alternate implementation of rule circumvention system 200. As is shown in FIG. 2D, rule circumvention system 200′″ does not include multimedia transaction server 211 (of rule circumvention system 200 as is seen in FIG. 2B) and does not include adapter 210. Instead, core transaction server 223 cooperates directly with multi-media server 208 to perform functions described above. The remaining operations as described in FIG. 2A′ remain unchanged. In this context, without multimedia transaction server 211 and adapter 210, more operations performed by multimedia transaction server 211 and adapter 210 are offloaded to core transaction server 223 and to adapter multimedia server 208.
  • FIGS. 2D′ and 2E shows more detailed description of the data flow between the cooperating components of rule circumvention systems 200, 200′, 200″, 200′″. As shown in FIG. 2D, MTS computing application 212 communicates with other system components (not shown) via a native communications protocol. MTS computing application 212 cooperates with application program interface (API) 214 which in turn communicates with MTS transaction instruction set 216. In addition, API 214 cooperates with communications module 232 to communicate data to and from core transaction server (not shown). MTS transaction instruction set 216, in turn, cooperates with Active Data Objects 234 which cooperates with ODBC 236. ODBC, in turn, cooperated with stored procedures 218, which in turn cooperates with data cache 220.
  • FIG. 2E, shows the data flow and cooperation of components to realize communication between the adapter and the multimedia transactions server (not shown). As shown, application interface 238 cooperates with communications protocol module 232 to realize MTS communications. The application interface 238 receives and communicates information from the adapter and correspondingly, the communication protocol module 232 communicates information to and from the multimedia transactions server or core transaction server.
  • FIGS. 3, 4, and 4A illustrate screen shots that display various features of the computing environment rule circumvention system. As shown in FIG. 3, rule circumvention system may be incorporated in computing application 180 displaying an interactive game through gaming pane 300. Gaming pane 300 may comprise gaming content 305 and rule circumventions dialog box 310. In operation, a user may be prompted by gaming computing application to secure a variety of rule circumventions. In the example shown, dialog box 310 may warn the user that he/she is low in ammunition in the interactive search and destroy game 305 that is being navigated. A user may choose to purchase additional ammunition and proceed, or alternatively, proceed without securing any rule circumventions. Conventionally, this rule circumvention would not be offered to garners. Rather, gamers would be forced to proceed with low ammunition using skill to advance in the game. Typically, gamers would proceed with low ammunition only to be defeated. The user maybe relegated to start the game from the very beginning, rendering all of his/her invested time moot.
  • Alternatively, the herein described systems and methods may offer users interactive advertisements (which as described above may in themselves act as rule circumventions) by which users can purchase a variety of products or services. These advertisements may be integrated within a number of computing applications in accordance to the context of the computing application. For example, in a simulation role playing game, real world products and/or services advertisements may be integrated in the game's landscape such that a user may interact with the cyber world advertisements to transact real world products and/or services. As shown in FIG. 4, the present invention may be employed by computing application 180 supporting a cyber environment having display pane 400. Display pane 400 may comprise interactive content 405 and interactive content dialog box 410. In operation, a user may be engrossed in a role playing computing application game for hours not realizing that the dinner hour is soon upon him/her. In the game, the user may be required to navigate through city streets and neighborhoods having storefronts and other real world constructs. As the user passes by a cyber realm storefront, ABC Pizza, dialog box 410 may appear to the user of computing application 180 providing a friendly reminder that dinner time is approaching. The user may proceed to enter the store in the cyber world and place an order for a real world pizza. The system of the present invention would communicate the order to the appropriate parties and the real world product would be delivered to the user. The user is now given the ability to transact real world products through the cyber realm storefront. The systems and methods described herein arc not limited to communicating with participating users using merely dialog boxes, but rather is capable of communicating with participating users in any manner supported by the computing environment, including but not limited to, heads up displays, sound, video, or any other integrated and/or stand-alone medium presentable and operable by the participating user. Moreover, the interactive advertisement offering is not limited to the provided example, but rather, can be triggered by various conditions and scenarios.
  • FIG. 4A shows a screen shot of an exemplary computing simulation application 413 describing the integration and real-time transaction features of the herein described systems and methods. As shown, screen shot 415 comprises simulation content 420, rule circumventions information 425, and transaction information 430. In operation, a participating user may operate computing simulation application 413 to interact with simulation content 420. Computing simulation application 415 may be configured that is has access to rule circumventions content provider computer server 10 a (of FIG. 1B) such that rule circumventions may be offered through computing application 413 to the participating user while interacting with computing application 413. In the example shown, the game is directed to a “shot-em up” type game where the participating user is called upon to slay unworldly beasts using a variety of weaponry. As the participating user runs low on ammunition (or some other condition), rule circumvention information 425 is displayed to offer rule circumventions to the participating user. As such, the rule circumvention is integrated into computing application 413. Rule circumventions information 425 comprises information about the possible rule circumventions and the cost of the rule circumventions. In addition to the rule circumventions information 425, transaction information 430 is offered to the participating user to inform him/her of their outstanding balance. The participating user may elect to accept the offered rule circumvention, using rule circumvention information 425 and transaction information 430 to help him/her in their decision, to enhance his/her interaction with computing application 413.
  • It is appreciated that although the systems and methods have been described in context of a computer game, the inventive concepts described herein extend beyond this singular exemplary implementation as they are applied to any computing environment having rules such.
  • FIG. 5 shows the processing performed when a participating user establishes an account for us with the herein described rule transaction system. As shown, processing begins at block 500 and proceeds to block 502 where a check is performed to determined if the participating user has an account. If the user does not have an account, processing proceeds to block 520 where an a check is performed to determine if an account is to be created. If it is not, processing terminates at block 518. However, if the user wishes to establish an account, processing proceeds to block 522 where demographic and payment method information is gathered and a user profile is created at block 524. From there processing proceeds to block 506.
  • Alternatively, if at block 502, it is determined that a user has an established account, processing proceeds to block 504 where the user is prompted to enter in their login information. From there processing proceeds to block 506 where interactive advertisements are offered to the participating users. The rules to be circumvented are then gathered at block 508 and provided to the user as he/she navigates through the computing environment at block 510. Payment authorization is procured at block 512 in the instance a rule circumvention is executed. A check is then made at block 514 to determine if the user belongs to an awards program. If the user is subscribed to an awards program, the awards account is update at block 516 and processing then terminates at block 518. However, if at block 514, it is determined that the user does not belong to an awards program, processing proceeds to block 526 where a check is made to determine if an awards account is to be created. If it is not, processing terminates at block 518. However, if an awards program account is to be created, processing proceeds to block 528 where an awards account is created and processing proceeds to block 516 and proceeds there from.
  • It is noted that the order of the offerings (e.g. interactive advertisement offering then rule circumvention offering, etc.) to the user is merely exemplary as the order of offerings is dependent on how the computing environment is navigated.
  • FIG. 5A shows the processing performed when a participating user engages the rule circumvention system (RCS) to circumvent one or more rules of a computing environment having rule circumvention integrated therein. As shown, processing begins at block 530 and proceeds to block 531 where a check is performed to determine if the rule circumvention system is to be invoked. If the rule circumvention system is not to be used, processing proceeds to block 547 wherein the computing environment is availed to the participating user with rule circumventions. However, if the rule circumvention system is to be engaged at block 531, processing proceeds to block 532 where identification information is collected (identification information may include a user identifier (e.g. GameUserID), computing environment identifier (ProviderID), and an operation identifier (Context ID)) and received. From there, processing proceeds to block 533 wherein the participating user is prompted to login into the rule circumvention system. User login information is received at block 552 and securely transmitted to the rule circumvention system's multimedia transaction server at blocks 534. A check is then made against the RCS database at block 536 to determine if the identification information provided is valid. If the identification information is valid, processing proceeds to block 540 where the user login is recorded. Processing then proceeds to block 541 where the results of the login are transmitted to the computing environment operator. However, if at block 536, the check returns a false answer, processing proceeds to block 541 and proceeds from there.
  • From there, processing proceeds to block 542 where a check is performed to determine if the user has been authorized to have access to one or more rule circumventions. If the user is authorized, processing proceeds to block 543 where data about the user who logged in is retrieved. The user data is then cached at block 544. From there, a login success message is displayed at block 545 and processing proceeds to block 546 wherein the participating user is provided access to the rule circumvention system. Also after block 544, identification information (e.g. media identifier—MediaUserID and session identifier—SessionID) are created at block 548 and associated with the computing environment at block 549.
  • However, if at block 542 the user is not authorized, processing proceeds to block 550 where an error message is transmitted to the participating user. The error is then displayed at block 551 and processing reverts to block 552 and proceeds there from.
  • FIG. 58 shows the processing performed after a participating user successfully logs onto the RCS and engages in a transaction for one or more rule circumventions. As shown, processing begins at block 553 and proceeds to block 554 where a participating user initiates a rule circumvention purchase. Processing then proceeds to blocks 555 where identification information (e.g. product information and session ID information) is transmitted to the RCS transacting module. From there a check is performed at block 557 to determine if it is valid identification information. If it is a valid, processing proceeds to block 560 where the an authorization is transmitted to the computing environment. The user is then provided the requested rule circumvention at block 561 and a confirmation message is displayed at block 564. In addition, a purchase receipt is provided at block 562 and the transaction is recorded at block 563 for subsequent processing (e.g. user account reconciliation and payment processing).
  • However, if at block 557, the check return a false result, processing proceeds to block 565 where an error message is transmitted to the participating user. A check is then performed at block 566 to determine if the error is fatal to the transaction. If the error is fatal, an error message is displayed and processing terminates at block 569. However, if the alternative proves to be true, processing proceeds to block 567 where a corrective message is displayed and corrective action (e.g. capitalization of under-funded user accounts) is performed at block 568. From there processing reverts to block 554 and proceeds there from.
  • FIG. 5C is a flow diagram of the processing performed when integrating an interactive advertisement in a computing environment. As shown, processing begins at block 570 wherein the RCS is invoked and proceeds to block 571 where a condition to offer interactive advertisements is met (e.g. participating user utilizes an area of the computing environment having interactive advertisements or other condition is met for the interactive advertisement transmission). Processing then proceeds to block 572 where identification information (e.g. session identifier and advertisement information) is transmitted to the rule circumvention transaction module. The rule circumvention transaction module is described above and is seen in FIGS. 2-2E. From there a check is performed against a data cache at block 573 to determine if the identification information is valid. In operation, the interactive advertisements may be stored in a data cache to optimize processing. If the identification information is found to be valid, processing proceeds to block 575 where one or more advertisements are selected for transmission to the participating user at block 576, In this context, the advertisement may be generated in real time depending on one or more conditions (e.g. user is known to like a particular recording artist) or selected from a library of advertisements, wherein the selection is performed using a selection algorithm dependent on various factors including but not limited to user preferences and demographics. The advertisement is provided to the user at block 577 and inserted into the user's computing environment at block 578 for display at block 579. In this step, the advertisement may also be formatted to one or more pre-determined formats for seamless integration into hosting computing environment. Also, from block 577, an advertisement delivery receipt is created at block 580 and the transaction is recorded at block 581 for subsequent processing (e.g. transaction reconciliation and advertiser billing for advertisement placing).
  • However, if at block 573, the check returns a false answer, processing proceeds to block 582 where the transaction is committed for subsequent processing. A notification is then sent of a bad advertisement condition or session is created at block 583 and an advertisement filler may be created and displayed at blocks 584 and 585.
  • FIG. 5D shows the processing performed when delivering an interactive advertisement to a participating user. As shown, processing begins at block 520′ and proceeds to block 521′ where the advertisement location information and session identifier is transmitted to the rule circumvention transaction module. Processing then proceeds to block 522′ where the identification information is converted (e.g. the session identifier is converted to the user identifier). From there processing follows two paths. Specifically, at block 528′, user data and preferences are retrieved from a cooperating data store to generate user data 529′ for use by selection algorithm 527′. Also, from block 522′ processing proceeds to block 523′ where the advertisement location data and preferences are retrieved from a cooperating data store. This data is delivered as advertisement inventory data to selection algorithm 527′. Additionally, advertisement location data 526′ is retrieved from a cooperating data store at block 525′ and is provided to the selection algorithm 527′.
  • The selection algorithm 527′ processes the user data, location data, and advertisement inventory data to select an appropriate advertisement for delivery to the participating user based on these —i.e. where the advertisement is to be placed in the computing environment). Once selected, the advertisement is ether retrieved a data store at block 530′ or directly from the advertiser at block 531′ or generated in real-time at block 545′. The selected, retrieved advertisement is then translated to a format appropriate to the advertisement location at block 532′. The formatted advertisement is then transmitted at block 533′ for display to the participating user at block 534′. Once displayed, an advertisement delivery receipt is created at block 535′ and the advertisement exposure is recorded at block 536′.
  • FIG. 5E shows the processing performed when a user modifies their account (e.g. adds money to their account or makes a purchase off their account) on which the RCS operates. As shown, processing begins at block 586 and proceeds to block 587 where the participating user purchases a rule circumvention (RC) or adds a money to their account. From there processing proceeds to block 588 where the identification information (session identifier) is transmitted to the rule circumvention transaction module. A check is then performed at block 589 to determine if the identification information is valid. If the identification information is valid, processing proceeds to block 591 where the transaction is recorded (the transaction recording may include but is not limited to the generation of a balance that is transmitted for display and viewed).
  • However, if the checks at block 589 return a false answer, processing proceeds to block 594 where an error message is transmitted to the computing environment. A check is then performed by the rule circumvention system at block 595 to determine if the error stemming from blocks 589 is fatal. If the error is fatal, an error message is displayed and processing terminates. However, if the error is proven not to be fatal, processing proceeds to block 596, where a suggested corrective action message is displayed. Corrective action (e.g. entering in user name and password) is then taken at block 597. Processing then reverts to block 587 and proceeds there from.
  • FIG. 5F shows the processing performed when a participating user requests funds to be added by the rule circumvention system to their account. In operation, a participating user will offer some verification of funds (e.g. credit card, routing information for a bank account, etc.) on which the RCS operates to perform user account maintenance. As shown, processing begins at block 501′ and proceeds to block 502′ where the participating user requests additional money. Processing then proceeds to block 503′ where identification information (e.g. user identifier and amount requested) is transmitted to the rule circumvention transaction module. A check is then performed at block 504′ to determine if the identification information is valid. If it is, processing proceeds to block 506′ where payment authorization commences. However, if at block 504′, an error occurs such that the identification information is not validated, processing proceeds to block 508′ and proceeds from there.
  • If at block 506′ it is determined that payment is not properly authorized (e.g. credit card is rejected for requested amount), processing proceeds to block 508′ where the result of the payment authorization is transmitted to the computing environment. However, if the payment authorization is successful, processing proceeds to block 507′ where the purchase (i.e. additional funds are added to the account) is recorded and proceeds to block 508′. From block 508′, processing proceeds to block 509′ where a check is performed to determine if the purchase had been authorized. If it was authorized, processing proceeds to block 510′ where the user's balance is retrieved and then cached at block 511′. A success message is transmitted to the participating user at block 512′ and the updated balance is provided at block 514′ for display at block 515′.
  • lf, however, at block 509′, it is determined that the payment is not authorized, processing proceeds to block 515′ where an error message is transmitted. From there a check is performed to determine if the error that lead to a non payment authorization was fatal. If the error was fatal, processing proceeds to block 519′ where an error message is displayed. However, if the error is not fatal a corrective message is displayed at block 517′. Corrective action (e.g. entering new user information), is then performed at block 518′. From there, processing reverts to block 502′ and proceeds there from.
  • FIG. 5G shows the processing performed when reconciling user accounts and advertisement usage for rule circumvention events. The reconciliation of such accounts on rule circumvention events provides computing operators (e.g. game developers) and their rule circumvention transaction integration partners with information representative of rule circumvention usage and revenue generated from the transaction of such rule circumvention events. As shown, in the context of updating participating user balances, processing begins at block 537′ where the participating user balance is updated to show the execution of at least one rule circumvention. From there, processing proceeds to block 538′ where the revenue from such rule circumvention transactions are recorded. The participating user purchase is then recorded at block 539′. Processing then proceeds to block 540′ where the integration partner revenue is provided.
  • In the context of tracking advertisement usage, processing begins at block 541′ where advertisement exposure is recorded. From there processing proceeds to block 542′ where the revenue from advertisement usage is recorded. The revenue generated for the computing environment operator is then calculated and provided at block 543′. In the instance that the computing environment operator is a third party, in addition to the calculation of the revenue for the computing environment operator, a calculation and payment of funds is made to the third party for supplying the product and/or service requested through the interactive advertisement. The advertiser cost is then recorded at block 544′. Such processing may be representative of the instance in which an advertiser cooperates with a computing environment operator to transact one or more advertisement rule circumventions (e.g. place an advertisement in already committed advertisement space).
  • Rule Circumvention For Integrated Advertisements in Computing Environments
  • The systems and methods described herein also contemplate an alternative implementation where the participating user is an advertiser. In this illustrative implementation, the advertiser of products and services in computing environments, such as, interactive TV, online movies, streaming media, or video clips, may circumvent already established advertising rules over their competitors, such as better placement of advertisements in the computing environment for their products and/or services. In doing so, the participating advertisers transacting advertisement rule circumvention can better target and reach a larger audience. These participating users (i.e. advertisers) are charged for the advertisement rule circumvention much like other computing environment rule circumventions according to the rule circumvention creation, integration, and transaction techniques described above.
  • CONCLUSION
  • In sum, the present invention provides system and methods to create, integrate, and transact the circumvention of rules in a computing environment. It is understood, however, that the invention is susceptible to various modifications and alternative constructions. There is no intention to limit the invention to the specific constructions described herein. On the contrary, the invention is intended to cover all modifications, alternative constructions, and equivalents falling within the scope and spirit of the invention.
  • It should also be noted that the present invention may be implemented in a variety of computer environments (including both non-wireless and wireless computer environments), partial computing environments, and real world environments. The various techniques described herein may be implemented in hardware or software, or a combination of both. Preferably, the techniques arc implemented in computer programs executing on programmable computers that each include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Program code is applied to data entered using the input device to perform the functions described above and to generate output information. The output information is applied to one or more output devices. Each program is preferably implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the programs can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Each such computer program is preferably stored on a storage medium or device (e.g., ROM or magnetic disk) that is readable by a general or special purpose programmable computer for configuring and operating the computer when the storage medium or device is read by the computer to perform the procedures described above. The system may also be considered to be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner.
  • Although an exemplary implementation of the invention has been described in detail above, those skilled in the art will readily appreciate that many additional modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of the invention. Accordingly, these and all such modifications are intended to be included within the scope of this invention. The invention may be better defined by the following exemplary claims.
    Figure US20100106574A1-20100429-P00999

Claims (51)

  1. 6. The system as recited in claim 5, wherein the payment processing module cooperates with payment systems comprising any of credit card payment systems and bank systems to reconcile payments.
  2. 7. The system as recited in claim 1, wherein the core transaction server comprises an Internet information server, an information server application program interface, a core transaction dynamic link library, and stored procedures.
  3. 8. The system as recited in claim 1, further comprising a data store, the data store maintaining data representative of the transaction of the circumvention of the predefined rules.
  4. 9. The system as recited in claim 8, wherein the data store maintains instructions to instruct the computing environment to circumvent the predefined rules.
  5. 10. The system as recited in claim 1, wherein the computing environment navigation application is a computer browser computing application.
  6. 11. The system as recited in claim 1, further comprising a user web server operating a user website, the user website used by participating users to input data representative of user account information for use by the core transaction server to transact rule circumventions.
  7. 12. The system as recited in claim 11, wherein the computing environment comprises a user website and a computer game,
    wherein the user website and the computer game operate independently of each other,
    and wherein the user website and the computer game cooperate with each other to communicate information representative of a rule circumvention and the transaction of the rule circumvention.
  8. 13. The system as recited in claim 12, wherein the information for the rule circumvention is provided to participating users as the computer game is played.
  9. 14. The system as recited in claim 13, wherein the user website is used to communicate user account information to and from the core transaction server.
  10. 15. The system as recited in claim 14, wherein the user account information is provided while the computer game is being played.
  11. 16. The system as recited in claim 15, wherein the user account information comprises any of a user's available account balance and payment history.
  12. 17. The system as recited in claim 16, wherein upon the transaction of a rule circumvention, the user's available account balance is updated by the core transaction server.
  13. 18. The system as recited in claim 17, wherein the core transactions server aggregates the amounts for each rule circumvention transaction and the number of transactions.
  14. 19. The system as recited in claim 18, wherein the core transaction server arrives at the amounts for each rule circumvention transaction based on a pricing technique comprising any of: supply demand analysis, predetermined price list, forecasting techniques, auction techniques, reverse auction techniques, and trend analysis of executed rule circumvention transactions.
  15. 20. The system as recited in claim 1, wherein the circumvention of the predefined rules comprises the delivery and tracking of an interactive advertisement.
  16. 21. The system as recited in claim 20, wherein the core transaction server selects an advertisement for delivery using factors comprising any of: user affinity information, advertisement location information, user profile information, user behavior information, and advertisement inventory information.
  17. 22. The system as recited in claim 20, wherein a price is associated by the core transaction server for each interactive advertisement that is delivered and tracked, wherein the price is determined using a pricing technique comprising any of: supply/demand analysis, predetermined price list, forecasting techniques, auction techniques, reverse auction techniques, and trend analysis for already delivered interactive advertisements.
  18. 23. The system as recited in claim 22, wherein the amounts of the rule circumvention transaction for an interactive advertisements are shared between at least two parties comprising any of: a computing environment operator, advertisers, and third party rule circumvention transaction system operators and/or integrators.
  19. 24. In a computing environment having an existing set of rules, a method to circumvent the existing set of rules comprising the steps of:
    identifying at least one of the existing set of rule that is to be circumvented;
    providing a rule circumvention mechanism operable in the computing environment to circumvent the identified rule; and
    executing the rule circumvention mechanism to circumvent the identified rule/
  20. 25. The method as recited in claim 24, further comprising transacting the instance where the rule circumvention mechanism is executed.
  21. 26. The method as recited in claim 25, further comprising for each identified rule to be circumvented associating an amount for the instance in which the identified rule is to be circumvented, tracking the number of instances where the identified rule has been circumvented, tallying the number of instances and multiplying it by the associated amount to generate an charge amount
  22. 27. The method as recited in claim 26, further comprising displaying the charge amount to participating users.
  23. 28. The method as recited in claim 25, further comprising performing payment reconciliation.
  24. 29. The method as recited in claim in 28, further comprising communicating with payment systems to perform payment reconciliation.
  25. 30. The method as recited in claim 24, wherein the providing step further comprises:
    providing a computing environment navigation application, the computing environment navigation application having a user interface to accept and display data representative of rule circumventions; and
    providing a core transaction server, the core transaction server cooperating with the computing environment navigation application through an adapter, said adapter allowing for the seamless communication and integration information communicated to and from the core transaction server,
    wherein, the core transaction server has at least one instruction set to transact at least one circumvention of the predefined rules.
  26. 31. The method as recited in claim 30, further comprising providing a cooperating data store.
  27. 32. The method as recited in claim 24, wherein the identifying step comprises cooperation between a computing environment operator and a third party rule circumvention integrator.
  28. 33. The method as recited in claim 32, wherein the identifying step further comprises, creating interactive advertisements for integration in the computing environment.
  29. 34. A computer readable medium, having computer readable instructions to instruct a computer to perform the method as recited in claim 24.
  30. 35. In a game having a set rules that is played via a computer, a method for cheating comprising the steps of:
    integrating within the game a mechanism providing a second set of rules, wherein the second set of rules allows for the set of rules to be cheated,
    wherein the second set of rules is only accessed through a transaction entailing the exchange of consideration;
    receiving a request for access to the second set of rules; and
    executing the transactions resulting from the received requests.
  31. 36. The method as recited in claim 35, further comprising:
    tracking the executed transactions.
  32. 37. The method as recited in claim 35, further comprising:
    associating bill amounts for each instance the second set of rules is accessed, wherein the bill amounts depend on which rule of the second set of rules is being accessed; and
    aggregating the bill amounts based on the tallied executed transactions.
  33. 38. In a game played via a computer having a set of rules, a module allowing for the cheating of the game through the execution of a second set of rules such that access to the second set of rules is only accomplished through a transaction wherein consideration is exchanged comprising:
    an integration object, the integration object providing seamless integration between the module and the game such that the second set of rules operate in the game to allow cheating of the set of rules; and
    a transaction object, the transaction object transacting instances where the second set of rules are accessed.
  34. 39. The module as recited in claim 38, further comprising a communication object, the communication object having at least one instruction to instruct the game to communicate information representative of cheating operations to a cooperating computing environment.
  35. 40. The module as recited in claim 39, wherein the communication of the cheating operations information is communicated over a communications network.
  36. 41. The module as recited in claim 38, wherein the transaction object keeps a running tally of executed transactions, associates bill amounts to each transaction, and aggregates the bill amounts for all of the transactions.
  37. 42. The module as recited in claim 41, further comprising at least one instruction to instruct the game to communicate the aggregated bill amounts to a cooperating computing environment and/or to a display device.
  38. 43. The module as recited in claim 41, wherein the bill amounts are aggregated while the game is being played.
  39. 44. In a computer game having a set of rules, a method to allow cheating through a transaction, wherein the transaction entails the exchange of consideration, comprising:
    creating a second set of rules that cheat the game set of rules, wherein access to the second set of rules is only realized through the execution of a transaction;
    integrating in the computer game the second set of rules, wherein the integrating step entails offering one or more of the second set of rules as the game is being played;
    receiving requests for access to the second set of rules; and
    fulfilling the requests.
  40. 45. The method as recited in claim 44, further comprising associating a bill amount for obtaining access to one or more of the second set of rules and tallying and performing an accounting of each instance when one or more of the second set of rules is accessed.
  41. 46. The method as recited in claim 45, further comprising communicating the accounting to a cooperating computing environment for storage and display.
  42. 47. The method as recited in claim 46, further comprising displaying the accounting in real-time as the computer game is being played.
  43. 48. In a computing environment a system allowing the circumvention of predefined rules of the environment comprising:
    a computing environment navigation application, the computing environment navigation application having a user interface to accept and display data representative of rule circumventions; and
    a core transaction server, the core transaction server cooperating with the computing environment navigation application
    wherein, the core transaction server has at least one instruction set to transact at least one circumvention of the predefined rules.
  44. 49. The system as recited in claim 48, further comprising a multimedia server, the multimedia server cooperating with the core transaction server to provide content representative of at least one rule circumvention of the predefined rules.
  45. 50. The system as recited in claim 49, wherein the multimedia server comprises, an Internet information server, a multimedia transaction dynamic link library, stored procedures, and information server application program interface.
  46. 51. The system as recited in claim 50, further comprising a multimedia server, the multimedia server operating between the multimedia transaction server and the computing environment navigation application to provide data from the multimedia transaction server to the computing environment navigation application.
  47. 52. The system as recited in claim 58, further comprising a payment processing module, the payment processing module cooperating with the core transaction server to reconcile payment for executed transactions representative of at least one circumvented rule.
  48. 53. In an computing environment operable by a first party, a system providing interactive advertisements comprising:
    a multimedia transaction server having content representative of a interactive advertisements for placement in the computing environment, the multimedia transaction server being operable by a second party transaction services integrator; and
    a core transaction server, the core transaction server cooperating with the multimedia transaction server to transact instances where the interactive advertisement is interacted with, the core transaction server operable by a third party.
  49. 54. The system as recited in claim 53, wherein the core transaction server reconciles transactions such to aggregate amounts payable to the first, second, and third parties.
  50. 55. The system as recited in claim 53 , further comprising a advertisement engine, the advertisement engine cooperating with the multi-media transaction server to generate advertisements in real time as the computing environment is being navigated.
  51. 56. The system as recited in claim 55, wherein the advertisement engine formats the interactive advertisements for integration within the computing environment.
US12/603,098 2000-06-20 2009-10-21 Computing Environment Transaction System to Transact Computing Environment Circumventions Abandoned US20100106574A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/603,098 US20100106574A1 (en) 2000-06-20 2009-10-21 Computing Environment Transaction System to Transact Computing Environment Circumventions
US13/617,173 US10607237B2 (en) 2000-06-20 2012-09-14 Computing environment transaction system to transact purchases of objects incorporated into games

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US21274900P 2000-06-20 2000-06-20
US09/676,448 US7076445B1 (en) 2000-06-20 2000-09-29 System and methods for obtaining advantages and transacting the same in a computer gaming environment
US10/418,815 US10346853B2 (en) 2000-06-20 2003-04-18 Computing environment transaction system to transact computing environment circumventions
US12/603,098 US20100106574A1 (en) 2000-06-20 2009-10-21 Computing Environment Transaction System to Transact Computing Environment Circumventions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/418,815 Division US10346853B2 (en) 2000-06-20 2003-04-18 Computing environment transaction system to transact computing environment circumventions

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/617,173 Continuation US10607237B2 (en) 2000-06-20 2012-09-14 Computing environment transaction system to transact purchases of objects incorporated into games

Publications (1)

Publication Number Publication Date
US20100106574A1 true US20100106574A1 (en) 2010-04-29

Family

ID=26907424

Family Applications (4)

Application Number Title Priority Date Filing Date
US09/676,448 Expired - Lifetime US7076445B1 (en) 2000-06-20 2000-09-29 System and methods for obtaining advantages and transacting the same in a computer gaming environment
US10/418,815 Active 2025-05-05 US10346853B2 (en) 2000-06-20 2003-04-18 Computing environment transaction system to transact computing environment circumventions
US12/603,098 Abandoned US20100106574A1 (en) 2000-06-20 2009-10-21 Computing Environment Transaction System to Transact Computing Environment Circumventions
US13/617,173 Expired - Lifetime US10607237B2 (en) 2000-06-20 2012-09-14 Computing environment transaction system to transact purchases of objects incorporated into games

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US09/676,448 Expired - Lifetime US7076445B1 (en) 2000-06-20 2000-09-29 System and methods for obtaining advantages and transacting the same in a computer gaming environment
US10/418,815 Active 2025-05-05 US10346853B2 (en) 2000-06-20 2003-04-18 Computing environment transaction system to transact computing environment circumventions

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/617,173 Expired - Lifetime US10607237B2 (en) 2000-06-20 2012-09-14 Computing environment transaction system to transact purchases of objects incorporated into games

Country Status (4)

Country Link
US (4) US7076445B1 (en)
EP (1) EP1307839A1 (en)
AU (1) AU2001263440A1 (en)
WO (1) WO2001098991A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100111493A1 (en) * 2000-02-01 2010-05-06 Rovi Technologies Corporation Systems and methods for providing promotions with recorded programs
US20100175080A1 (en) * 2002-05-01 2010-07-08 Index Systems, Inc Method and system for facilitating advertising and t-commerce transactions in connection with content stored on a storage medium
US20110202419A1 (en) * 2000-07-13 2011-08-18 Aeritas, Llc Method and system for facilitation of wireless e-commerce transactions
US20110314036A1 (en) * 2010-06-21 2011-12-22 William Farrell Cunningham System for conversion of data item attributes
US8352978B2 (en) 1998-05-15 2013-01-08 United Video Properties, Inc. Systems and methods for advertising television networks, channels, and programs
US8949901B2 (en) 2011-06-29 2015-02-03 Rovi Guides, Inc. Methods and systems for customizing viewing environment preferences in a viewing environment control application
US9137491B2 (en) 2000-02-01 2015-09-15 Rovi Guides, Inc. Methods and systems for forced advertising
US9288521B2 (en) 2014-05-28 2016-03-15 Rovi Guides, Inc. Systems and methods for updating media asset data based on pause point in the media asset

Families Citing this family (236)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8574074B2 (en) 2005-09-30 2013-11-05 Sony Computer Entertainment America Llc Advertising impression determination
US6848995B1 (en) * 2000-03-06 2005-02-01 Walker Digital, Llc System to determine casino offers
US20070050256A1 (en) * 2000-06-30 2007-03-01 Jay Walker Method and apparatus for compensating participation in marketing research
US20050153766A1 (en) * 2000-12-05 2005-07-14 Harmon Matthew C. E-Commerce Role Playing Platform
US6872137B2 (en) * 2000-12-22 2005-03-29 Tara Chand Singhal Method and apparatus for an educational game and dynamic message entry and display
US8751310B2 (en) * 2005-09-30 2014-06-10 Sony Computer Entertainment America Llc Monitoring advertisement impressions
US8458028B2 (en) * 2002-10-16 2013-06-04 Barbaro Technologies System and method for integrating business-related content into an electronic game
US20050160064A1 (en) * 2003-01-30 2005-07-21 Arto Lehtonen Confirming user rights in distribution of application programs
WO2004097635A2 (en) 2003-04-25 2004-11-11 Apple Computer, Inc. Graphical user interface for browsing, searching and presenting media items
KR20100093142A (en) 2003-04-25 2010-08-24 애플 인크. Methods and system for secure network-based distribution of content
US9406068B2 (en) 2003-04-25 2016-08-02 Apple Inc. Method and system for submitting media for network-based purchase and distribution
US7862428B2 (en) 2003-07-02 2011-01-04 Ganz Interactive action figures for gaming systems
US7844548B2 (en) 2003-10-15 2010-11-30 Apple Inc. Techniques and systems for electronic submission of media for network-based distribution
EP1524617A1 (en) * 2003-10-17 2005-04-20 Swisscom Mobile AG Method and system for playing with a game terminal connected to a mobile network
CA2696264A1 (en) 2003-12-31 2005-07-14 Ganz, An Ontario Partnership Consisting Of S.H. Ganz Holdings Inc. And 816877 Ontario Limited System and method for toy adoption and marketing
US7534157B2 (en) * 2003-12-31 2009-05-19 Ganz System and method for toy adoption and marketing
US20080021920A1 (en) * 2004-03-25 2008-01-24 Shapiro Saul M Memory content generation, management, and monetization platform
WO2005115570A2 (en) * 2004-05-25 2005-12-08 Gamelogic, Inc. System and method for playing a role-playing game
US8968093B2 (en) * 2004-07-15 2015-03-03 Intel Corporation Dynamic insertion of personalized content in online game scenes
US8103546B1 (en) 2004-08-16 2012-01-24 Lightningcast Llc Advertising content delivery
US8763157B2 (en) 2004-08-23 2014-06-24 Sony Computer Entertainment America Llc Statutory license restricted digital media playback on portable devices
US7571464B2 (en) * 2004-08-27 2009-08-04 International Business Machines Corporation Secure bidirectional cross-system communications framework
US20060046854A1 (en) * 2004-08-31 2006-03-02 Microsoft Corporation Method and apparatus for developing an electronic game using automatic user feedback
US7711600B1 (en) * 2004-09-10 2010-05-04 Micro Industries Corporation In-store self-service ordering guide system and method
US7455586B2 (en) * 2004-09-21 2008-11-25 Igt Method and system for gaming and brand association
US20060068915A1 (en) * 2004-09-30 2006-03-30 Aruze Corporation Gaming server and gaming system
US20060080171A1 (en) * 2004-10-08 2006-04-13 Jardins G T D Managing advertising inventory
US11132705B1 (en) 2004-10-08 2021-09-28 Verizon Media Inc. Managing advertising inventory
US20060229976A1 (en) * 2005-03-30 2006-10-12 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual credit with transferability
US20060190283A1 (en) * 2005-02-04 2006-08-24 Searete Llc Participating in risk mitigation in a virtual world
US20060178218A1 (en) * 2005-02-04 2006-08-10 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world escrow user interface
US20090198604A1 (en) * 2004-12-17 2009-08-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Tracking a participant loss in a virtual world
US20060178965A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Tracking a participant loss in a virtual world
US7774275B2 (en) * 2005-02-28 2010-08-10 Searete Llc Payment options for virtual credit
US20060178899A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Identifying a participant loss in a virtual world
US20070156509A1 (en) * 2005-02-04 2007-07-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world incentives offered to virtual world participants
US20070268299A1 (en) * 2005-02-04 2007-11-22 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Attribute enhancement in virtual world environments
US20090125383A1 (en) * 2005-02-04 2009-05-14 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Participation profiles of virtual world players
US20070203725A1 (en) * 2006-02-27 2007-08-30 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Security arrangements for virtual world obligations
US20070174183A1 (en) * 2006-01-26 2007-07-26 Jung Edward K Context determinants in virtual world environment
US20080228607A1 (en) * 2005-02-04 2008-09-18 Jung Edward K Y Resolution of virtual world revocable transfers
US20090037364A1 (en) * 2005-02-04 2009-02-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Participation profiles of virtual world players
US20090100354A1 (en) * 2005-02-04 2009-04-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Third party control over virtual world characters
US20080133392A1 (en) * 2005-02-04 2008-06-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Security arrangements for virtual world obligations
US20060178180A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Virtual world escrow environment
US7958047B2 (en) * 2005-02-04 2011-06-07 The Invention Science Fund I Virtual credit in simulated environments
US20080270165A1 (en) * 2005-02-04 2008-10-30 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world property disposition after real-world occurrence
US20070203828A1 (en) * 2005-02-04 2007-08-30 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world incentives offered to virtual world participants
US20090043683A1 (en) * 2005-02-04 2009-02-12 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world reversion rights
US20070136185A1 (en) * 2005-02-04 2007-06-14 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Disposition of proprietary virtual rights
US20070073582A1 (en) * 2005-09-27 2007-03-29 Searete Llc Real-world incentives offered to virtual world participants
US20070112660A1 (en) * 2005-02-04 2007-05-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Disposition of proprietary virtual rights
US7720687B2 (en) * 2005-10-03 2010-05-18 The Invention Science Fund I, Llc Virtual world property disposition after real-world occurrence
US20060195378A1 (en) * 2005-02-28 2006-08-31 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Hybrid charge account for virtual world credit
US20060178966A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Virtual world property disposition after virtual world occurence
US20070198305A1 (en) * 2005-03-30 2007-08-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual credit with transferability
US20070038559A1 (en) * 2005-07-28 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Rating notification for virtual world environment
US20060195377A1 (en) * 2005-02-28 2006-08-31 Searete Llc Financial ventures based on virtual credit
US20060178968A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Virtual world interconnection technique
US20090138355A1 (en) * 2005-02-04 2009-05-28 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20070118420A1 (en) * 2005-02-04 2007-05-24 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Context determinants in virtual world environment
US20070035549A1 (en) * 2005-08-12 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Variant rating plans for a virtual world environment
US20070112624A1 (en) * 2005-11-15 2007-05-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Use of patron profiles in virtual world environment
US20070130001A1 (en) * 2005-11-18 2007-06-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20070150986A1 (en) * 2005-03-30 2007-06-28 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual credit with transferability
US20100114662A1 (en) * 2008-10-31 2010-05-06 Searette Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20070013691A1 (en) * 2005-07-18 2007-01-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supervisory authority in virtual world environment
US20090132297A1 (en) * 2005-02-04 2009-05-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Probability adjustment of a virtual world loss event
US20080215434A1 (en) * 2005-02-04 2008-09-04 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real world interaction with virtual world privileges
US20090099930A1 (en) * 2005-02-04 2009-04-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Participation profiles of virtual world players
US20080109338A1 (en) * 2005-02-04 2008-05-08 Searete Llc, A Limited Liability Corporation Virtual credit in simulated environments
US20070036328A1 (en) * 2005-07-19 2007-02-15 Searete Llc Virtual world escrow
US20070073614A1 (en) * 2005-09-15 2007-03-29 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real world interaction with virtual world privileges
US20070024613A1 (en) * 2005-07-28 2007-02-01 Searete Llc, A Limited Liability Corporation Of Delaware Selecting auxiliary control features for virtual world environment
US20060224505A1 (en) * 2005-03-30 2006-10-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Multi-player game using simulated credit transactions
US20090144148A1 (en) * 2005-02-04 2009-06-04 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Attribute enhancement in virtual world environments
US20090018910A1 (en) * 2007-07-10 2009-01-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world interconnection technique
US20060235791A1 (en) * 2005-04-15 2006-10-19 Searete Llc Follow-up contacts with virtual world participants
US20070035548A1 (en) * 2005-08-12 2007-02-15 Searete Llc Rating technique for virtual world environment
US20070124239A1 (en) * 2005-02-04 2007-05-31 Searete LLC, a limited liability corporation of Multi-player game using simulated credit transactions
US20090043682A1 (en) * 2005-02-04 2009-02-12 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20090144132A1 (en) * 2005-02-04 2009-06-04 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Follow-up contacts with virtual world participants
US20080177558A1 (en) * 2005-02-04 2008-07-24 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Resolution of virtual world revocable transfers
US20090138333A1 (en) * 2005-02-04 2009-05-28 Searete Llc, A Limited Liablity Of The State Of Delaware Follow-up contacts with virtual world participants
US20090070180A1 (en) * 2005-02-04 2009-03-12 Searete Llc A Limited Liability Corporation Of The State Of Delaware Variant rating plans for virtual world environment
US20060195376A1 (en) * 2005-02-28 2006-08-31 Jung Edward K Compensation techniques for virtual credit transactions
US20060178967A1 (en) * 2005-02-04 2006-08-10 Searete Llc Disposition of proprietary virtual rights
US20070078737A1 (en) * 2005-02-28 2007-04-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Financial ventures based on virtual credit
US20060205518A1 (en) * 2005-03-08 2006-09-14 Microsoft Corporation Systems and methods for providing system level notifications in a multimedia console
US8832100B2 (en) 2005-09-14 2014-09-09 Millennial Media, Inc. User transaction history influenced search results
US7752209B2 (en) 2005-09-14 2010-07-06 Jumptap, Inc. Presenting sponsored content on a mobile communication facility
US8688671B2 (en) 2005-09-14 2014-04-01 Millennial Media Managing sponsored content based on geographic region
US9471925B2 (en) 2005-09-14 2016-10-18 Millennial Media Llc Increasing mobile interactivity
US20110313853A1 (en) 2005-09-14 2011-12-22 Jorey Ramer System for targeting advertising content to a plurality of mobile communication facilities
US10911894B2 (en) 2005-09-14 2021-02-02 Verizon Media Inc. Use of dynamic content generation parameters based on previous performance of those parameters
US7676394B2 (en) 2005-09-14 2010-03-09 Jumptap, Inc. Dynamic bidding and expected value
US7769764B2 (en) 2005-09-14 2010-08-03 Jumptap, Inc. Mobile advertisement syndication
US8989718B2 (en) 2005-09-14 2015-03-24 Millennial Media, Inc. Idle screen advertising
US7577665B2 (en) 2005-09-14 2009-08-18 Jumptap, Inc. User characteristic influenced search results
US9703892B2 (en) 2005-09-14 2017-07-11 Millennial Media Llc Predictive text completion for a mobile communication facility
US10038756B2 (en) 2005-09-14 2018-07-31 Millenial Media LLC Managing sponsored content based on device characteristics
US8503995B2 (en) 2005-09-14 2013-08-06 Jumptap, Inc. Mobile dynamic advertisement creation and placement
US9076175B2 (en) 2005-09-14 2015-07-07 Millennial Media, Inc. Mobile comparison shopping
US7912458B2 (en) 2005-09-14 2011-03-22 Jumptap, Inc. Interaction analysis and prioritization of mobile content
US8103545B2 (en) 2005-09-14 2012-01-24 Jumptap, Inc. Managing payment for sponsored content presented to mobile communication facilities
US9058406B2 (en) 2005-09-14 2015-06-16 Millennial Media, Inc. Management of multiple advertising inventories using a monetization platform
US10592930B2 (en) 2005-09-14 2020-03-17 Millenial Media, LLC Syndication of a behavioral profile using a monetization platform
US8433297B2 (en) 2005-11-05 2013-04-30 Jumptag, Inc. System for targeting advertising content to a plurality of mobile communication facilities
US9201979B2 (en) 2005-09-14 2015-12-01 Millennial Media, Inc. Syndication of a behavioral profile associated with an availability condition using a monetization platform
US7702318B2 (en) 2005-09-14 2010-04-20 Jumptap, Inc. Presentation of sponsored content based on mobile transaction event
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US10657538B2 (en) 2005-10-25 2020-05-19 Sony Interactive Entertainment LLC Resolution of advertising rules
US8676900B2 (en) 2005-10-25 2014-03-18 Sony Computer Entertainment America Llc Asynchronous advertising placement based on metadata
US11004089B2 (en) 2005-10-25 2021-05-11 Sony Interactive Entertainment LLC Associating media content files with advertisements
US20070118425A1 (en) 2005-10-25 2007-05-24 Podbridge, Inc. User device agent for asynchronous advertising in time and space shifted media network
US20070296718A1 (en) * 2005-12-01 2007-12-27 Exent Technologies, Ltd. Dynamic resizing of graphics content rendered by an application to facilitate rendering of additional graphics content
US8629885B2 (en) * 2005-12-01 2014-01-14 Exent Technologies, Ltd. System, method and computer program product for dynamically identifying, selecting and extracting graphical and media objects in frames or scenes rendered by a software application
EP2018728A4 (en) 2006-05-05 2011-07-06 Sony Comp Entertainment Us Advertisement rotation
US7827162B2 (en) * 2006-05-15 2010-11-02 Apple Inc. Media package format for submission to a media distribution system
US20070265969A1 (en) * 2006-05-15 2007-11-15 Apple Computer, Inc. Computerized management of media distribution agreements
US8015237B2 (en) 2006-05-15 2011-09-06 Apple Inc. Processing of metadata content and media content received by a media distribution system
US7962634B2 (en) 2006-05-15 2011-06-14 Apple Inc. Submission of metadata content and media content to a media distribution system
US20070282710A1 (en) * 2006-05-25 2007-12-06 Motorola, Inc. Method for demonstrating the features of an application program
GB2435565B (en) 2006-08-09 2008-02-20 Cvon Services Oy Messaging system
GB2436412A (en) 2006-11-27 2007-09-26 Cvon Innovations Ltd Authentication of network usage for use with message modifying apparatus
US20080146339A1 (en) * 2006-12-14 2008-06-19 Arlen Lynn Olsen Massive Multiplayer Online Sports Teams and Events
US20080146302A1 (en) * 2006-12-14 2008-06-19 Arlen Lynn Olsen Massive Multiplayer Event Using Physical Skills
US20080189175A1 (en) * 2007-02-01 2008-08-07 Ic.Com, Inc. Method and System for In-Depth Advertising for Interactive Gaming
US8521650B2 (en) * 2007-02-26 2013-08-27 Zepfrog Corp. Method and service for providing access to premium content and dispersing payment therefore
US8935718B2 (en) 2007-05-22 2015-01-13 Apple Inc. Advertising management method and system
US8996409B2 (en) * 2007-06-06 2015-03-31 Sony Computer Entertainment Inc. Management of online trading services using mediated communications
GB2448957B (en) * 2007-06-20 2009-06-17 Cvon Innovations Ltd Mehtod and system for identifying content items to mobile terminals
US8915786B2 (en) 2007-08-09 2014-12-23 Igt Gaming system and method providing simultaneous gaming with linked paytable events
US20090076904A1 (en) * 2007-09-17 2009-03-19 Frank David Serena Embedding digital values for digital exchange
US8769558B2 (en) 2008-02-12 2014-07-01 Sony Computer Entertainment America Llc Discovery and analytics for episodic downloaded media
US8029359B2 (en) 2008-03-27 2011-10-04 World Golf Tour, Inc. Providing offers to computer game players
US8230441B2 (en) 2008-04-29 2012-07-24 International Business Machines Corporation Virtual world subgroup determination and segmentation for performance scalability
US9342287B2 (en) 2008-05-05 2016-05-17 Apple Inc. Software program ratings
US9076176B2 (en) 2008-05-05 2015-07-07 Apple Inc. Electronic submission of application programs for network-based distribution
US10255580B2 (en) 2008-05-05 2019-04-09 Apple Inc. Network-based distribution of application products
US8648875B2 (en) 2008-05-14 2014-02-11 International Business Machines Corporation Differential resource applications in virtual worlds based on payment and account options
US10380604B2 (en) 2008-07-17 2019-08-13 International Business Machines Corporation Method and system for viral marketing within a virtual world
US20100017283A1 (en) * 2008-07-21 2010-01-21 International Business Machines Corporation Dynamic advertising systems and methods for virtual universes
US9324098B1 (en) 2008-07-22 2016-04-26 Amazon Technologies, Inc. Hosted payment service system and method
US10037565B2 (en) * 2008-07-24 2018-07-31 International Business Machines Corporation System and method for prioritization of rendering policies in virtual environments
US10699282B2 (en) * 2008-08-05 2020-06-30 International Business Machines Corporation Method and system for automatic optimal advertising determination within a virtual universe
US9256346B2 (en) 2008-08-11 2016-02-09 International Business Machines Corporation Managing ephemeral locations in a virtual universe
US10115113B2 (en) * 2008-08-11 2018-10-30 International Business Machines Corporation Immersive advertisements in a virtual universe
US20100036735A1 (en) * 2008-08-11 2010-02-11 International Business Machines Corporation Triggering immersive advertisements in a virtual universe
US8229796B2 (en) * 2008-08-28 2012-07-24 Microsoft Corporation Automated direct bids to purchase entertainment content upon a predetermined event
US9747621B1 (en) 2008-09-23 2017-08-29 Amazon Technologies, Inc. Widget-based integration of payment gateway functionality into transactional sites
US8347235B2 (en) 2008-09-26 2013-01-01 International Business Machines Corporation Method and system of providing information during content breakpoints in a virtual universe
US20100235254A1 (en) * 2009-03-16 2010-09-16 Payam Mirrashidi Application Products with In-Application Subsequent Feature Access Using Network-Based Distribution System
US20100235889A1 (en) * 2009-03-16 2010-09-16 Michael Kuohao Chu Application products with in-application subsequent feature access using network-based distribution system
US20100306825A1 (en) * 2009-05-27 2010-12-02 Lucid Ventures, Inc. System and method for facilitating user interaction with a simulated object associated with a physical location
US9729609B2 (en) * 2009-08-07 2017-08-08 Apple Inc. Automatic transport discovery for media submission
US8763090B2 (en) 2009-08-11 2014-06-24 Sony Computer Entertainment America Llc Management of ancillary content delivery and presentation
US8935217B2 (en) 2009-09-08 2015-01-13 Apple Inc. Digital asset validation prior to submission for network-based distribution
US8296568B2 (en) * 2009-10-27 2012-10-23 Google Inc. Systems and methods for authenticating an electronic transaction
US8594317B2 (en) * 2009-12-31 2013-11-26 Bce Inc. Method, communication device and computer-readable media for conveying an audio stream to a user of a communication device during an outgoing call
US9565217B2 (en) * 2009-12-31 2017-02-07 Bce Inc. Method, system, network and computer-readable media for controlling outgoing telephony calls
US10602241B2 (en) * 2009-12-31 2020-03-24 Bce Inc. Method, system network and computer-readable media for controlling outgoing telephony calls to cause initiation of call features
US8531992B2 (en) * 2009-12-31 2013-09-10 Bce Inc. Method, system, network and computer-readable media for controlling outgoing telephony calls to convey media messages to source devices
US8364959B2 (en) 2010-05-26 2013-01-29 Google Inc. Systems and methods for using a domain-specific security sandbox to facilitate secure transactions
US20130079145A1 (en) 2011-09-26 2013-03-28 Serena Lam Mobile device interface for online games
US9636584B2 (en) 2010-06-24 2017-05-02 Zynga Inc. Mobile device interface for online games
US8510658B2 (en) 2010-08-11 2013-08-13 Apple Inc. Population segmentation
US8744930B1 (en) 2011-04-04 2014-06-03 Google Inc. Transmission of product attribute with an indication that product has been purchased
US20130018700A1 (en) * 2011-07-14 2013-01-17 International Business Machines Corporation Optimizing product portfolios under customer choice
US9682315B1 (en) 2011-09-07 2017-06-20 Zynga Inc. Social surfacing and messaging interactions
US8506378B2 (en) 2011-09-21 2013-08-13 Igt Gaming system, gaming device, and method providing advertising messages to players based on a determination of a positive winning gaming session
US20130079131A1 (en) * 2011-09-26 2013-03-28 Serena Lam Mobile device interface for online games
US8460090B1 (en) 2012-01-20 2013-06-11 Igt Gaming system, gaming device, and method providing an estimated emotional state of a player based on the occurrence of one or more designated events
US8784190B2 (en) 2012-02-23 2014-07-22 Igt Gaming system and method providing optimized incentives to delay expected termination of a gaming session
US8834261B2 (en) 2012-02-23 2014-09-16 Igt Gaming system and method providing one or more incentives to delay expected termination of a gaming session
US9203624B2 (en) 2012-06-04 2015-12-01 Apple Inc. Authentication and notification heuristics
US10456686B2 (en) 2012-09-05 2019-10-29 Zynga Inc. Methods and systems for adaptive tuning of game events
US8821260B1 (en) 2012-11-06 2014-09-02 Kabam, Inc. System and method for granting in-game bonuses to a user
US8990188B2 (en) 2012-11-30 2015-03-24 Apple Inc. Managed assessment of submitted digital content
US9105178B2 (en) 2012-12-03 2015-08-11 Sony Computer Entertainment Inc. Remote dynamic configuration of telemetry reporting through regular expressions
US8790185B1 (en) 2012-12-04 2014-07-29 Kabam, Inc. Incentivized task completion using chance-based awards
US8920243B1 (en) 2013-01-02 2014-12-30 Kabam, Inc. System and method for providing in-game timed offers
US9087341B2 (en) 2013-01-11 2015-07-21 Apple Inc. Migration of feedback data to equivalent digital assets
US20140222512A1 (en) * 2013-02-01 2014-08-07 Goodsnitch, Inc. Receiving, tracking and analyzing business intelligence data
US20140279259A1 (en) * 2013-03-15 2014-09-18 Emerald Games Marketing Limited Method and apparatus for connecting vendors with customers through a virtual interface
US8831758B1 (en) 2013-03-20 2014-09-09 Kabam, Inc. Interface-based game-space contest generation
US9007189B1 (en) 2013-04-11 2015-04-14 Kabam, Inc. Providing leaderboard based upon in-game events
US9613179B1 (en) 2013-04-18 2017-04-04 Kabam, Inc. Method and system for providing an event space associated with a primary virtual space
US9626475B1 (en) 2013-04-18 2017-04-18 Kabam, Inc. Event-based currency
US10248970B1 (en) 2013-05-02 2019-04-02 Kabam, Inc. Virtual item promotions via time-period-based virtual item benefits
US8961319B1 (en) 2013-05-16 2015-02-24 Kabam, Inc. System and method for providing dynamic and static contest prize allocation based on in-game achievement of a user
US10789627B1 (en) 2013-05-20 2020-09-29 Kabam, Inc. System and method for pricing of virtual containers determined stochastically upon activation
US9138639B1 (en) 2013-06-04 2015-09-22 Kabam, Inc. System and method for providing in-game pricing relative to player statistics
US9463376B1 (en) 2013-06-14 2016-10-11 Kabam, Inc. Method and system for temporarily incentivizing user participation in a game space
US9737819B2 (en) 2013-07-23 2017-08-22 Kabam, Inc. System and method for a multi-prize mystery box that dynamically changes probabilities to ensure payout value
US11164200B1 (en) 2013-08-01 2021-11-02 Kabam, Inc. System and method for providing in-game offers
US9561433B1 (en) 2013-08-08 2017-02-07 Kabam, Inc. Providing event rewards to players in an online game
US9799059B1 (en) 2013-09-09 2017-10-24 Aftershock Services, Inc. System and method for adjusting the user cost associated with purchasable virtual items
US9799163B1 (en) 2013-09-16 2017-10-24 Aftershock Services, Inc. System and method for providing a currency multiplier item in an online game with a value based on a user's assets
US11058954B1 (en) 2013-10-01 2021-07-13 Electronic Arts Inc. System and method for implementing a secondary game within an online game
US10282739B1 (en) 2013-10-28 2019-05-07 Kabam, Inc. Comparative item price testing
US20150157929A1 (en) * 2013-12-11 2015-06-11 Activision Publishing, Inc. Videogame with e-commerce transaction support
US10482713B1 (en) 2013-12-31 2019-11-19 Kabam, Inc. System and method for facilitating a secondary game
US9508222B1 (en) 2014-01-24 2016-11-29 Kabam, Inc. Customized chance-based items
US10226691B1 (en) 2014-01-30 2019-03-12 Electronic Arts Inc. Automation of in-game purchases
US9873040B1 (en) 2014-01-31 2018-01-23 Aftershock Services, Inc. Facilitating an event across multiple online games
US9795885B1 (en) 2014-03-11 2017-10-24 Aftershock Services, Inc. Providing virtual containers across online games
US9517405B1 (en) 2014-03-12 2016-12-13 Kabam, Inc. Facilitating content access across online games
US9610503B2 (en) 2014-03-31 2017-04-04 Kabam, Inc. Placeholder items that can be exchanged for an item of value based on user performance
US9610493B1 (en) 2014-04-15 2017-04-04 Kabam, Inc. Method and system for facilitating chance-based in-game virtual item distribution
US10133996B2 (en) * 2014-04-22 2018-11-20 International Business Machines Corporation Object lifecycle analysis tool
US9675891B2 (en) 2014-04-29 2017-06-13 Aftershock Services, Inc. System and method for granting in-game bonuses to a user
US9744445B1 (en) 2014-05-15 2017-08-29 Kabam, Inc. System and method for providing awards to players of a game
US10307666B2 (en) 2014-06-05 2019-06-04 Kabam, Inc. System and method for rotating drop rates in a mystery box
US9744446B2 (en) 2014-05-20 2017-08-29 Kabam, Inc. Mystery boxes that adjust due to past spending behavior
US9717986B1 (en) 2014-06-19 2017-08-01 Kabam, Inc. System and method for providing a quest from a probability item bundle in an online game
US9452356B1 (en) 2014-06-30 2016-09-27 Kabam, Inc. System and method for providing virtual items to users of a virtual space
US9539502B1 (en) 2014-06-30 2017-01-10 Kabam, Inc. Method and system for facilitating chance-based payment for items in a game
US9579564B1 (en) * 2014-06-30 2017-02-28 Kabam, Inc. Double or nothing virtual containers
US20220215775A1 (en) * 2014-07-30 2022-07-07 Micah Kosstrin-Greenberg Hardware software complex for language teaching with ad support
US9724606B2 (en) 2014-09-09 2017-08-08 Zynga Inc. Systems and methods for indicating positions of selected symbols in a target sequence
US10561944B2 (en) 2014-09-10 2020-02-18 Zynga Inc. Adjusting object adaptive modification or game level difficulty and physical gestures through level definition files
US9675889B2 (en) 2014-09-10 2017-06-13 Zynga Inc. Systems and methods for determining game level attributes based on player skill level prior to game play in the level
US9757650B2 (en) 2014-09-10 2017-09-12 Zynga Inc. Sequencing and locations of selected virtual objects to trigger targeted game actions
US10463968B1 (en) 2014-09-24 2019-11-05 Kabam, Inc. Systems and methods for incentivizing participation in gameplay events in an online game
US9656174B1 (en) 2014-11-20 2017-05-23 Afterschock Services, Inc. Purchasable tournament multipliers
US9827499B2 (en) 2015-02-12 2017-11-28 Kabam, Inc. System and method for providing limited-time events to users in an online game
US10387478B2 (en) 2015-12-08 2019-08-20 Rhapsody International Inc. Graph-based music recommendation and dynamic media work micro-licensing systems and methods
US10423943B2 (en) 2015-12-08 2019-09-24 Rhapsody International Inc. Graph-based music recommendation and dynamic media work micro-licensing systems and methods
US11012532B2 (en) * 2016-03-09 2021-05-18 Sourcepoint Usa, Inc. Content blocker detection and circumvention
US10521255B2 (en) 2016-05-19 2019-12-31 International Business Machines Corporation Interface and interruption management
US10929380B2 (en) 2017-07-25 2021-02-23 Sap Se Definition of programmable conditions applicable to an operation
US11055288B2 (en) * 2017-07-25 2021-07-06 Sap Se Evaluation of programmable conditions applicable to an operation
WO2019023619A1 (en) 2017-07-28 2019-01-31 Active Implants LLC Floating joint replacement device with supportive sidewall
US11389735B2 (en) 2019-10-23 2022-07-19 Ganz Virtual pet system
US11358059B2 (en) 2020-05-27 2022-06-14 Ganz Live toy system

Citations (91)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4582324A (en) * 1984-01-04 1986-04-15 Bally Manufacturing Corporation Illusion of skill game machine for a gaming system
US4738451A (en) * 1986-05-20 1988-04-19 Atari Games Corporation Multi-player, multi-character cooperative play video game with independent player entry and departure
US4837728A (en) * 1984-01-25 1989-06-06 Igt Multiple progressive gaming system that freezes payouts at start of game
US4856787A (en) * 1986-02-05 1989-08-15 Yuri Itkis Concurrent game network
US5166886A (en) * 1989-07-31 1992-11-24 Molnar Charles E System to demonstrate and sell computer programs
US5242163A (en) * 1992-08-27 1993-09-07 D.D. Stud Inc. Casino game system
US5333868A (en) * 1993-03-01 1994-08-02 Simon Goldfarb Method of playing a game of chance at locations remote from the game site
US5351970A (en) * 1992-09-16 1994-10-04 Fioretti Philip R Methods and apparatus for playing bingo over a wide geographic area
US5431408A (en) * 1994-09-23 1995-07-11 Dd Stud, Inc. Card game with travelling wild card
US5497479A (en) * 1989-04-28 1996-03-05 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5624316A (en) * 1994-06-06 1997-04-29 Catapult Entertainment Inc. Video game enhancer with intergral modem and smart card interface
US5625690A (en) * 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5654746A (en) * 1994-12-01 1997-08-05 Scientific-Atlanta, Inc. Secure authorization and control method and apparatus for a game delivery service
US5655961A (en) * 1994-10-12 1997-08-12 Acres Gaming, Inc. Method for operating networked gaming devices
US5694546A (en) * 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
US5697844A (en) * 1986-03-10 1997-12-16 Response Reward Systems, L.C. System and method for playing games and rewarding successful players
US5708709A (en) * 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs
US5710887A (en) * 1995-08-29 1998-01-20 Broadvision Computer system and method for electronic commerce
US5715400A (en) * 1995-03-20 1998-02-03 International Business Machines Corporation System and method for providing merchant information and establishing links to merchants while presenting a movie
US5720663A (en) * 1994-12-02 1998-02-24 Namco Ltd. Game apparatus, image synthesizing method, and data storage medium
US5761648A (en) * 1995-07-25 1998-06-02 Interactive Coupon Network Interactive marketing network and process using electronic certificates
US5769716A (en) * 1996-09-30 1998-06-23 International Game Technology Symbol fall game method and apparatus
US5825883A (en) * 1995-10-31 1998-10-20 Interval Systems, Inc. Method and apparatus that accounts for usage of digital applications
US5855515A (en) * 1996-02-13 1999-01-05 International Game Technology Progressive gaming system
US5884029A (en) * 1996-11-14 1999-03-16 International Business Machines Corporation User interaction with intelligent virtual objects, avatars, which interact with other avatars controlled by different users
US5894320A (en) * 1996-05-29 1999-04-13 General Instrument Corporation Multi-channel television system with viewer-selectable video and audio
US5907617A (en) * 1995-06-07 1999-05-25 Digital River, Inc. Try before you buy software distribution and marketing system
US5956038A (en) * 1995-07-12 1999-09-21 Sony Corporation Three-dimensional virtual reality space sharing method and system, an information recording medium and method, an information transmission medium and method, an information processing method, a client terminal, and a shared server terminal
US5964660A (en) * 1997-06-18 1999-10-12 Vr-1, Inc. Network multiplayer game
US5970143A (en) * 1995-11-22 1999-10-19 Walker Asset Management Lp Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols
US5974454A (en) * 1997-11-14 1999-10-26 Microsoft Corporation Method and system for installing and updating program module components
US6007426A (en) * 1996-04-05 1999-12-28 Rlt Acquisitions, Inc. Skill based prize games for wide area networks
US6014651A (en) * 1993-11-04 2000-01-11 Crawford; Christopher M. Commercial online software distribution systems and methods using encryption for security
US6024643A (en) * 1997-03-04 2000-02-15 Intel Corporation Player profile based proxy play
US6024572A (en) * 1996-03-12 2000-02-15 Weyer; Frank M. Means for adding educational enhancements to computer games
US6036601A (en) * 1999-02-24 2000-03-14 Adaboy, Inc. Method for advertising over a computer network utilizing virtual environments of games
US6039648A (en) * 1997-03-04 2000-03-21 Casino Data Systems Automated tournament gaming system: apparatus and method
US6048269A (en) * 1993-01-22 2000-04-11 Mgm Grand, Inc. Coinless slot machine system and method
US6067582A (en) * 1996-08-13 2000-05-23 Angel Secure Networks, Inc. System for installing information related to a software application to a remote computer over a network
US6071191A (en) * 1995-11-22 2000-06-06 Nintendo Co., Ltd. Systems and methods for providing security in a video game system
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
US6120031A (en) * 1994-09-23 2000-09-19 D. D. Stud, Inc. Game with reservable wild indicia
US6139434A (en) * 1996-09-24 2000-10-31 Nintendo Co., Ltd. Three-dimensional image processing apparatus with enhanced automatic and user point of view control
US6139433A (en) * 1995-11-22 2000-10-31 Nintendo Co., Ltd. Video game system and method with enhanced three-dimensional character and background control due to environmental conditions
US6141010A (en) * 1998-07-17 2000-10-31 B. E. Technology, Llc Computer interface method and apparatus with targeted advertising
US6152824A (en) * 1997-03-06 2000-11-28 Mpath Interactive, Inc. Online gaming architecture
US6155926A (en) * 1995-11-22 2000-12-05 Nintendo Co., Ltd. Video game system and method with enhanced three-dimensional character and background control
US6157377A (en) * 1998-10-30 2000-12-05 Intel Corporation Method and apparatus for purchasing upgraded media features for programming transmissions
US6165071A (en) * 1997-05-20 2000-12-26 Casino Data Systems Method and apparatus for gaming in a series of sessions
US6179713B1 (en) * 1997-06-18 2001-01-30 Circadence Corporation Full-time turn based network multiplayer game
US6190257B1 (en) * 1995-11-22 2001-02-20 Nintendo Co., Ltd. Systems and method for providing security in a video game system
US6193607B1 (en) * 1996-06-18 2001-02-27 Silicon Gaming, Inc. Random number generator for electronic applications
US6210275B1 (en) * 1998-05-26 2001-04-03 Mikohn Gaming Corporation Progressive jackpot game with guaranteed winner
US6234897B1 (en) * 1997-04-23 2001-05-22 Wms Gaming Inc. Gaming device with variable bonus payout feature
US6241524B1 (en) * 1994-12-02 2001-06-05 Namco, Ltd. Video game apparatus and image synthesizing method thereof
US6244959B1 (en) * 1996-09-24 2001-06-12 Nintendo Co., Ltd. Three-dimensional image processing system with enhanced character control
US6267673B1 (en) * 1996-09-20 2001-07-31 Nintendo Co., Ltd. Video game system with state of next world dependent upon manner of entry from previous world via a portal
US6267669B1 (en) * 1999-11-29 2001-07-31 International Game Technology Hybrid gaming apparatus and method
US6270411B1 (en) * 1999-09-10 2001-08-07 Wms Gaming Inc. Gaming machine with animated reel symbols for payoff
US6273820B1 (en) * 1999-02-04 2001-08-14 Haste, Iii Thomas E. Virtual player gaming method
US6283857B1 (en) * 1996-09-24 2001-09-04 Nintendo Co., Ltd. Three-dimensional image processing apparatus with enhanced automatic and user point of view control
US6302790B1 (en) * 1998-02-19 2001-10-16 International Game Technology Audio visual output for a gaming device
US20010044339A1 (en) * 2000-02-17 2001-11-22 Angel Cordero Multi-player computer game, system and method
US6385592B1 (en) * 1996-08-20 2002-05-07 Big Media, Inc. System and method for delivering customized advertisements within interactive communication systems
US6383079B1 (en) * 1995-11-22 2002-05-07 Nintendo Co., Ltd. High performance/low cost video game system with multi-functional peripheral processing subsystem
US6406369B1 (en) * 2000-07-28 2002-06-18 Anthony J. Baerlocher Gaming device having a competition bonus scheme
US20020082065A1 (en) * 2000-12-26 2002-06-27 Fogel David B. Video game characters having evolving traits
US20020082077A1 (en) * 2000-12-26 2002-06-27 Johnson Douglas R. Interactive video game system with characters that evolve physical and cognitive traits
US6476830B1 (en) * 1996-08-02 2002-11-05 Fujitsu Software Corporation Virtual objects for building a community in a virtual world
US20020193162A1 (en) * 1996-04-22 2002-12-19 Walker Jay S. System and method for facilitating play of a video game via a web site
US20030078102A1 (en) * 2001-10-18 2003-04-24 Konami Corporation Video game system, video game apparatus and video game execution control method
US20030104854A1 (en) * 2001-12-05 2003-06-05 Cannon Lee E. Method and apparatus for competitive bonus games with a player as the house
US20030104860A1 (en) * 2001-11-30 2003-06-05 Anchor Gaming Method, apparatus and system for perpetual bonus game
US20030114219A1 (en) * 2001-12-19 2003-06-19 Mcclintic Monica A. Method and apparatus for an interactive bonus game
US20030114220A1 (en) * 2001-12-19 2003-06-19 Mcclintic Monica A. Gaming method, device, and system including adventure bonus game
US20030114218A1 (en) * 2001-12-19 2003-06-19 Mcclintic Monica A Method and apparatus for gaming machines with a quasi-competition play bonus feature
US20030119576A1 (en) * 2001-12-20 2003-06-26 Mcclintic Monica A. Gaming devices and methods incorporating interactive physical skill bonus games and virtual reality games in a shared bonus event
US20030119581A1 (en) * 2001-12-20 2003-06-26 Cannon Lee E. Method and apparatus for a player-controllable bonus game
US20030119573A1 (en) * 2001-12-21 2003-06-26 Mcclintic Monica A. Gaming method, device, and system including trivia-based bonus game
US20030125103A1 (en) * 2001-12-31 2003-07-03 Tessmer Michael T. Method and apparatus for providing an advantage to a player in a bonus game
US20030125107A1 (en) * 2001-12-21 2003-07-03 Cannon Lee E. Method and apparatus for competitive bonus games based upon strategy or skill
US20030125100A1 (en) * 2002-01-02 2003-07-03 Cannon Lee E. Competitive, matrix type game, play thereof as a bonus event to a primary game, and apparatus and systems for implementing the game
US6616533B1 (en) * 2000-05-31 2003-09-09 Intel Corporation Providing advertising with video games
US20040148221A1 (en) * 2003-01-24 2004-07-29 Viva Chu Online game advertising system
US20040177007A1 (en) * 2003-03-03 2004-09-09 Van Luchene Andrew S. Premium product access system for performance in a video game
US20040181456A1 (en) * 2003-03-10 2004-09-16 Kunihiko Matsumori Personal shopping data service system using extended gaming machine memory module
US20050045025A1 (en) * 2003-08-25 2005-03-03 Wells Robert V. Video game system and method
US20050096134A1 (en) * 2003-11-03 2005-05-05 Lippincott Louis A. Gaming interface techniques for media centers
US6928414B1 (en) * 2000-04-12 2005-08-09 Jae Heon Kim Advertisement method using game program on the internet and method for executing the game program having the advertisement according to the advertisement method
US7749089B1 (en) * 1999-02-26 2010-07-06 Creative Kingdoms, Llc Multi-media interactive play system

Family Cites Families (295)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2141907A (en) * 1983-06-02 1985-01-03 Michael Gilmore Video games with advertising facility
US5644727A (en) 1987-04-15 1997-07-01 Proprietary Financial Products, Inc. System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
US5557518A (en) 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
US6134536A (en) 1992-05-29 2000-10-17 Swychco Infrastructure Services Pty Ltd. Methods and apparatus relating to the formulation and trading of risk management contracts
US5970479A (en) 1992-05-29 1999-10-19 Swychco Infrastructure Services Pty. Ltd. Methods and apparatus relating to the formulation and trading of risk management contracts
DE69329949T2 (en) 1992-12-09 2001-06-07 Discovery Communicat Inc NETWORK CONTROL FOR CABLE TV DISTRIBUTION SYSTEMS
US6131085A (en) 1993-05-21 2000-10-10 Rossides; Michael T Answer collection and retrieval system governed by a pay-off meter
US6267670B1 (en) 1997-03-21 2001-07-31 Walker Digital, Llc System and method for performing lottery ticket transactions utilizing point-of-sale terminals
US6119099A (en) 1997-03-21 2000-09-12 Walker Asset Management Limited Partnership Method and system for processing supplementary product sales at a point-of-sale terminal
US5418713A (en) 1993-08-05 1995-05-23 Allen; Richard Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials
US5665952A (en) 1993-09-07 1997-09-09 Ziarno; Witold A. Method of streamlining the acknowledgement of a multiplicity of contribution or gift commitments made at a plurality of remote locations to distinct fund-raising organizations and gift recipients and system therefor
US6092052A (en) 1993-09-07 2000-07-18 Ziarno; Witold A. Method of maximizing statistical data throughput at remotely located electronic donation processing devices, and electronic device for managing statistical information
US6012982A (en) 1994-02-22 2000-01-11 Sigma Game Inc. Bonus award feature in linked gaming machines having a common feature controller
US5873068A (en) 1994-06-14 1999-02-16 New North Media Inc. Display based marketing message control system and method
US5948040A (en) 1994-06-24 1999-09-07 Delorme Publishing Co. Travel reservation information and planning system
US5809482A (en) 1994-09-01 1998-09-15 Harrah's Operating Company, Inc. System for the tracking and management of transactions in a pit area of a gaming establishment
US6089978A (en) 1994-09-23 2000-07-18 Anchor Gaming Method of playing game and gaming games with an additional payout indicator
US5823874A (en) 1994-09-23 1998-10-20 Anchor Gaming Method of playing game and gaming device with an additional payout indicator
US5848932A (en) 1994-09-23 1998-12-15 Anchor Gaming Method of playing game and gaming games with an additional payout indicator
US5663547A (en) 1994-10-05 1997-09-02 Ziarno; Witold A. Method of fund-raising with a keyless contribution and gift commitment management device
US5752238A (en) 1994-11-03 1998-05-12 Intel Corporation Consumer-driven electronic information pricing mechanism
WO1996015505A2 (en) 1994-11-08 1996-05-23 Vermeer Technologies, Inc. An online service development tool with fee setting capabilities
US6865551B1 (en) 1994-11-23 2005-03-08 Contentguard Holdings, Inc. Removable content repositories
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US6963859B2 (en) 1994-11-23 2005-11-08 Contentguard Holdings, Inc. Content rendering repository
DE4445847A1 (en) 1994-12-22 1996-06-27 Sel Alcatel Ag Process for selling data records and vending machine, storage device and chip card therefor and sales system for telecommunications software therewith
JPH08214281A (en) 1995-02-06 1996-08-20 Sony Corp Charging method and system
DE69637799D1 (en) 1995-02-13 2009-02-12 Intertrust Tech Corp Systems and procedures for secure transaction management and electronic legal protection
US5765143A (en) 1995-02-28 1998-06-09 Triad Systems Corporation Method and system for inventory management
US6796492B1 (en) 1995-04-13 2004-09-28 James G. Gatto Electronic fund transfer or transaction system
US5963914A (en) 1995-04-17 1999-10-05 Skinner; Gary R. Network time and work tracker
US5845265A (en) 1995-04-26 1998-12-01 Mercexchange, L.L.C. Consignment nodes
US7937312B1 (en) 1995-04-26 2011-05-03 Ebay Inc. Facilitating electronic commerce transactions through binding offers
US6363164B1 (en) 1996-05-13 2002-03-26 Cummins-Allison Corp. Automated document processing system using full image scanning
US5779544A (en) 1995-06-07 1998-07-14 Atlantic City Coin & Slot Service Company, Inc. Combined slot machine and racing game
US5745886A (en) 1995-06-07 1998-04-28 Citibank, N.A. Trusted agents for open distribution of electronic money
US5560603A (en) 1995-06-07 1996-10-01 Atlantic City Coin & Slot Service Company, Inc. Combined slot machine and racing game
US5664998A (en) 1995-06-07 1997-09-09 Atlantic City Coin & Slot Service Co., Inc. Combined slot machine and racing game
DE69610582T2 (en) 1995-06-16 2001-05-31 Seiko Epson Corp Input device
JPH0944576A (en) 1995-08-02 1997-02-14 Hitachi Ltd Electronic purse lending system
US5826244A (en) 1995-08-23 1998-10-20 Xerox Corporation Method and system for providing a document service over a computer network using an automated brokered auction
US6807534B1 (en) 1995-10-13 2004-10-19 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5794210A (en) 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage
US5983196A (en) 1995-12-19 1999-11-09 Phoneworks, Inc. Interactive computerized methods and apparatus for conducting an incentive awards program
US5918213A (en) 1995-12-22 1999-06-29 Mci Communications Corporation System and method for automated remote previewing and purchasing of music, video, software, and other multimedia products
EP0880840A4 (en) 1996-01-11 2002-10-23 Mrj Inc System for controlling access and distribution of digital property
US6055518A (en) 1996-02-01 2000-04-25 At&T Corporation Secure auction systems
US5890135A (en) 1996-02-20 1999-03-30 Powell; Ken R. System and method for displaying product information in a retail system
JPH09231276A (en) 1996-02-27 1997-09-05 Canon Inc Charging device, communication device, and communication system
US6671675B2 (en) 1996-02-27 2003-12-30 Canon Kabushiki Kaisha Metering the flow of electronic information
US5855006A (en) 1996-03-01 1998-12-29 Humware Personal activity scheduling apparatus
US6505174B1 (en) 1996-03-25 2003-01-07 Hsx, Inc. Computer-implemented securities trading system with a virtual specialist function
US6044360A (en) 1996-04-16 2000-03-28 Picciallo; Michael J. Third party credit card
US5876284A (en) 1996-05-13 1999-03-02 Acres Gaming Incorporated Method and apparatus for implementing a jackpot bonus on a network of gaming devices
GB9610645D0 (en) 1996-05-21 1996-07-31 Ncr Int Inc Financial transaction system
US6907405B2 (en) 1996-05-23 2005-06-14 Ita Investments, Llc Computer controlled priority right auctioning system
US7747507B2 (en) 1996-05-23 2010-06-29 Ticketmaster L.L.C. Computer controlled auction system
US5761647A (en) 1996-05-24 1998-06-02 Harrah's Operating Company, Inc. National customer recognition system and method
US6026379A (en) 1996-06-17 2000-02-15 Verifone, Inc. System, method and article of manufacture for managing transactions in a high availability system
US5812668A (en) 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
US6178409B1 (en) 1996-06-17 2001-01-23 Verifone, Inc. System, method and article of manufacture for multiple-entry point virtual point of sale architecture
US6324525B1 (en) 1996-06-17 2001-11-27 Hewlett-Packard Company Settlement of aggregated electronic transactions over a network
US5903874A (en) 1996-06-27 1999-05-11 Mci Communications Corporation System and method for electronic coupon management
US5915243A (en) 1996-08-29 1999-06-22 Smolen; Daniel T. Method and apparatus for delivering consumer promotions
US6240396B1 (en) 1996-09-04 2001-05-29 Priceline.Com Incorporated Conditional purchase offer management system for event tickets
US5930767A (en) 1997-05-28 1999-07-27 Motorola, Inc. Transaction methods systems and devices
US5930762A (en) 1996-09-24 1999-07-27 Rco Software Limited Computer aided risk management in multiple-parameter physical systems
US5882261A (en) 1996-09-30 1999-03-16 Anchor Gaming Method of playing game and gaming device with at least one additional payout indicator
US6026381A (en) 1996-11-05 2000-02-15 Itx Corporation Financial market classification system
US5903652A (en) 1996-11-25 1999-05-11 Microsoft Corporation System and apparatus for monitoring secure information in a computer network
JPH10171879A (en) 1996-12-06 1998-06-26 Purosupaa Kurieiteibu:Kk Merchandise sales system, and information communication method and storage medium for the same system
US7140964B2 (en) 1997-06-23 2006-11-28 Walker Digital, Llc Gaming device for a flat rate play session and a method of operating same
US6073124A (en) 1997-01-29 2000-06-06 Shopnow.Com Inc. Method and system for securely incorporating electronic information into an online purchasing application
US6216111B1 (en) 1997-03-19 2001-04-10 Walker Digital, Llc System and method for telemarketing presentations
US6085178A (en) 1997-03-21 2000-07-04 International Business Machines Corporation Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages
US6363364B1 (en) 1997-03-26 2002-03-26 Pierre H. Nel Interactive system for and method of performing financial transactions from a user base
US6078901A (en) 1997-04-03 2000-06-20 Ching; Hugh Quantitative supply and demand model based on infinite spreadsheet
US5907831A (en) 1997-04-04 1999-05-25 Lotvin; Mikhail Computer apparatus and methods supporting different categories of users
US6233564B1 (en) 1997-04-04 2001-05-15 In-Store Media Systems, Inc. Merchandising using consumer information from surveys
US5895454A (en) 1997-04-17 1999-04-20 Harrington; Juliette Integrated interface for vendor/product oriented internet websites
US6829595B2 (en) 1997-06-27 2004-12-07 Valista, Inc. MicroTrac internet billing solutions
US6018724A (en) 1997-06-30 2000-01-25 Sun Micorsystems, Inc. Method and apparatus for authenticating on-line transaction data
US6012045A (en) 1997-07-01 2000-01-04 Barzilai; Nizan Computer-based electronic bid, auction and sale system, and a system to teach new/non-registered customers how bidding, auction purchasing works
US5970470A (en) 1997-07-08 1999-10-19 Walker Asset Management Limited Partnership System and method for establishing and managing subscription purchase agreements including commitments to purchase goods over time at agreed upon prices
FR2765988B1 (en) 1997-07-09 1999-08-27 Infomil CASH COMPUTING DEVICE, METHOD AND SYSTEM FOR AUTOMATICALLY DELIVERING BUSINESS BENEFIT TICKETS
US6058379A (en) 1997-07-11 2000-05-02 Auction Source, L.L.C. Real-time network exchange with seller specified exchange parameters and interactive seller participation
US6199046B1 (en) 1997-07-29 2001-03-06 Adsura Pty Ltd. Method system and article of manufacture for performing real time currency conversion
EP0895148B1 (en) 1997-07-31 2003-09-17 Siemens Aktiengesellschaft Software rental system and method for renting software
US6119096A (en) 1997-07-31 2000-09-12 Eyeticket Corporation System and method for aircraft passenger check-in and boarding using iris recognition
AU8763198A (en) 1997-08-01 1999-02-22 Ric Marshall Entreprise simulation module
US6553404B2 (en) 1997-08-08 2003-04-22 Prn Corporation Digital system
US6856966B1 (en) 1997-08-08 2005-02-15 Seta Corporation Product delivery methods
US6135884A (en) 1997-08-08 2000-10-24 International Game Technology Gaming machine having secondary display for providing video content
JPH1153184A (en) 1997-08-08 1999-02-26 Seta:Kk Data distribution method and device
US6003014A (en) 1997-08-22 1999-12-14 Visa International Service Association Method and apparatus for acquiring access using a smart card
US5987430A (en) 1997-08-28 1999-11-16 Atcom, Inc. Communications network connection system and method
US6233567B1 (en) 1997-08-29 2001-05-15 Intel Corporation Method and apparatus for software licensing electronically distributed programs
US6128599A (en) * 1997-10-09 2000-10-03 Walker Asset Management Limited Partnership Method and apparatus for processing customized group reward offers
US6089976A (en) 1997-10-14 2000-07-18 Casino Data Systems Gaming apparatus and method including a player interactive bonus game
JPH11114217A (en) 1997-10-15 1999-04-27 Daiichikosho Co Ltd Computer game apparatus
US6009410A (en) 1997-10-16 1999-12-28 At&T Corporation Method and system for presenting customized advertising to a user on the world wide web
US6061660A (en) 1997-10-20 2000-05-09 York Eggleston System and method for incentive programs and award fulfillment
US6146273A (en) 1997-10-24 2000-11-14 Mikohn Gaming Corporation Progressive jackpot gaming system with secret bonus pool
US6393409B2 (en) 1997-10-31 2002-05-21 Morgan Stanley Dean Witter & Co. Computer method and apparatus for optimizing portfolios of multiple participants
US6049778A (en) 1997-10-31 2000-04-11 Walker Asset Management Limited Partnership Method and apparatus for administering a reward program
US6266647B1 (en) 1997-11-03 2001-07-24 Xtec, Incorporated Methods and apparatus for electronically storing and retrieving value information on a portable card
FR2771875B1 (en) 1997-11-04 2000-04-14 Gilles Jean Antoine Kremer METHOD FOR TRANSMITTING INFORMATION AND COMPUTER SERVER IMPLEMENTING IT
US7092914B1 (en) 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6112181A (en) 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6339765B1 (en) 1997-11-13 2002-01-15 At&T Corp. Method and apparatus for defining private currencies
CA2221075C (en) 1997-11-14 2006-02-07 Meiji Milk Products Co., Ltd. Use of aminoalcohol derivatives in the treatment of liver disease
US5980384A (en) 1997-12-02 1999-11-09 Barrie; Robert P. Gaming apparatus and method having an integrated first and second game
EP0921487A3 (en) 1997-12-08 2000-07-26 Nippon Telegraph and Telephone Corporation Method and system for billing on the internet
US6208974B1 (en) 1997-12-30 2001-03-27 Medical Management International, Inc. Method and system for managing wellness plans for a medical care practice
US5960406A (en) 1998-01-22 1999-09-28 Ecal, Corp. Scheduling system for use between users on the web
US5907275A (en) 1998-01-30 1999-05-25 Battistini; Michael Order communication system for restaurant
US6385596B1 (en) 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6108644A (en) 1998-02-19 2000-08-22 At&T Corp. System and method for electronic transactions
US6591250B1 (en) 1998-02-23 2003-07-08 Genetic Anomalies, Inc. System and method for managing virtual property
US6216110B1 (en) 1998-02-27 2001-04-10 Microsoft Corporation System and method for publishing calendar information to a publicly accessible location
US6081790A (en) 1998-03-20 2000-06-27 Citibank, N.A. System and method for secure presentment and payment over open networks
US6049779A (en) 1998-04-06 2000-04-11 Berkson; Stephen P. Call center incentive system and method
JP4064060B2 (en) 1998-05-15 2008-03-19 ユニキャスト・コミュニケーションズ・コーポレイション Technology for implementing network-distributed interstitial web advertisements that are initiated by the browser and invisible to the user using ad tags embedded in reference web pages
US6169976B1 (en) 1998-07-02 2001-01-02 Encommerce, Inc. Method and apparatus for regulating the use of licensed products
US6067532A (en) 1998-07-14 2000-05-23 American Express Travel Related Services Company Inc. Ticket redistribution system
US6968405B1 (en) 1998-07-24 2005-11-22 Aristocrat Leisure Industries Pty Limited Input/Output Interface and device abstraction
EP0980052B1 (en) 1998-08-12 2006-07-12 Nippon Telegraph and Telephone Corporation Recording medium with electronic ticket definitions recorded thereon and electronic ticket processing methods and apparatuses
US6389403B1 (en) 1998-08-13 2002-05-14 International Business Machines Corporation Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system
US6859791B1 (en) 1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region
US6611812B2 (en) 1998-08-13 2003-08-26 International Business Machines Corporation Secure electronic content distribution on CDS and DVDs
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6928413B1 (en) 1998-09-11 2005-08-09 L.V. Partners, L.P. Method of product promotion
US6493682B1 (en) 1998-09-15 2002-12-10 Pendelton Trading Systems, Inc. Optimal order choice: evaluating uncertain discounted trading alternatives
US6937993B1 (en) 1998-09-16 2005-08-30 Mci, Inc. System and method for processing and tracking telecommunications service orders
US6418417B1 (en) 1998-10-08 2002-07-09 Strategic Weather Services System, method, and computer program product for valuating weather-based financial instruments
US6327569B1 (en) 1998-10-15 2001-12-04 Milestone Technology, Inc. System and methods for real time linkage between harvest environment and marketplace
US6820063B1 (en) 1998-10-26 2004-11-16 Microsoft Corporation Controlling access to content based on certificates and access predicates
US6741967B1 (en) 1998-11-02 2004-05-25 Vividence Corporation Full service research bureau and test center method and apparatus
US6327570B1 (en) 1998-11-06 2001-12-04 Dian Stevens Personal business service system and method
US6473740B2 (en) 1998-11-29 2002-10-29 Qpass, Inc. Electronic commerce using a transaction network
US6308159B1 (en) 1998-12-11 2001-10-23 At&T Corporation Method and apparatus for ticket turn-back capability
US6496808B1 (en) 1998-12-22 2002-12-17 At&T Corp. Using smartcards to enable probabilistic transaction on an untrusted device
US6003021A (en) 1998-12-22 1999-12-14 Ac Properties B.V. System, method and article of manufacture for a simulation system for goal based education
US6233566B1 (en) 1998-12-31 2001-05-15 Ultraprise Corporation System, method and computer program product for online financial products trading
US6327573B1 (en) 1998-12-31 2001-12-04 Walker Digital, Llc Multiple party reward system utilizing single account
US6236977B1 (en) 1999-01-04 2001-05-22 Realty One, Inc. Computer implemented marketing system
US6240397B1 (en) 1999-02-17 2001-05-29 Arye Sachs Method for transferring, receiving and utilizing electronic gift certificates
US6317718B1 (en) 1999-02-26 2001-11-13 Accenture Properties (2) B.V. System, method and article of manufacture for location-based filtering for shopping agent in the physical world
US6260019B1 (en) 1999-03-05 2001-07-10 Predict It Corporation Web-based prediction marketplace
US6223165B1 (en) 1999-03-22 2001-04-24 Keen.Com, Incorporated Method and apparatus to connect consumer to expert
US7103574B1 (en) 1999-03-27 2006-09-05 Microsoft Corporation Enforcement architecture and method for digital rights management
US6907034B1 (en) 1999-04-08 2005-06-14 Intel Corporation Out-of-band signaling for network based computer session synchronization
US6882985B1 (en) 1999-04-08 2005-04-19 Alan F. Kay Marketplace system fees enhancing market share and participation
US6904610B1 (en) 1999-04-15 2005-06-07 Sedna Patent Services, Llc Server-centric customized interactive program guide in an interactive television environment
WO2000065514A2 (en) 1999-04-27 2000-11-02 I3E Holdings, Llc Remote ordering system
JP3977549B2 (en) 1999-04-30 2007-09-19 株式会社東芝 Content management method, content usage management system, content usage management device, and playback device
US6609113B1 (en) 1999-05-03 2003-08-19 The Chase Manhattan Bank Method and system for processing internet payments using the electronic funds transfer network
US6938244B1 (en) 1999-05-11 2005-08-30 Microsoft Corp. Interlaced protocol for smart card application development
US7165046B2 (en) 2000-05-18 2007-01-16 Efficient Auctions Llc System and method for an efficient dynamic multi-unit auction
US6901383B1 (en) 1999-05-20 2005-05-31 Ameritrade Holding Corporation Stock purchase indices
AUPQ363299A0 (en) 1999-10-25 1999-11-18 Silverbrook Research Pty Ltd Paper based information inter face
US6519571B1 (en) 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US6937997B1 (en) 1999-06-02 2005-08-30 Eastman Kodak Company Configuring and purchasing imaging devices
FR2794595B1 (en) 1999-06-03 2002-03-15 Gemplus Card Int PRE-CHECKING A PROGRAM IN AN ADDITIONAL CHIP CARD OF A TERMINAL
US7249097B2 (en) 1999-06-18 2007-07-24 Echarge Corporation Method for ordering goods, services, and content over an internetwork using a virtual payment account
US6941270B1 (en) 1999-06-21 2005-09-06 Nokia Corporation Apparatus, and associated method, for loading a mobile terminal with an application program installed at a peer device
EP1224587A4 (en) 1999-06-23 2006-01-18 Richard Postrel System for electronic barter, trading and redeeming points accumulated in frequent use reward programs
US20050080727A1 (en) 1999-06-23 2005-04-14 Richard Postrel Method and system for using reward points to liquidate products
US7765124B2 (en) 1999-06-23 2010-07-27 Signature Systems Llc Method and system for issuing, aggregating and redeeming merchant rewards with an issuing bank
US6978253B2 (en) 1999-06-29 2005-12-20 Lin Wayne W Systems and methods for transacting business over a global communications network such as the internet
US6934692B1 (en) 1999-07-06 2005-08-23 Dana B. Duncan On-line interactive system and method for transacting business
US6321212B1 (en) 1999-07-21 2001-11-20 Longitude, Inc. Financial products having a demand-based, adjustable return, and trading exchange therefor
US6834272B1 (en) 1999-08-10 2004-12-21 Yeda Research And Development Company Ltd. Privacy preserving negotiation and computation
AU718243B3 (en) 1999-08-20 2000-04-13 Bgi Australia Pty Ltd Gaming machine with special multiple outcome feature
US6631359B1 (en) 1999-09-10 2003-10-07 Dphi Acquisitions, Inc. Writeable medium access control using a medium writeable area
WO2001018703A1 (en) 1999-09-10 2001-03-15 Portogo, Inc. Systems and method for insuring correct data transmission over the internet
US6847938B1 (en) 1999-09-20 2005-01-25 Donna R. Moore Method of exchanging goods over the internet
US6868394B1 (en) 1999-09-21 2005-03-15 Daniel Mele Method and apparatus for simplified artist-buyer transactions
CN100382583C (en) 1999-09-24 2008-04-16 联合视频制品公司 Interactive television program guide with enhanced user interface
US6839680B1 (en) 1999-09-30 2005-01-04 Fujitsu Limited Internet profiling
US7022905B1 (en) 1999-10-18 2006-04-04 Microsoft Corporation Classification of information and use of classifications in searching and retrieval of information
US6856967B1 (en) 1999-10-21 2005-02-15 Mercexchange, Llc Generating and navigating streaming dynamic pricing information
US6970850B1 (en) 1999-10-27 2005-11-29 Automated Business Companies Proximity service provider system
US6571221B1 (en) 1999-11-03 2003-05-27 Wayport, Inc. Network communication service with an improved subscriber model using digital certificates
AUPQ385999A0 (en) 1999-11-04 1999-11-25 Aristocrat Leisure Industries Pty Ltd Gaming machine with eligibility for participation in features
US6374228B1 (en) 1999-11-10 2002-04-16 Robert Litwin Rebate advertising system in use with moving objects
US6532448B1 (en) 1999-11-19 2003-03-11 Insightful Corporation Contest server
US6581039B2 (en) 1999-11-23 2003-06-17 Accenture Llp Report searching in a merger and acquisition environment
AU4508001A (en) 1999-11-29 2001-06-18 Microsoft Corporation System and method for flexible micropayment of low value electronic assets
AU2072601A (en) 1999-12-09 2001-06-18 Zephyr Media, Inc. System and method for integration of a universally publicly accessible global network
US6850901B1 (en) 1999-12-17 2005-02-01 World Theatre, Inc. System and method permitting customers to order products from multiple participating merchants
US6832230B1 (en) 1999-12-22 2004-12-14 Nokia Corporation Apparatus and associated method for downloading an application with a variable lifetime to a mobile terminal
US6629081B1 (en) 1999-12-22 2003-09-30 Accenture Llp Account settlement and financing in an e-commerce environment
US6915269B1 (en) 1999-12-23 2005-07-05 Decisionsorter Llc System and method for facilitating bilateral and multilateral decision-making
US6446045B1 (en) 2000-01-10 2002-09-03 Lucinda Stone Method for using computers to facilitate and control the creating of a plurality of functions
US6578008B1 (en) 2000-01-12 2003-06-10 Aaron R. Chacker Method and system for an online talent business
US6571216B1 (en) 2000-01-14 2003-05-27 International Business Machines Corporation Differential rewards with dynamic user profiling
US6912503B1 (en) 2000-01-14 2005-06-28 Gilbarco Inc. Multistage data purchase with mobile information ordering and docking station receipt
US7328189B2 (en) 2000-01-26 2008-02-05 Paybyclick Corporation Method and apparatus for conducting electronic commerce transactions using electronic tokens
US6985876B1 (en) 2000-02-07 2006-01-10 National Instruments Corporation System and method for enabling a user of an E-commerce system to visually view and/or configure a product for purchase
US6587835B1 (en) 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US6907400B1 (en) 2000-02-18 2005-06-14 Ncr Corporation Promotion apparatus and method
KR100505281B1 (en) 2000-02-18 2005-08-04 (주)아이콤 소프트 A video game launching server and a video game system and a method using a video game launching server on the network
US6484148B1 (en) 2000-02-19 2002-11-19 John E. Boyd Electronic advertising device and method of using the same
US6834269B1 (en) 2000-02-23 2004-12-21 Dell Products L.P. Factory-installed software purchase verification key
US6944596B1 (en) 2000-02-23 2005-09-13 Accenture Llp Employee analysis based on results of an education business simulation
US6915272B1 (en) 2000-02-23 2005-07-05 Nokia Corporation System and method of secure payment and delivery of goods and services
TW550477B (en) 2000-03-01 2003-09-01 Passgate Corp Method, system and computer readable medium for Web site account and e-commerce management from a central location
US6928420B1 (en) 2000-03-30 2005-08-09 Fujitsu Limited Automated transaction apparatus
US6856975B1 (en) 2000-03-30 2005-02-15 Verify & Protect Inc. System, method, and article of manufacture for secure transactions utilizing a computer network
US6581044B1 (en) 2000-06-12 2003-06-17 Sun Microsystems, Inc. Method and apparatus for encoding license parameters within a license number for authentication purposes
US7699699B2 (en) 2000-06-23 2010-04-20 Igt Gaming device having multiple selectable display interfaces based on player's wagers
US6941353B1 (en) 2000-06-29 2005-09-06 Auran Holdings Pty Ltd E-commerce system and method relating to program objects
US20050146745A1 (en) 2000-07-06 2005-07-07 Junichi Umehara Direct electronic business transaction
US6842737B1 (en) 2000-07-19 2005-01-11 Ijet Travel Intelligence, Inc. Travel information method and associated system
US6895381B1 (en) 2000-08-01 2005-05-17 International Business Machines Corporation Method and system for management of a wait list for reserved purchases
US6836765B1 (en) 2000-08-30 2004-12-28 Lester Sussman System and method for secure and address verifiable electronic commerce transactions
US6675152B1 (en) 2000-09-13 2004-01-06 Igt Transaction signature
US6774908B2 (en) 2000-10-03 2004-08-10 Creative Frontier Inc. System and method for tracking an object in a video and linking information thereto
US6579179B2 (en) 2000-10-13 2003-06-17 Igt Gaming device having a cash out menu screen and a system and method for enabling a player to retrieve money from a gaming device
US6892182B1 (en) 2000-10-16 2005-05-10 Igt Method and apparatus for ticket generation and accounting
US6904410B1 (en) 2000-11-02 2005-06-07 Haveneed.Com, Inc. Online method and system for management of collectibles
US6889209B1 (en) 2000-11-03 2005-05-03 Shieldip, Inc. Method and apparatus for protecting information and privacy
US6385590B1 (en) 2000-11-22 2002-05-07 Philip Levine Method and system for determining the effectiveness of a stimulus
US6856968B2 (en) 2000-12-27 2005-02-15 General Electric Company Interactive search process for product inquiries
JP2002329095A (en) 2001-02-26 2002-11-15 Futoshi Kamiyama Advertisement proxy method and advertisement proxy mediation system
US6925469B2 (en) 2001-03-30 2005-08-02 Intertainer, Inc. Digital entertainment service platform
JP2002312659A (en) 2001-04-13 2002-10-25 Inter Communications:Kk Point server system using serial number
NL1018477C2 (en) 2001-07-06 2003-01-17 Lely Entpr Ag Assembly of several game computers, game computer, carrier for a computer game, method for promoting the sale of game computers and / or computer games.
EP1415307A2 (en) 2001-08-06 2004-05-06 Mercury Interactive Corporation System and method for automated analysis of load testing results
US6834794B2 (en) 2001-08-23 2004-12-28 Stanley P. Dabrowski Method and apparatus for autonomous validation of issued scrip media
US20030050109A1 (en) 2001-09-07 2003-03-13 Gerard Caro On-line combined optional instant and future draw game of chance and method of playing same
US20030074323A1 (en) 2001-10-02 2003-04-17 Koninklijke Philips Electronics N.V. Business model for downloadable video games
US20030073471A1 (en) 2001-10-17 2003-04-17 Advantage Partners Llc Method and system for providing an environment for the delivery of interactive gaming services
FR2833446B1 (en) 2001-12-12 2004-04-09 Viaccess Sa PROTOCOL FOR CONTROLLING THE MODE OF ACCESSING DATA TRANSMITTED IN POINT TO POINT OR POINT MULTI-POINT MODE
US6871192B2 (en) 2001-12-20 2005-03-22 Pace Anti-Piracy System and method for preventing unauthorized use of protected software utilizing a portable security device
US8589568B2 (en) 2001-12-21 2013-11-19 International Business Machines Corporation Method and system for secure handling of electronic business transactions on the internet
US20030125102A1 (en) 2001-12-31 2003-07-03 Cannon Lee E. Method and apparatus for strategic play of a slot machine
US20050116951A1 (en) 2002-01-07 2005-06-02 Peter Stephenson Using runs of cells to traverse a ray through a volume
EP1479212A1 (en) 2002-02-18 2004-11-24 Gemplus Device and method for intermediation between service providers and their users
US20050108252A1 (en) 2002-03-19 2005-05-19 Pfaltz John L. Incremental process system and computer useable medium for extracting logical implications from relational data based on generators and faces of closed sets
US7666078B2 (en) 2002-05-07 2010-02-23 Future Logic, Inc. Financial transaction printer with promotional printing capabilities
GB0212308D0 (en) 2002-05-28 2002-07-10 Symbian Ltd Trusted user interface for a secure mobile wireless device
US6942569B2 (en) 2002-06-11 2005-09-13 Anthony Petracca Drawing for winners over the internet using receipts and zipcodes
US20050080911A1 (en) 2002-09-17 2005-04-14 Stiers Todd A. System and method for the packaging and distribution of data
AU2003280529B2 (en) 2002-11-29 2005-04-28 Ichihime Shoji Co., Ltd. Service points liquidation system
JP4272917B2 (en) 2003-04-01 2009-06-03 株式会社アドバンス Tooth sway measuring instrument
US7110792B2 (en) 2003-05-19 2006-09-19 Einar Rosenberg Apparatus and method for increased security of wireless transactions
US20050102216A1 (en) 2003-08-14 2005-05-12 Glenn Ballman An Electronic Order Book with Security Rights
US20050096123A1 (en) 2003-09-11 2005-05-05 Cregan Karen M. Gaming device with secondary selection game in which the number of selections are based on multiple components of the wager in primary game
AU2004212529B2 (en) 2003-09-24 2009-09-10 Aristocrat Technologies Australia Pty Ltd Interactive feature game
US20050182681A1 (en) 2003-09-25 2005-08-18 Bruskotter Thomas P. Money dispensing system
US8556707B2 (en) 2003-10-01 2013-10-15 Global Cash Access, Inc. Multi-function cashless gaming ATM
US20050125363A1 (en) 2003-10-16 2005-06-09 Wilson Charles E. System and method for authorizing transactions
US8388440B2 (en) 2003-10-20 2013-03-05 Sony Computer Entertainment America Llc Network account linking
US20050149855A1 (en) 2003-10-21 2005-07-07 Loo Rose P. Graphical scratchpad
US20050091133A1 (en) 2003-10-23 2005-04-28 Glenn Ballman A System and method for creating a capitalization table of a company
US20050177427A1 (en) 2003-10-27 2005-08-11 Jeff Mount Incentives based upon active key sniffing
WO2005042110A2 (en) 2003-10-29 2005-05-12 Interactive Systems Worldwide, Inc. Reverse lottery system and method
US20050092839A1 (en) 2003-10-31 2005-05-05 Oram Thomas K. Method and apparatus for providing and processing active barcodes
US7299126B2 (en) 2003-11-03 2007-11-20 International Business Machines Corporation System and method for evaluating moving queries over moving objects
US8589517B2 (en) 2003-11-04 2013-11-19 Verizon Business Global Llc Systems and methods for providing self-compiling, peer-to-peer on-line gaming
US20050096975A1 (en) 2003-11-05 2005-05-05 Eliahu Moshe Method and system for interactive advertisement
US20050102178A1 (en) 2003-11-07 2005-05-12 Phillips Daniel W. Systems and methods for generating multiple revenue streams involving the use of an integrated appliance
US20050102638A1 (en) 2003-11-10 2005-05-12 Jiang Zhaowei C. Navigate, click and drag images in mobile applications
US7797529B2 (en) 2003-11-10 2010-09-14 Yahoo! Inc. Upload security scheme
US7607980B2 (en) 2003-11-10 2009-10-27 Igt Gaming device having free potential winning combinations
US7584225B2 (en) 2003-11-10 2009-09-01 Yahoo! Inc. Backup and restore mirror database memory items in the historical record backup associated with the client application in a mobile device connected to a communion network
US20050107152A1 (en) 2003-11-14 2005-05-19 First Data Corporation Stored value lottery card and methods
US20050108127A1 (en) 2003-11-14 2005-05-19 First Data Corporation Stored value lottery card and methods
US20050108144A1 (en) 2003-11-19 2005-05-19 Robert Longman Wish list auctions
KR100585657B1 (en) 2003-11-25 2006-06-07 엘지전자 주식회사 Strain wireless antenna for wireless home network and digital electric home appliance
US20050153779A1 (en) 2003-12-04 2005-07-14 Robert Ziegler Method and system for lottery transactions over an open network
US7908570B2 (en) 2003-12-05 2011-03-15 Trading Technologies International, Inc. Method and system for displaying a cursor on a trading screen
US20050132420A1 (en) 2003-12-11 2005-06-16 Quadrock Communications, Inc System and method for interaction with television content
US7450711B2 (en) 2003-12-15 2008-11-11 International Business Machines Corporation Adjusting music length to expected waiting time while caller is on hold
CA2490220A1 (en) 2003-12-15 2005-06-15 Gordon Wilson Method and interface system for facilitating access to fantasy sports leagues
US20050138560A1 (en) 2003-12-18 2005-06-23 Kuo-Chun Lee Method and apparatus for broadcasting live personal performances over the internet
US20050144068A1 (en) 2003-12-19 2005-06-30 Palo Alto Research Center Incorporated Secondary market for keyword advertising
US20050138158A1 (en) 2003-12-23 2005-06-23 International Business Machines Corp. Software download method and system
US20050149454A1 (en) 2003-12-30 2005-07-07 Chen Gigi Device and method for digital certificate distribution
WO2005065342A2 (en) 2003-12-30 2005-07-21 Block Robert S Game world operating system related applications
US7463878B2 (en) 2003-12-31 2008-12-09 Megasoft Consultants, Inc. Real-time interconnect billing system and method of use
US7749071B2 (en) 2004-01-02 2010-07-06 Igt Gaming device including player selectable wild symbols
US7426602B2 (en) 2004-01-08 2008-09-16 Topside Research, Llc Switch for bus optimization
US20050151722A1 (en) 2004-01-14 2005-07-14 Xerox Corporation Methods and systems for collecting and generating ergonomic data utilizing an electronic portal
JP3703825B2 (en) 2004-01-16 2005-10-05 株式会社スクウェア・エニックス GAME DEVICE, GAME PROGRESS METHOD, PROGRAM, AND RECORDING MEDIUM
JP2005208839A (en) 2004-01-21 2005-08-04 Aruze Corp Prizewinning money payment system, prizewinning ticket issuing device and prizewinning ticket fare adjusting device
US8221206B2 (en) 2004-01-28 2012-07-17 Igt Gaming device having a partial selectable symbol matrix
JP2005215859A (en) 2004-01-28 2005-08-11 Aruze Corp Prize money payment system, prize ticket issuing device, and prize ticket settlement device
US20050177859A1 (en) 2004-02-09 2005-08-11 Valentino Henry Iii Video surveillance system and methods of use and doing business
WO2005079350A2 (en) 2004-02-12 2005-09-01 Jsr & M Family Limited Partnership System and method of providing multi-vendor retail goods and services
US7513828B2 (en) 2004-02-17 2009-04-07 Igt Gaming device having secondary game played in parallel with primary game
US20050193015A1 (en) 2004-02-19 2005-09-01 Sandraic Logic, Llc A California Limited Liability Company Method and apparatus for organizing, sorting and navigating multimedia content
US8473286B2 (en) 2004-02-26 2013-06-25 Broadcom Corporation Noise feedback coding system and method for providing generalized noise shaping within a simple filter structure

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4582324A (en) * 1984-01-04 1986-04-15 Bally Manufacturing Corporation Illusion of skill game machine for a gaming system
US4837728A (en) * 1984-01-25 1989-06-06 Igt Multiple progressive gaming system that freezes payouts at start of game
US4856787B1 (en) * 1986-02-05 1997-09-23 Fortunet Inc Concurrent game network
US4856787A (en) * 1986-02-05 1989-08-15 Yuri Itkis Concurrent game network
US5697844A (en) * 1986-03-10 1997-12-16 Response Reward Systems, L.C. System and method for playing games and rewarding successful players
US4738451A (en) * 1986-05-20 1988-04-19 Atari Games Corporation Multi-player, multi-character cooperative play video game with independent player entry and departure
US5497479A (en) * 1989-04-28 1996-03-05 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
US5166886A (en) * 1989-07-31 1992-11-24 Molnar Charles E System to demonstrate and sell computer programs
US5242163A (en) * 1992-08-27 1993-09-07 D.D. Stud Inc. Casino game system
US5351970A (en) * 1992-09-16 1994-10-04 Fioretti Philip R Methods and apparatus for playing bingo over a wide geographic area
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US6048269A (en) * 1993-01-22 2000-04-11 Mgm Grand, Inc. Coinless slot machine system and method
US5333868A (en) * 1993-03-01 1994-08-02 Simon Goldfarb Method of playing a game of chance at locations remote from the game site
US6014651A (en) * 1993-11-04 2000-01-11 Crawford; Christopher M. Commercial online software distribution systems and methods using encryption for security
US5625690A (en) * 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5694546A (en) * 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
US5624316A (en) * 1994-06-06 1997-04-29 Catapult Entertainment Inc. Video game enhancer with intergral modem and smart card interface
US6120031A (en) * 1994-09-23 2000-09-19 D. D. Stud, Inc. Game with reservable wild indicia
US5431408A (en) * 1994-09-23 1995-07-11 Dd Stud, Inc. Card game with travelling wild card
US5655961A (en) * 1994-10-12 1997-08-12 Acres Gaming, Inc. Method for operating networked gaming devices
US6162122A (en) * 1994-10-12 2000-12-19 Acres Gaming Incorporated Method and apparatus for operating networked gaming devices
US5654746A (en) * 1994-12-01 1997-08-05 Scientific-Atlanta, Inc. Secure authorization and control method and apparatus for a game delivery service
US6241524B1 (en) * 1994-12-02 2001-06-05 Namco, Ltd. Video game apparatus and image synthesizing method thereof
US5720663A (en) * 1994-12-02 1998-02-24 Namco Ltd. Game apparatus, image synthesizing method, and data storage medium
US5715400A (en) * 1995-03-20 1998-02-03 International Business Machines Corporation System and method for providing merchant information and establishing links to merchants while presenting a movie
US5907617A (en) * 1995-06-07 1999-05-25 Digital River, Inc. Try before you buy software distribution and marketing system
US5956038A (en) * 1995-07-12 1999-09-21 Sony Corporation Three-dimensional virtual reality space sharing method and system, an information recording medium and method, an information transmission medium and method, an information processing method, a client terminal, and a shared server terminal
US5761648A (en) * 1995-07-25 1998-06-02 Interactive Coupon Network Interactive marketing network and process using electronic certificates
US5710887A (en) * 1995-08-29 1998-01-20 Broadvision Computer system and method for electronic commerce
US5825883A (en) * 1995-10-31 1998-10-20 Interval Systems, Inc. Method and apparatus that accounts for usage of digital applications
US6155926A (en) * 1995-11-22 2000-12-05 Nintendo Co., Ltd. Video game system and method with enhanced three-dimensional character and background control
US6383079B1 (en) * 1995-11-22 2002-05-07 Nintendo Co., Ltd. High performance/low cost video game system with multi-functional peripheral processing subsystem
US6190257B1 (en) * 1995-11-22 2001-02-20 Nintendo Co., Ltd. Systems and method for providing security in a video game system
US6331146B1 (en) * 1995-11-22 2001-12-18 Nintendo Co., Ltd. Video game system and method with enhanced three-dimensional character and background control
US5970143A (en) * 1995-11-22 1999-10-19 Walker Asset Management Lp Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols
US20010046896A1 (en) * 1995-11-22 2001-11-29 Nintendo Co., Ltd. Video game system and method with enhanced three-dimensional character and background control due to environmental conditions
US6394905B1 (en) * 1995-11-22 2002-05-28 Nintendo Co., Ltd. Systems and methods for providing security in a video game system
US6454652B2 (en) * 1995-11-22 2002-09-24 Nintendo Co., Ltd. Video game system and method with enhanced three-dimensional character and background control due to environmental conditions
US6139433A (en) * 1995-11-22 2000-10-31 Nintendo Co., Ltd. Video game system and method with enhanced three-dimensional character and background control due to environmental conditions
US20020115486A1 (en) * 1995-11-22 2002-08-22 Nintendo Co., Ltd. Video game system with state of next world dependent upon manner of entry from previous world via a portal
US6071191A (en) * 1995-11-22 2000-06-06 Nintendo Co., Ltd. Systems and methods for providing security in a video game system
US5708709A (en) * 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs
US5855515A (en) * 1996-02-13 1999-01-05 International Game Technology Progressive gaming system
US6024572A (en) * 1996-03-12 2000-02-15 Weyer; Frank M. Means for adding educational enhancements to computer games
US6007426A (en) * 1996-04-05 1999-12-28 Rlt Acquisitions, Inc. Skill based prize games for wide area networks
US20020193162A1 (en) * 1996-04-22 2002-12-19 Walker Jay S. System and method for facilitating play of a video game via a web site
US5894320A (en) * 1996-05-29 1999-04-13 General Instrument Corporation Multi-channel television system with viewer-selectable video and audio
US6193607B1 (en) * 1996-06-18 2001-02-27 Silicon Gaming, Inc. Random number generator for electronic applications
US6476830B1 (en) * 1996-08-02 2002-11-05 Fujitsu Software Corporation Virtual objects for building a community in a virtual world
US6067582A (en) * 1996-08-13 2000-05-23 Angel Secure Networks, Inc. System for installing information related to a software application to a remote computer over a network
US6385592B1 (en) * 1996-08-20 2002-05-07 Big Media, Inc. System and method for delivering customized advertisements within interactive communication systems
US6267673B1 (en) * 1996-09-20 2001-07-31 Nintendo Co., Ltd. Video game system with state of next world dependent upon manner of entry from previous world via a portal
US6139434A (en) * 1996-09-24 2000-10-31 Nintendo Co., Ltd. Three-dimensional image processing apparatus with enhanced automatic and user point of view control
US6244959B1 (en) * 1996-09-24 2001-06-12 Nintendo Co., Ltd. Three-dimensional image processing system with enhanced character control
US6283857B1 (en) * 1996-09-24 2001-09-04 Nintendo Co., Ltd. Three-dimensional image processing apparatus with enhanced automatic and user point of view control
US5769716A (en) * 1996-09-30 1998-06-23 International Game Technology Symbol fall game method and apparatus
US5884029A (en) * 1996-11-14 1999-03-16 International Business Machines Corporation User interaction with intelligent virtual objects, avatars, which interact with other avatars controlled by different users
US6039648A (en) * 1997-03-04 2000-03-21 Casino Data Systems Automated tournament gaming system: apparatus and method
US6024643A (en) * 1997-03-04 2000-02-15 Intel Corporation Player profile based proxy play
US6152824A (en) * 1997-03-06 2000-11-28 Mpath Interactive, Inc. Online gaming architecture
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
US6234897B1 (en) * 1997-04-23 2001-05-22 Wms Gaming Inc. Gaming device with variable bonus payout feature
US6165071A (en) * 1997-05-20 2000-12-26 Casino Data Systems Method and apparatus for gaming in a series of sessions
US5964660A (en) * 1997-06-18 1999-10-12 Vr-1, Inc. Network multiplayer game
US6179713B1 (en) * 1997-06-18 2001-01-30 Circadence Corporation Full-time turn based network multiplayer game
US5974454A (en) * 1997-11-14 1999-10-26 Microsoft Corporation Method and system for installing and updating program module components
US6302790B1 (en) * 1998-02-19 2001-10-16 International Game Technology Audio visual output for a gaming device
US6210275B1 (en) * 1998-05-26 2001-04-03 Mikohn Gaming Corporation Progressive jackpot game with guaranteed winner
US6141010A (en) * 1998-07-17 2000-10-31 B. E. Technology, Llc Computer interface method and apparatus with targeted advertising
US6157377A (en) * 1998-10-30 2000-12-05 Intel Corporation Method and apparatus for purchasing upgraded media features for programming transmissions
US6273820B1 (en) * 1999-02-04 2001-08-14 Haste, Iii Thomas E. Virtual player gaming method
US6036601A (en) * 1999-02-24 2000-03-14 Adaboy, Inc. Method for advertising over a computer network utilizing virtual environments of games
US7749089B1 (en) * 1999-02-26 2010-07-06 Creative Kingdoms, Llc Multi-media interactive play system
US6270411B1 (en) * 1999-09-10 2001-08-07 Wms Gaming Inc. Gaming machine with animated reel symbols for payoff
US6267669B1 (en) * 1999-11-29 2001-07-31 International Game Technology Hybrid gaming apparatus and method
US20010044339A1 (en) * 2000-02-17 2001-11-22 Angel Cordero Multi-player computer game, system and method
US6928414B1 (en) * 2000-04-12 2005-08-09 Jae Heon Kim Advertisement method using game program on the internet and method for executing the game program having the advertisement according to the advertisement method
US6616533B1 (en) * 2000-05-31 2003-09-09 Intel Corporation Providing advertising with video games
US6406369B1 (en) * 2000-07-28 2002-06-18 Anthony J. Baerlocher Gaming device having a competition bonus scheme
US20020082065A1 (en) * 2000-12-26 2002-06-27 Fogel David B. Video game characters having evolving traits
US20020082077A1 (en) * 2000-12-26 2002-06-27 Johnson Douglas R. Interactive video game system with characters that evolve physical and cognitive traits
US20040053690A1 (en) * 2000-12-26 2004-03-18 Fogel David B. Video game characters having evolving traits
US20030078102A1 (en) * 2001-10-18 2003-04-24 Konami Corporation Video game system, video game apparatus and video game execution control method
US20030104860A1 (en) * 2001-11-30 2003-06-05 Anchor Gaming Method, apparatus and system for perpetual bonus game
US20030104854A1 (en) * 2001-12-05 2003-06-05 Cannon Lee E. Method and apparatus for competitive bonus games with a player as the house
US20030114218A1 (en) * 2001-12-19 2003-06-19 Mcclintic Monica A Method and apparatus for gaming machines with a quasi-competition play bonus feature
US20030114220A1 (en) * 2001-12-19 2003-06-19 Mcclintic Monica A. Gaming method, device, and system including adventure bonus game
US20030114219A1 (en) * 2001-12-19 2003-06-19 Mcclintic Monica A. Method and apparatus for an interactive bonus game
US20030119576A1 (en) * 2001-12-20 2003-06-26 Mcclintic Monica A. Gaming devices and methods incorporating interactive physical skill bonus games and virtual reality games in a shared bonus event
US20030119581A1 (en) * 2001-12-20 2003-06-26 Cannon Lee E. Method and apparatus for a player-controllable bonus game
US20030119573A1 (en) * 2001-12-21 2003-06-26 Mcclintic Monica A. Gaming method, device, and system including trivia-based bonus game
US20030125107A1 (en) * 2001-12-21 2003-07-03 Cannon Lee E. Method and apparatus for competitive bonus games based upon strategy or skill
US20030125103A1 (en) * 2001-12-31 2003-07-03 Tessmer Michael T. Method and apparatus for providing an advantage to a player in a bonus game
US20030125100A1 (en) * 2002-01-02 2003-07-03 Cannon Lee E. Competitive, matrix type game, play thereof as a bonus event to a primary game, and apparatus and systems for implementing the game
US20040148221A1 (en) * 2003-01-24 2004-07-29 Viva Chu Online game advertising system
US20040177007A1 (en) * 2003-03-03 2004-09-09 Van Luchene Andrew S. Premium product access system for performance in a video game
US20040181456A1 (en) * 2003-03-10 2004-09-16 Kunihiko Matsumori Personal shopping data service system using extended gaming machine memory module
US20050045025A1 (en) * 2003-08-25 2005-03-03 Wells Robert V. Video game system and method
US20050096134A1 (en) * 2003-11-03 2005-05-05 Lippincott Louis A. Gaming interface techniques for media centers

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8352978B2 (en) 1998-05-15 2013-01-08 United Video Properties, Inc. Systems and methods for advertising television networks, channels, and programs
US20100111493A1 (en) * 2000-02-01 2010-05-06 Rovi Technologies Corporation Systems and methods for providing promotions with recorded programs
US20110197222A1 (en) * 2000-02-01 2011-08-11 United Video Properties, Inc. Systems and methods for providing promotions with recorded programs
US9137491B2 (en) 2000-02-01 2015-09-15 Rovi Guides, Inc. Methods and systems for forced advertising
US20110202419A1 (en) * 2000-07-13 2011-08-18 Aeritas, Llc Method and system for facilitation of wireless e-commerce transactions
US9779391B2 (en) * 2000-07-13 2017-10-03 Aeritas, Llc Method and system for facilitation of wireless e-commerce transactions
US11037108B2 (en) * 2000-07-13 2021-06-15 Aeritas, Llc Method and system for facilitation of wireless e-commerce transactions
US20100175080A1 (en) * 2002-05-01 2010-07-08 Index Systems, Inc Method and system for facilitating advertising and t-commerce transactions in connection with content stored on a storage medium
US20110314036A1 (en) * 2010-06-21 2011-12-22 William Farrell Cunningham System for conversion of data item attributes
US8949901B2 (en) 2011-06-29 2015-02-03 Rovi Guides, Inc. Methods and systems for customizing viewing environment preferences in a viewing environment control application
US9288521B2 (en) 2014-05-28 2016-03-15 Rovi Guides, Inc. Systems and methods for updating media asset data based on pause point in the media asset

Also Published As

Publication number Publication date
AU2001263440A1 (en) 2002-01-02
US7076445B1 (en) 2006-07-11
EP1307839A1 (en) 2003-05-07
US10607237B2 (en) 2020-03-31
US20040024641A1 (en) 2004-02-05
WO2001098991A1 (en) 2001-12-27
US20130012304A1 (en) 2013-01-10
US10346853B2 (en) 2019-07-09

Similar Documents

Publication Publication Date Title
US10346853B2 (en) Computing environment transaction system to transact computing environment circumventions
US20200349536A1 (en) Dispensing Digital Objects to an Electronic Wallet
US7729946B2 (en) Online game advertising system
US20080109296A1 (en) Contingent rights exchange associated with a social network
US20090070249A1 (en) Contingent event rights relating to team location
US20080243532A1 (en) Contingent purchase rights associated with consumer products
US20080109322A1 (en) Rights exchange user interface
US20080109234A1 (en) Secondary market for contingent rights exchange
US20080109321A1 (en) Contingent forward rights exchange
US20080109345A1 (en) Contingent rights exchange relating to non-post season sporting events
US20080103801A1 (en) Contingent travel rights exchange
US20080103920A1 (en) Contingent rights relating to a weather phenomenon
US9600832B2 (en) Systems and methods for digital multimedia capture using haptic control, cloud voice changer, protecting digital multimedia privacy, and advertising and sell products or services via cloud gaming environments
US20080109297A1 (en) Methods and systems for pricing contingent rights
US20080109323A1 (en) Associating media channels with a contingent rights exchange
US20080103802A1 (en) Contingent rights exchange relating to music production
US20140046818A1 (en) System and Method For Event Related Commerce Utilizing A Portable Electronic Device
US20080103919A1 (en) Contingent consumer product rights exchange
US20080109233A1 (en) Contingent rights exchange relating to a private event, good or service
US20080103803A1 (en) Contingent event rights relating to an event participant
US20140122303A1 (en) Entertainment layer overlaid on online transactions
KR102641854B1 (en) System for electronic commerce based on metaverse
US11599868B2 (en) System and method for a line of credit based digital content multichambered cloud based distribution platform
JP7215709B2 (en) Customer attraction system and customer attraction program
KR20230109007A (en) Method of operation of metaverse platform providing server and metaverse platform providing server

Legal Events

Date Code Title Description
AS Assignment

Owner name: THEADOS CORPORATION, MARYLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CARTWRIGHT, SHAWN D.;REEL/FRAME:027094/0231

Effective date: 20111020

AS Assignment

Owner name: GAMETEK LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THEADOS CORPORATON;REEL/FRAME:027641/0952

Effective date: 20111219

AS Assignment

Owner name: GAMETEK LLC, CALIFORNIA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNOR ENTERED AS THEADOS CORPORATON PREVIOUSLY RECORDED ON REEL 027641 FRAME 0952. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNOR SHOULD BE ENTERED AS THEADOS CORPORATION;ASSIGNOR:THEADOS CORPORATION;REEL/FRAME:027649/0321

Effective date: 20111219

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE