Patents by Inventor Gary Shuster

Gary Shuster has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130047098
    Abstract: Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.
    Type: Application
    Filed: August 20, 2012
    Publication date: February 21, 2013
    Inventors: Brian Shuster, Aaron Burch, Friso Kristiansen, Ian Neufeld, Dirk Herling, Patrick Tyroler, Gary Shuster
  • Publication number: 20120042276
    Abstract: Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
    Type: Application
    Filed: September 6, 2011
    Publication date: February 16, 2012
    Applicant: HOSHIKO LLC
    Inventor: Gary Shuster
  • Patent number: 8015285
    Abstract: Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
    Type: Grant
    Filed: August 18, 2010
    Date of Patent: September 6, 2011
    Assignee: Hoshiko LLC
    Inventor: Gary Shuster
  • Publication number: 20100318603
    Abstract: Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
    Type: Application
    Filed: August 18, 2010
    Publication date: December 16, 2010
    Inventor: Gary Shuster
  • Patent number: 7783753
    Abstract: Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
    Type: Grant
    Filed: November 17, 2008
    Date of Patent: August 24, 2010
    Inventor: Gary Shuster
  • Publication number: 20090076919
    Abstract: Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
    Type: Application
    Filed: November 17, 2008
    Publication date: March 19, 2009
    Inventor: Gary Shuster
  • Patent number: 7454498
    Abstract: Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
    Type: Grant
    Filed: July 1, 2004
    Date of Patent: November 18, 2008
    Assignee: Hoshiko LLC
    Inventor: Gary Shuster
  • Publication number: 20080015964
    Abstract: Retail consumers may hedge the price of volatile commodities such as gasoline via the advance purchase of a policy, which may be represented by a hedge card. The card may be priced to cover uncertainty in the price of the commodity over a defined future period, plus a small profit for the card issuer, optionally plus a pre-paid residual cash value. The card may permit the purchase of a defined amount of the commodity at a price not to exceed a defined ceiling over the defined future period. The card issuer may contact with one or more fuel providers to apportion the risks and benefits of the hedge card. In the alternative, the card issuer may contract with the consumer only, and may rebate commodity purchase amounts in excess of the defined price ceiling directly to the hedge card holder.
    Type: Application
    Filed: October 25, 2006
    Publication date: January 17, 2008
    Inventor: Gary Shuster
  • Publication number: 20070294064
    Abstract: A method for anticipating a user's desired information using a PDA device connected to a computer network is provided. This method further comprises maintaining a database of user tendencies within the computer network, receiving sensor data from the user's physical environment via the PDA device, generating query strings using both tendency data and sensor data, retrieving data from external data sources using these generated query strings, organizing the retrieved data info electronic folders, and delivering this organized data to the user via the PDA device. In particular, a data management module anticipates the type of information a user desires by combining real time data taken from a sensor unit within a PDA and data regarding the history of that particular user's tendencies stored within the data management module.
    Type: Application
    Filed: May 15, 2007
    Publication date: December 20, 2007
    Inventor: Gary Shuster
  • Publication number: 20070271162
    Abstract: Executable software may be provided to a computer. The software may be configured to perform a designated user-requested function on the computer. In addition, the software may be configured to perform a search of a memory of the user computer, looking for prospective billing addresses. The billing addresses may comprise street addresses or electronic mail addresses. The billing address information may be provided to a remote resource, optionally along with use information regarding the software. The provided information may be used to generate an invoice for use of the account that is provided to the billing address. The executable software may be provided under a license that provides for a free trial period and/or authorizes search and use of the billing information.
    Type: Application
    Filed: November 6, 2006
    Publication date: November 22, 2007
    Inventor: Gary Shuster
  • Publication number: 20070213032
    Abstract: A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verifies and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed.
    Type: Application
    Filed: April 19, 2007
    Publication date: September 13, 2007
    Inventor: Gary Shuster
  • Publication number: 20070157293
    Abstract: A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet.
    Type: Application
    Filed: March 1, 2007
    Publication date: July 5, 2007
    Inventor: Gary Shuster
  • Publication number: 20070138345
    Abstract: A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft.
    Type: Application
    Filed: October 17, 2006
    Publication date: June 21, 2007
    Inventor: Gary Shuster
  • Publication number: 20070108275
    Abstract: A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services. A merchant computer may receive the identifier and process it to determine whether what is proposed for purchase using the account is a qualified type of good or service. The computer may obtain a list of qualified or unqualified products and compare the list to what is proposed for purchase. In the alternative, the computer may provide instructions to a human operator for the merchant, who may determine whether or not the proposed product is qualified. If the proposed product is deemed qualified for purchase, use of the account may be approved; if otherwise, use of the account may be refused.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 17, 2007
    Inventor: Gary Shuster
  • Publication number: 20070111772
    Abstract: A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amounts or betting odds, some combination of the foregoing, or any other useful remuneration. The house retains its edge via the premium. The method may be implemented for play at a physical or virtual card table.
    Type: Application
    Filed: September 8, 2006
    Publication date: May 17, 2007
    Inventors: Gary Shuster, Brian Shuster
  • Publication number: 20070094679
    Abstract: A digital medium such as a DVD disk, may contain hidden content and apparent content. When loaded, a main or title menu may appear to provide an apparent link to apparent content and a non-apparent link to non-apparent content. The non-apparent link may require a user to perform a sequence of non-apparent control actions before providing access to the non-apparent content.
    Type: Application
    Filed: October 19, 2006
    Publication date: April 26, 2007
    Inventor: Gary Shuster
  • Publication number: 20070093232
    Abstract: A mobile communication device alert signal may be remotely controlled by transmitting an alert control signal to the mobile communication device when the mobile communication device is within a predefined area, the alert control signal to indicate to the mobile communication device to invoke a control procedure for its alert signal.
    Type: Application
    Filed: October 23, 2006
    Publication date: April 26, 2007
    Inventor: Gary Shuster
  • Publication number: 20070076711
    Abstract: A local network is secured using a router or hub that includes a security switch. During or immediately after initial network configuration, the router or hub records MAC addresses of connected network devices. After initial configuration is completed, the switch is activated. After the switch is activated, the router or hub will not allow connection of additional devices, as determined by the MAC addresses of connected devices. The security switch can be deactivated to permit connection of additional devices.
    Type: Application
    Filed: September 11, 2006
    Publication date: April 5, 2007
    Inventor: Gary Shuster
  • Publication number: 20070067655
    Abstract: A computer system is configured to operate in a normal mode and in a reduced power mode. The normal mode utilizes a primary processor, which operates using a primary operating system. When system power is depleted to a defined level, the primary processor is shut down and certain operations are taken over by a low-power, secondary processor that operates using a secondary operating system.
    Type: Application
    Filed: September 18, 2006
    Publication date: March 22, 2007
    Inventor: Gary Shuster
  • Publication number: 20060293973
    Abstract: A method for conducting Internet domain name service to users connected to the Internet comprises an automated procedure for transferring Internet domain name service from a domain name owner to a domain name manager. This method further comprises Internet sub-domain name services to prospective buyers based on domain names transferred to the domain name manager. Messages requesting domain name service, including requests from domain name owners to sub-license their particular domain name to prospective sub-domain name buyers and from prospective sub-domain name buyers to license available sub-domain names, are received and responded to by an automated domain name management system. This automated domain name management system further comprises an interactive website which includes a database, search engine, and Web server.
    Type: Application
    Filed: August 28, 2006
    Publication date: December 28, 2006
    Inventors: Brian Shuster, Gary Shuster