WO1999015997A2 - Virtuelle personen zur hilfe bei der nutzung von geräten und kommunikativen netzen insbesondere zur hilfe bei der ausgabe von individuell nutzbaren karten - Google Patents
Virtuelle personen zur hilfe bei der nutzung von geräten und kommunikativen netzen insbesondere zur hilfe bei der ausgabe von individuell nutzbaren karten Download PDFInfo
- Publication number
- WO1999015997A2 WO1999015997A2 PCT/EP1998/006107 EP9806107W WO9915997A2 WO 1999015997 A2 WO1999015997 A2 WO 1999015997A2 EP 9806107 W EP9806107 W EP 9806107W WO 9915997 A2 WO9915997 A2 WO 9915997A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- individual
- virtual person
- person
- user
- ivp
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
- G06F9/453—Help systems
Definitions
- the invention relates to a method for the audiovisual display of data and / or programs, which are used by users in communicative networks for the transmission and or display of audiovisual data and / or programs, using an electrical device with an optical and / or acoustic display device, such as a screen and / or loudspeaker, for the audiovisual representation of this data and / or programs, according to the preamble of claim 1 and a device for performing the method.
- the object of the invention is to make it easier for users of technical systems and / or devices which are connected to one another via electronic, communicative networks to operate the systems and / or devices and / or networks by providing programs and devices which are suitable for one Users in the networks act as virtual persons, namely as apparent persons generated by programs, authenticated by user H.
- programs and devices which are suitable for one Users in the networks act as virtual persons, namely as apparent persons generated by programs, authenticated by user H.
- other users of the network should be able to rely on the fact that a virtual person is authorized by their producer, in a particular one Act situation.
- a virtual person should be suitable for issuing chip cards in a card service center.
- the solution to the problem consists in the features of the claims.
- This advantageously precludes a deception of the system that a user was at location X at time T1, whereas he was physically at location Y at the same time T1.
- the method or the device advantageously generates virtual persons with whom the user can interact.
- other users of the network can rely on the fact that a virtual person is authorized by their producer to act in a specific situation.
- it is possible to facilitate the use of electronic devices and / or systems, such as are available by connecting devices in communicative networks, by generating certainty about the authorization of the use and activation of programs by user H.
- FIG. 1 shows in three representations a, b and c the display options of virtual persons VP on technical devices and
- FIG. 2 symbolically shows a card service center.
- H denotes the natural user H of a technical device T3 who is at location X.
- T3 consists of a technical
- T3 can also contain devices for acoustic input and output of information. In special cases, T3 can also contain mechanical devices which simulate or map the movements of a user H.
- T2 consists of the usual devices of a data processing system, such as an electronic processor, memory for data and programs. With its programs, T2 is able to control the T3 system with the data received via C2. In this way, T3 can display images of H audiovisually and / or spatially in the form of RVP (related virtual person).
- RVP related virtual person
- sensor detection T1 There is a relationship between sensor detection T1 and representation of a virtual person using T3.
- Such systems mainly serve to simulate the spatial behavior of people.
- Feedback can be transmitted to the user H in the form of visual representations and / or tactile sensory impressions which the user H can perceive, for example in audiovisual helmets or in gloves or other touch devices, via the data path C4.
- a user H directly controls the technical system T2, which is structured in a manner comparable to the description of image la. It is preferably controlled using a keyboard or other aids such as a mouse and / or joy stick.
- a virtual person VP generated by program T2 is created on system T3. This virtual person VP mainly serves to represent game characters - playing virtual person - whose behavior is controlled by the user H via the control elements of T2.
- Image la, image lc symbolize the two extremes of linking the presence of a natural person H with a program T2 and its representation on a technical system T3.
- Figure la symbolizes an automatic link
- RVP acts analogously to H and therefore only during the time when H is detected by the device T1.
- PVP also acts when H is no longer present and activates the programs in T2.
- it will be important to know whether a program in T3 is still authenticated by a user / originator.
- the user H will create the conditions for authenticity with an input device T4 according to the patent.
- T4 for authentication, namely guaranteeing the authenticity or the presence of the user H available.
- T4 can be designed as a device for reading a plastic card which contains a code which identifies a user H.
- T4 can also enable biometric recording of the characteristics of a user H.
- T4 is designed as a keyboard, via which the user H enters a coding for authentication.
- the coding H specific to the user H is fed into the system T2 via the data lines C2.
- T2 creates a virtual person VP per program, which is put together from various program elements in T2 to form the unique, individual-virtual person IVP.
- a special, patented feature is the time feedback C4 between user H and authentication.
- a number such as a PIN code is also entered. This number is not in the T4 system, but only on the card. Authentication only takes place when there is a match between the PIN and the information on the card.
- the input device T4 can repeatedly query via C4 whether H is still triggering inputs.
- the existence of the individual virtual person IVP that is to say in the representation in the system T3, is limited in time to the same time period in which authentication takes place in T4.
- the individual-virtual person IVP only exists during the time period, since authentication or identification is available on the input device T4. This is in contrast to the illustration in Figure lc, in which the PVP remains active as long as the system T3 is active.
- the authentication ensures that the IVP is not present in the system T3 if the user H has no authenticity through identification.
- anonymous parts of the individual-virtual person IVP can be present in the system T3 for purposes of data query and / or for the completion of tasks.
- the complete, individual-virtual person IVP, which contains all the data and programs assigned to it by a user H, is only present in the system as long as authentication (authenticity, authenticity) is provided by the user H. It is also possible that the user H does not give complete authentication for his individual virtual person IVP, but only sends parts of the IVP into the system T3 by giving limited authentication.
- devices T3 are in use, comparable to personal computers, which allow natural persons H to be visualized and / or simulated, which are called virtual persons.
- This virtual person simulates on / in the device by means of graphics, acoustics, audiovisual representations as they occur to natural people. Screens and / or speakers are used for audiovisual display.
- T3 screens are known in these devices and display devices are used which are extremely thin and can be hung on the wall like pictures.
- H There are also devices in development that allow three-dimensional representations in a room volume. These devices help people to perform a variety of tasks, such as writing, calculating using a spreadsheet, making calls, communicating via the Internet, withdrawing money, transferring money, booking tickets for events and trips, etc. People who use the device to perform tasks will User called H. Due to the wide range of possible uses, users of these devices are faced with the problem of learning the special operation of the device via a keyboard and / or a screen and / or optical / acoustic inputs / outputs. Menus are used for this in a known manner. A more advantageous aid for the user H is given according to the patent if a virtual person generated by a program is used.
- a user H of the device T3 thus does not communicate with a program that generates certain symbols and characters or acoustic signals, but with a design of a program T2 that generates features similar to people and is named as a virtual person.
- a user H of the device T3 and / or network Cl. Cn can request his specific, individual person using a device T4.
- This individual virtual person IVP can only be activated via a specific coding on / in the input device T4.
- a certain, individual help is available to a user H in the form of an individual, virtual person related to the user H.
- This individual virtual person IVP has features which are determined by the user H.
- this individual-virtual person IVP is distinguished as a special, virtual person; its recognition can be possible for the user H in a manner comparable to the recognition of a natural person.
- the virtual person VP helps a user H with his individual use of the device / network in a way that would be comparable to an optional human person.
- the individual help can be created or transmitted according to user requirements in the form of a virtual person VP audiovisually via device / network from remote devices.
- Different virtual persons VP1, VP2 ... VPn can be present in the device / network.
- Hk is uniquely assigned to a specific, individual-virtual person VP in this communication network by an identifier and / or coding and / or program.
- the assignment can be made by entering a code, for example using a card in an input device T4, but can also be done in T4 by querying fingerprints, technical, automatic evaluation of signatures or by other biometric features that are unique to an individual.
- the individual-virtual person IVP is only activated for a period of time .DELTA.t on the device T3, in the network Cl. Cn.
- the time period ⁇ t is determined by identifying the user H with his specific feature in the input device T4.
- the input device T4 ensures itself by means of a repeated time feedback, such as repeated interrogation, the presence - identification, the presence of the code - of the user.
- a repeated time feedback such as repeated interrogation, the presence - identification, the presence of the code - of the user.
- the individual virtual person IVP is authenticated in its actions by the user H for other users of the device T3, network Cl. Cn.
- authenticity means that other users of the devices T3, the network Cl ... Cn can trust that the individual-virtual person IVP is authorized to act through their user, master, producer, originator. If the authentication is ended by the input device T4, the individual-virtual person IVP is no longer to be authenticated.
- the programs and data which determine an individual-virtual person IVP can be present as partial programs and / or partial data at different locations in different devices and systems T2a ... T2x. It is therefore a matter of locally separated programs and / or data.
- the compilation and / or compilation of the partial programs and or data in a device T3 for the audiovisual representation of a virtual uniform person VP, which are composed of all locally separate programs, can be time-dependent. Only during the time period ⁇ t, since a user H of the device identifies himself with a certain feature and / or a coding, are the subunits merged into one unit on one device in a network and the individual-virtual person IVP is authenticated to act. Asks the individual-virtual person IVP automatically Input device T4 for authenticity, it can also automatically terminate its existence / activities.
- Program parts can be connected to an individual-virtual person IVP, which call up deletion routines in the known manner in the absence of information.
- a virtual person VP can have different amounts of data, which differ in their security features. Part of the data can be available for an unprotected data query, while another part has data that can only be accessed via a protected data query.
- the data can be secured using certain keys or cryptographic methods, which are called up by codes that are entered in T4.
- the unprotected data can be presented by virtual person VP.
- the unprotected data thus represent part of an individual virtual person. This part can be designed in such a way that it is the same as other virtual persons.
- Many of the same virtual people can also be represented as a neutral virtual person.
- the virtual, neutral person VP contains features which symbolize a particular situation or behavior of a person to a data interrogator.
- the protected, secured data belonging to an individual-virtual person IVP are not disclosed.
- the neutral, virtual person is restricted in his or her action towards the individual virtual person IVP and can also be active for a period of time that lies outside of ⁇ t.
- a home computer or PC is a technical device T3, which is provided with audiovisual devices such as displays, loudspeakers and devices for data storage and data processing, and one or more microprocessors and is thus suitable for representing virtual people.
- An individual virtual person IVP can be represented on a PC and is assigned to a specific user H of the PC by a specific coding and / or a program.
- the device part T4 can be integrated in the PC. In this way, a specific virtual person is connected to a specific home computer.
- Home computers contain operating systems that simplify the use of the various technical parts and / or functions of a home computer for humans.
- the individual-virtual person IVP appearing on the visible surface of a home computer can that take over conventional operating systems, as they are on the market today. With the individual-virtual person IVP, too, a specific function can be carried out by moving the pointer to a point, namely clicking on a geometric location of the individual-virtual person. When the mouth is touched, for example, speech can be output via loudspeakers.
- the representation of the individual virtual person IVP is determined by the operation of the T4. A remote provider of programs can thus determine whether programs are available beyond the time span ⁇ t.
- the help function as symbolized on today's computers by a question mark and widespread, can be performed by a virtual person. The virtual person can sit in the place of the question mark and is limited in time availability to the time of its authenticity.
- a readable font can also appear at the same time, which e.g. symbolized as a "speech bubble" associated with the virtual person.
- a speech bubble associated with the virtual person.
- information that can be read and / or heard by human beings or otherwise evaluated can appear in addition to a virtual person.
- the writing may also appear if the functions for speech output are disturbed.
- a virtual person VPl appears on a device, which belongs to a group of virtual person VPl, VP2 .... VPn with comparable programs and / or data and / or features. Only in the time period ⁇ t are programs, data and / or features added to or added to the VPl, with which the VPl assumes a certain form. These special features make the standardized or neutral-virtual person VPl an individual-virtual person. In this way it is possible for a user H to give his or her individual virtual person a certain basic type, e.g. male or female.
- data and / or programs are only queried in a certain time window and determine the properties of the individual virtual person IVP.
- the query of Data and / or programs that are assigned to an individual virtual person IVP are only possible for data and / or programs that were created before a point in time or within a period of time ⁇ t. All data and / or programs that originated before this time or outside the time period ⁇ t are blocked.
- the time can be present in coded form in programs in the same way as it is present in memories today and is assigned to programs and data.
- the activation of technical devices and / or systems takes place in a time-controlled manner and during the time of authentication.
- Standardized virtual persons VP with described, standardized, recurring properties can be contained in a device or communicative network.
- This virtual person VP is prepared for adaptation to user requirements and is intended to make it easier for a user to generate his own individual virtual person VP.
- a user who has a technical aid, for example a chip card or a remote control or telephone, which contains data and programs, can enter these data or programs into the communicative device / network and thus change the standardized properties . It is therefore possible for a standardized virtual person VP to become an individual virtual person VP by adding data, programs.
- This individually virtual person VP can, for example, have a voice sound and / or an appearance which appears familiar to a user.
- the virtual person VP can be generated in the device which is operated by the user. If the device operated by the user is connected to a remote device via a communicative wired connection, also fiber optic, and / or a wireless connection, the virtual person VP can be generated in the remote device by a program and transmitted to the device at the location of the user.
- a virtual person VPl could be given the task of catching up on the day of the week on which the year 2000 begins.
- a communicative network there could be a virtual person who specializes in delivering weekdays to calendar days. The task is solved by bringing the two virtual people together, in which the VPl speaks the day of the week to a user.
- Users of electronic storage systems and / or communicative networks can be represented by virtual persons who only have part of a user's personal data.
- the neutral virtual persons VPl, VP2 ... VPn have stored part of the data that a user has.
- the data of the virtual persons VPl, VP2 .... VPn thus correspond to a subset of the data VD1, VD2 ... VDn from user Hl, H2 ... Hk.
- the total amount of data of a user Hn can only be made available via certain electronic codes for the communicative network and / or device system. For example, statistical data, e.g. Traffic uses that are recorded about people without the personal, protected data of the people being accessible.
- a user H can also be represented in an electronic storage system and / or an electronic, communicative network by a specific, virtual person VP.
- the virtual person VP carries out tasks which are specified by a user H. If it is a virtual person with individually determined and constant characteristics, this virtual person VP can be regarded as the representative of a user nU.
- Two virtual persons VP1, VP2 can exchange data with one another, the data exchange resulting in the change of individual characteristics of a virtual person.
- a virtual person VP1, who meets the virtual person VP2 in a weather forecast program, can provide himself with an umbrella which the virtual person VP2 was carrying.
- a virtual person VP can change himself automatically via a program, so that they can be sent on a trip to Hong Kong in a communicative network and can lie there symbolically in a bed to indicate that there is a flu wave and it is not advisable to go there.
- the change in a virtual person makes it easier for the user H to grasp special features of this virtual person VP.
- a virtual person VP can be activated by events that were not caused by a user H.
- a time can activate a virtual person, for example, which wakes a user at the right time.
- an alarm system in a weekend house can activate a virtual person who informs its user.
- a home computer can represent a local, individual-virtual person, whose properties are determined by a coding which is connected to the home computer.
- This local, virtual person can be a restricted, individual-virtual person IVP.
- a waiter in a restaurant can have a portable PC that represents an individual virtual person IVP of a guest.
- the individual-virtual person IVP shows the menu of the restaurant.
- the individual-virtual person IVP will show the timetable of the urban transport company.
- An individual-virtual person IVP can appear in a game and represent and / or replace a natural person. It is thus possible for a natural person to design a game with a specific, individual-virtual person as long as there is authenticity.
- a teacher can be represented by an individual-virtual person IVP who can convey learning content. It is determined in such a way that the individual-virtual person IVP acts authentically. If an individual virtual person IVP is connected to a device which automatically receives the data and / or programs from satellites, the virtual person can, for example, indicate where on the earth the device is located.
- the virtual person carrying the action can be replaced by an individual-virtual person IVP. This creates an action that is carried by the individual-virtual person IVP, which a user H determines as the acting person. It is guaranteed that the individual-virtual person IVP is authenticated to the action only during the time period ⁇ t.
- An individual-virtual person IVP can be transmitted to remote devices via a communicative network. For example, a transmission into a device that is used in an underground pipe network.
- the individual virtual person IVP can carry out certain operations and / or device settings in the remote device. If the controls and / or device settings correspond to those that a natural person has initiated, the remote device is controlled by an individual virtual person who is authenticated by a user.
- An individual-virtual person IVP carries out tasks in a device remote from the location of the user, the device having technical facilities which can record data and / or programs in the remote environment, the recorded data and / or programs relating to the location of the user are transmitted, the remote data and / or programs being processed at the location of the user, whereby the user H finds an audiovisual environment that corresponds to the remote environment.
- An individual-virtual person IVP can have a suggested list of behaviors and / or attitudes. This list of suggestions enables a user in particular to determine virtual properties of a virtual person IVP. Communication between two natural persons can also take place via an individual-virtual person IVP. An individual-virtual person IVP can act as an interpreter if two natural persons want to communicate on different devices in different languages. A first natural person can communicate with the individual virtual person IVP in a first natural language and a second, natural person in a second natural language.
- An individual-virtual person IVP can have encodings that allow them to capture certain protected data and / or program areas in memories of devices T3.
- An individual-virtual person can contain certain numbers as encodings that allow them to query protected memory areas.
- Several individual-virtual persons IVP1, ... IVPn can be present in one device at one place at the same time, which represents a virtual assembly of virtual persons IVPl ... IVPn. If an individual-virtual person IVP lacks the authentication feature, the virtual meeting can be ended automatically, so that a natural person can determine how long they will take part in a game or survey.
- the medical remote diagnosis can be made through the mediation of an individual virtual person IVP.
- a natural person to be diagnosed can be at location B.
- the assigned individual virtual person is sent via the network to a device at diagnosis location A.
- the individual virtual person rVP is interviewed by a doctor at location B.
- the user H of the individual-virtual person IVP answers at location B and authenticates the virtual person during a period of time.
- a virtual person can also be used for diagnosis.
- This virtual diagnostic person can have individual information that is specific to user H. When the virtual diagnostic person is called up in coded form, this can be available to a user / caller with specific information as long as it is authenticated.
- a specific, geometric area of an individual-virtual person IVP can be touched with a known method using the mouse pointer.
- the touch shows data / programs / graphics that are characteristic of the geometric area.
- Virtual persons can use data for statistical purposes that are common to many individual virtual persons who do not reveal the natural persons who belong to the IVP. In this way, programs can make automated, statistical data collections about individual-virtual persons possible, while the data of natural persons remain protected.
- An individual virtual person rVP can be connected to further devices via electromagnetic data communication via first devices.
- the further devices can be carried by a user H and can send data electromagnetically to the first devices.
- the individual virtual person IVP can process the data and thus indicate in which situation the user H e.g. is on a mountain hike.
- a combination of devices is located at a remote location at which cards known to one or more persons, cards with or without a chip, with contacts, without contacts, are provided for output. These cards should be created according to individual user requirements and provided / loaded with data and / or programs. Communication with the remote devices takes place via various and generally known communication channels, such as the Internet. The cards are to be made available to one or more users in the devices at the remote location by program. The cards are to be sent to the user H after collection or to be picked up by the user.
- the user H uses individual help via the electronic communication options of the network. The individual help can optionally take place according to user requests in the form of a natural person and / or in the form of a program and / or in the form of a virtual person VP.
- databases and / or programs which characterize individual virtual persons IVP can be deleted.
- a particular application of the invention is to use virtual persons VP for the issue of chip cards in chip card dispensing stations to natural persons. It is a combination of devices located in one place. Cards with or without electronic chips are available in a magazine for one or more people and can be issued to users. Furthermore, the maps can be created according to individual user requests and provided / loaded with data and / or programs. As described above, there may be electronic communication channels to remote devices. The cards, devices, programs, electronic communication options can be arranged or arranged so that they are made available to one or more users.
- the device combination contains devices for printing / labeling new cards according to individual user requirements. Different card types can be viewed on one screen and cards can be created individually according to this specification. Data and programs from various providers of card services can be loaded into cards via the communication devices.
- the individual help in using the devices can take the form of a natural person and / or in the form of a program and / or in the form of a virtual person VP.
- a user can, for example, book a car at a card service station in New York through a car rental company in Paris, in that the individual virtual person assigned to the user is available to help as described above.
- a card can be loaded with programs which are brought to the card user by a provider of card services via a virtual person assigned to the provider.
- the combination of devices that are located in one place is referred to as the card service center CSC.
- the combination of devices includes audiovisual transmission devices for audiovisual communication between two people via screen, microphone, loudspeaker and video camera.
- Other devices may contain non-personalized cards that are held in magazines for personalization.
- the devices can also include recording devices with biometric features such as electronic recordings of signatures or fingerprints, palms, voice analyzers. These devices can be known devices, such as will be offered in an improved form in the future.
- To find programs and data in a card service center Bringing them into a wide variety of card types requires parts of the RICH concept, as described in the patents EPA 0 624 851 AI and US Pat. No.
- the cards, devices, programs, electronic communication options can be made available in a card service center to one or more people as users of a card service center.
- a card service center is shown symbolically in FIG.
- the technical devices of a card service center can be arranged in a circle; the individual user positions are labeled 1 to 6.
- An essential property of a card service center is that new, non-personalized cards are made available according to individual user requirements. For this purpose, neutral cards are kept in a magazine of a CSC.
- the personal data provided by a user in a CSC can e.g. loaded into cards via the RICH facility.
- a printing device in the CSC can design the surface of a card individually, e.g. by the user's picture and other personal data such as name and address are printed on the card.
- Another function of a CSC is to load a user's existing cards with data and / or programs. A user who already has a card can have his card loaded with new programs and data in a CSC.
- a connection can be made from the CSC to the cardholder's account and the memory for the telephone units on the card can be reloaded.
- amounts of money, insurance benefits, etc. can be transferred to the card memory.
- new programs can be loaded into the card with which the functions of the card can be changed.
- a card can e.g. loaded with a program that enables various biometric features such as the fingerprint or visual features to be transferred to the memory in compressed form. The program for this can also be loaded onto the card for a short time and then deleted again, so that the program memory can be used for a wide variety of purposes.
- a CSC Another option for using a CSC is help, which is provided by a virtual person, which thus consists, among other things, of compiling technical programs.
- a virtual person there can be a certain virtual person with the same appearance or characteristics who is responsible for all basic questions of a CSC Available. These can be questions that arise when you use a CSC for the first time or when you start using it. This first virtual person can then forward it to other service providers, who in turn provide virtual people or who also respond with natural persons. If a CSC user does not agree to the assistance of a virtual person, he can alternatively request a natural person.
- the advantage of a virtual person here is that no more natural person costs for services and consultancy services at a CSC. While natural persons can only be available once for each consulting service per unit of time, virtual persons can be made available in many ways during a unit of time, since only the programs that create a virtual person are made available to a computerized technical communication process including display and interaction .
- Communication with a virtual person can take place audiovisually as well as via keyboard and screen. So with communication problems, e.g. indistinct pronunciation of the user, the keyboard can be used, which makes it easier for the programs behind the virtual person to clearly interpret information of a CSC user.
- a CSC user can also use a special key to request the help of a natural person who engages in the dialogue between the CSC user and the virtual person and mediates in a helpful manner.
- the method and the device can be used commercially in particular for the generation of virtual persons who are assigned to a user H of technical devices in order to help the user with the use of devices.
- the invention is suitable for the commercial issuance and personalization of chip cards with data and programs in card issuing stations, with the virtual persons being authenticated only for a certain period of time.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19881387T DE19881387D2 (de) | 1997-09-25 | 1998-09-25 | Virtuelle Personen zur Hilfe bei der Nutzung von Geräten und kommunikativen Netzen insbesondere zur Hilfe bei der Ausgabe von individuell nutzbaren Karten |
EP98952647A EP1031102A2 (de) | 1997-09-25 | 1998-09-25 | Virtuelle personen zur hilfe bei der nutzung von geräten und kommunikativen netzen und inbesondere bei der ausgabe von individuell nutzbaren karten |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19742237A DE19742237A1 (de) | 1997-09-25 | 1997-09-25 | Virtuelle Personen zur Hilfe bei der Nutzung von Geräten und kommunikativen Netzen insbesondere zur Hilfe bei der Ausgabe von individuell nutzbaren Karten |
DE19742237.3 | 1997-09-25 | ||
DE19744996.4 | 1997-10-13 | ||
DE19744996A DE19744996A1 (de) | 1997-09-25 | 1997-10-13 | Virtuelle Personen zur Hilfe bei der Nutzung von Geräten und kommunikativen Netzen, insbesondere zur Hilfe bei der Ausgabe von individuell nutzbaren Karten |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1999015997A2 true WO1999015997A2 (de) | 1999-04-01 |
WO1999015997A3 WO1999015997A3 (de) | 1999-09-02 |
Family
ID=26040282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1998/006107 WO1999015997A2 (de) | 1997-09-25 | 1998-09-25 | Virtuelle personen zur hilfe bei der nutzung von geräten und kommunikativen netzen insbesondere zur hilfe bei der ausgabe von individuell nutzbaren karten |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1031102A2 (de) |
DE (2) | DE19744996A1 (de) |
WO (1) | WO1999015997A2 (de) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1096400A2 (de) * | 1999-10-26 | 2001-05-02 | Goldenchart Co., Ltd. | Ratgeber-System für die Verwaltung von Wertpapieren und Speichermedium mit dem Programm |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1995014268A1 (en) * | 1993-11-17 | 1995-05-26 | Collegeview | Method and apparatus for displaying three-dimensional animated characters upon a computer monitor's screen |
WO1996025012A1 (en) * | 1995-02-07 | 1996-08-15 | British Telecommunications Public Limited Company | Information services provision and management |
-
1997
- 1997-10-13 DE DE19744996A patent/DE19744996A1/de not_active Withdrawn
-
1998
- 1998-09-25 DE DE19881387T patent/DE19881387D2/de not_active Expired - Fee Related
- 1998-09-25 WO PCT/EP1998/006107 patent/WO1999015997A2/de not_active Application Discontinuation
- 1998-09-25 EP EP98952647A patent/EP1031102A2/de not_active Ceased
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1995014268A1 (en) * | 1993-11-17 | 1995-05-26 | Collegeview | Method and apparatus for displaying three-dimensional animated characters upon a computer monitor's screen |
WO1996025012A1 (en) * | 1995-02-07 | 1996-08-15 | British Telecommunications Public Limited Company | Information services provision and management |
Non-Patent Citations (2)
Title |
---|
"Visual Dialog Showing Speech Interaction with an Intelligent Agent" IBM TDB, Bd. 39, Nr. 1, Januar 1996 (1996-01), Seiten 237-240, XP002072912 * |
M BEACKEN ET AL: "The Provision of Intelligent Agent-Based Enhanced Multimedia Network Services" AT&T TECHNICAL JOURNAL, Bd. 74, Nr. 5, September 1995 (1995-09) - Oktober 1995 (1995-10), Seiten 68-77, XP000531010 New York * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1096400A2 (de) * | 1999-10-26 | 2001-05-02 | Goldenchart Co., Ltd. | Ratgeber-System für die Verwaltung von Wertpapieren und Speichermedium mit dem Programm |
Also Published As
Publication number | Publication date |
---|---|
EP1031102A2 (de) | 2000-08-30 |
DE19744996A1 (de) | 1999-06-10 |
DE19881387D2 (de) | 2001-04-12 |
WO1999015997A3 (de) | 1999-09-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Allen-Meares et al. | Social work practice: Integrating qualitative and quantitative data collection techniques | |
DE69807108T2 (de) | Teilnehmerregistrier- und zugangskontrollsystem und dazugehörige verfahren | |
EP0834155B1 (de) | Verfahren zur ausgabe von chipkarten | |
DE10214069A1 (de) | Aufzeichnen von Bildern zusammen mit Verbindungsinformationen | |
CN108347490A (zh) | 一种基于生物识别技术的校园应用装置及系统 | |
CN106570809A (zh) | 一种基于多特征的水库移民电子问卷系统 | |
Tucker et al. | Photo-interviewing: A tool for evaluating technological innovations | |
CA2480900A1 (en) | System and method for video-based online interview training | |
Yorke | Undergraduate non‐completion in England: Some implications for the higher education system and its institutions | |
WO1999015997A2 (de) | Virtuelle personen zur hilfe bei der nutzung von geräten und kommunikativen netzen insbesondere zur hilfe bei der ausgabe von individuell nutzbaren karten | |
CN116416839A (zh) | 一种基于物联网实训系统的实训辅助教学的方法 | |
DE4414360C2 (de) | Interaktives Steuerungssystem mit mehreren Anzeigen und Verfahren zum Betreiben eines solchen | |
DE60208199T2 (de) | Verfahren zur Verarbeitung eines Texts, einer Geste, eines Gesichtsausdruckes und/oder Verhaltensbeschreibung mit einer Prüfung auf Autorisierung für die Verwendung entsprechender Profile für die Synthese | |
DE10040948A1 (de) | Ein verteiltes technisches System für die Partnersuche, Partnerschaftseignungsprüfung und Bekanntmachung | |
DE10019661A1 (de) | Verfahren zum Durchführen einer Zugangskontrolle | |
DE19835092C2 (de) | Verfahren zum Betrieb eines computergesteuerten Vermittlungssystems | |
DE102007035844A1 (de) | Verfahren zur computerunterstützten Erzeugung einer interaktiven dreidimensionalen virtuellen Realität | |
DE60219298T2 (de) | Verfahren zur steuerung einer elektronischen einrichtung und elektronisches system | |
Tucho | Factors influencing the successful completion of the General Educational Development (GED) program at the Community College of Philadelphia (CCP) as perceived by the GED students | |
Brouse | A process for use of multimedia information in requirements identification and traceability | |
DE19742237A1 (de) | Virtuelle Personen zur Hilfe bei der Nutzung von Geräten und kommunikativen Netzen insbesondere zur Hilfe bei der Ausgabe von individuell nutzbaren Karten | |
Motter | The role of the media in educational policy formation and legitimation in Brazil: 1995-2008 | |
DE10005987A1 (de) | System und Verfahren zum computerunterstützten Lernen | |
WO1998029841A2 (de) | Erkennungssystem zum suchen und erkennen von datenmustern und identifizierungssystem zum speichern und erkennen von datenmustern | |
Toney | A second chance—for the first time: Movement formation among formerly incarcerated people |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): DE US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): DE US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998952647 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09509204 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1998952647 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
REF | Corresponds to |
Ref document number: 19881387 Country of ref document: DE Date of ref document: 20010412 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 19881387 Country of ref document: DE |
|
WWR | Wipo information: refused in national office |
Ref document number: 1998952647 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998952647 Country of ref document: EP |