WO2007021291A2 - System and method for interpretive garments - Google Patents

System and method for interpretive garments Download PDF

Info

Publication number
WO2007021291A2
WO2007021291A2 PCT/US2005/036864 US2005036864W WO2007021291A2 WO 2007021291 A2 WO2007021291 A2 WO 2007021291A2 US 2005036864 W US2005036864 W US 2005036864W WO 2007021291 A2 WO2007021291 A2 WO 2007021291A2
Authority
WO
WIPO (PCT)
Prior art keywords
garment
symbols
marking
markings
mask
Prior art date
Application number
PCT/US2005/036864
Other languages
French (fr)
Other versions
WO2007021291A3 (en
Inventor
Dawne P. Weisman
Brian Elan Lee
Original Assignee
Edoc Apparel Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Edoc Apparel Llc filed Critical Edoc Apparel Llc
Publication of WO2007021291A2 publication Critical patent/WO2007021291A2/en
Publication of WO2007021291A3 publication Critical patent/WO2007021291A3/en

Links

Classifications

    • AHUMAN NECESSITIES
    • A41WEARING APPAREL
    • A41DOUTERWEAR; PROTECTIVE GARMENTS; ACCESSORIES
    • A41D27/00Details of garments or of their making
    • A41D27/08Trimmings; Ornaments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/043Masking or blinding of tables, e.g. lookup, substitution or mapping

Definitions

  • Some conventional garments are marked with text, which can be read by members of the general public and provide messages/information to all who care to read the text.
  • Figure 1 is a substitution table containing an exemplary substitutional code used in an encryption based implementation of an interpretive garment marking system.
  • Figure 2 is an elevational front side view of a garment incorporating the exemplary substitutional code shown in Figure 1.
  • Figure 3 is a keyed character table containing exemplary keyed characters used in a key based implementation of the interpretive garment marking system.
  • Figure 4 is an elevational front side view of a garment incorporating the exemplary keyed characters shown in Figure 3.
  • Figure 5 is a schematic illustration of an example message containing a camouflaged character based implementation of the interpretive garment marking system.
  • Figure 6 is an elevational front side view of a garment incorporating the exemplary camouflaged characters shown in Figure 5.
  • Figure 7 a flowchart of an exemplary challenge-response authentication method for the interpretive garment marking system.
  • Figure 8 is a schematic of an associated first implementation of the authentication method of Figure 7.
  • Figure 9 is a schematic of an associated second implementation of the authentication method of Figure 7.
  • Figure 10 is a flowchart of an exemplary masking method for the interpretative garment marking system.
  • Figure 11 is a schematic of an associated first implementation of the masking method of Figure 10.
  • Figure 12 are front side and back side elevational views of a garment associated with a second implementation of the exemplary masking method of Figure 10.
  • Figure 13 is an elevational front side view of the garment of Figure 12 during execution of the second implementation of the exemplary masking method of Figure 10.
  • Figure 14 is an elevational front side view of a pair of garments associated with a third implementation of the exemplary masking method of Figure 10.
  • Figure 15 is an elevational front side view of the pair of garments of Figure 14 during execution of the third implementation of the exemplary masking method of Figure 10.
  • Figure 16 is a schematic depicting exemplary symbols used in selection based implementations of the interpretive garment marking system.
  • Figure 17 is an elevational front side view of a garment incorporating the exemplary symbols shown in Figure 16 with a first selection based implementation of the interpretive garment marking system shown in use.
  • Figure 18 is an elevational front side view of a garment incorporating the exemplary symbols shown in Figure 16 with a second selection based implementation of the interpretive garment marking system.
  • Figure 19 is an elevational front side view of the garment of Figure 18 shown in use.
  • Figure 20 is a depiction of a hand in an exemplary position to be used with a signing based implementation of the interpretive garment marking system.
  • Figure 21 is an elevational front side view of a garment incorporating position markers for the exemplary hand position of Figure 20 for use with the signing based implementation of the interpretive garment marking system.
  • Figure 22 is an elevational front side view of a garment incorporating a physical manipulation implementation of the interpretive garment marking system shown in three degrees of message covering.
  • Figure 23 is an elevational front side view of a garment incorporating a single garment combination implementation of the interpretive garment marking system shown in an uncombined mode.
  • Figure 24 is an elevational front side view of the garment of Figure 23 shown in a combined mode.
  • Figure 25 is an elevational front side view of a first garment used in a multiple garment combination implementation of the interpretive garment marking system shown in an uncombined mode.
  • Figure 26 is an elevational front side view of a second garment used in the multiple garment combination implementation of the interpretive garment marking system shown in an uncombined mode.
  • Figure 27 is an elevational front side view of the first garment of Figure 25 and the second garment of Figure 26 shown in a combined mode.
  • Figure 28 is an elevational front side view of a garment incorporating the exemplary camouflaged characters shown in Figure 5 and incorporating other symbols on the garment.
  • Figure 29 is an elevational front side view of the garment of Figure 28 further showing a portion of an interior surface containing a base message.
  • Figure 30 is a schematic of a correspondence involving the base message shown in Figure 29.
  • Figure 31 is a schematic of a correspondence involving a message involving the symbols of Figure 28.
  • Figure 32 is a schematic of a implementation using the garment of Figure
  • Figure 33 is a table containing a floral code.
  • Figure 34 is an implementation using the floral code from the table of Figure 33.
  • An interpretive garment marking system and method allows for one or more garments to be used to convey messages or information, or otherwise provide forms of interaction with a first group of one or more humans (referred to herein as "the private group”). Conveyance and interaction with the first group is done without conveyance and interaction with a second different group of humans (referred to herein as "the public group") even though the humans of both the private group and the public group have substantially similar access to visually perceive the garments.
  • the humans of the private and public groups differ in that the humans of the private group have an ability to acquire information through use of one or more marked garments of the system by interpretation including decryption, unlocking, decloaking, authentication, masking, selection, signing, manipulation, combining, and/or combinations thereof.
  • an ability to interpret the one or more garments used can be obtained through various ways including training, use of a reference, natural ability, and/or possession of a communication device along with visual access to the one or more garments.
  • the system has many uses.
  • the system could be used in an educational setting where children are encouraged to learn forms of abstract thinking through one or more mechanisms of interpretation available for implementation with the system.
  • This abstract thinking could be encouraged through use of the system since children are typically motivated to be included within a group-private group in this case.
  • to belong to the private group one must be able to communicate with other members of the private group by either providing a message or other information to others in the private group through use of the system and/or interpret messages provided through the system.
  • a motivation to belong to a private group also motivates to acquire skill in interpretation and abstract thinking involved with the system.
  • adolescents tend to seek forms of privacy in communication with one another.
  • the system offers many forms of communication that can be performed in a private manner even while communication occurs in a public setting. Consequently, the system may assist with desired communication in settings that are otherwise less conducive to such communication.
  • An encryption based implementation of the system can use a substitution table 100 such as that shown in Figure 1 containing a substitutional code with sufficient mapping information for encryption using at least in part a substitutionary approach.
  • substitutionary approach an original plaintext letter 102 of a word is replaced by a substitute ciphertext letter 104 when the word is being marked onto a garment.
  • a garment 106 depicted in Figure 2 has been marked with ciphertext words 108 that are encrypted according to the substitution table 100.
  • the ciphertext words 108 are encrypted on the garment 106 as "mlgsrmt gl srwv.” Through use of the substitution table 100 or by other ways, information can be acquired by decrypting the words 108 on the garment 106 to form a plaintext message "nothing to hide”. Other plaintext messages, phrases, story elements, or other uses of an established language can be disguised or otherwise alternatively represented by marking ciphertext on a garment with encryption.
  • substitution involves transforming at least a portion of a plaintext message into something else.
  • Another method of encryption involves permutation, which involves moving portions of plaintext around.
  • permutation For example, an exemplary permutation method could reverse pairs of plaintext letters such that ABCD would become BADC.
  • Other implementations can combine substitution with permutation to enhance encryption.
  • a keyed character table 120 containing exemplary keyed characters 122 used in a key based implementation of the system is shown in Figure 3.
  • the keyed character table 120 further includes a key location 124 that shows location of a key 126 in the depicted example, the concave side of the curved interior lines, and a resolved character 128 that results when the key is utilized.
  • each of the keys 126 is utilized by covering of the key such as by with a digit of a hand to block a portion of the keyed character.
  • the keys 126 show a person where to place a finger to block the view of the lines in that area of the keyed character 122, thus producing for the viewing by the user the change of the resolved character 128, which is readable as a letter.
  • the keyed message 132 of Figure 4 when the keyed characters 122 are all resolved, reads "NOTHING TO HIDE".
  • the depicted implementation of the keyed characters 122 uses characters of a particular shape to be integrated with the keys 126 given the particular font of the keyed characters and placement and shape of the keys.
  • fonts can be used for the keyed characters 122 and other shaping and placement of the keys 126 can also be used.
  • Other implementations may use keyed signals and/or symbols, alone or in combination with the keyed characters 122.
  • Other rules regarding formation or creation of characters, symbols, or signals can be used to produce other forms of the keys 126.
  • camouflaged message 140 having camouflaged characters 142 associated with a camouflaged character based implementation of the interpretive garment marking system is shown in Figure 5.
  • the camouflaged characters 142 are positioned with respect to other elements displayed such as graphic elements 144 or other garment features so that the camouflaged characters are less apparent to an undiscerning eye.
  • a garment 146 incorporating the exemplary camouflaged characters 142 is shown in Figure 6.
  • Other styles of camouflage are used with other implementations in which characters, signals, and/or symbols are hidden from undiscerning eyes within graphic elements of the garment or other garment features.
  • a challenge-response authentication method 150 for the interpretive garment marking system is shown in Figure 7 along with an associated first example 160 shown in Figure 8 and an associated second example 180 shown in Figure 9.
  • the method 150 receives a challenge (step 152) generally from a communication device.
  • the challenge typically contains instructions to assist in acquiring information somehow through the use of or otherwise association with a garment of the system.
  • a computer 162 displays a prompt
  • a garment 166 is entitled "John's bike” 168 and is marked with a representation 170 of a motorcycle having an indication 172 of a coded word, as depicted, coded according to the character table 120 of Figure 3 that when the coded word is decoded it reads "fit.”
  • the user would locate the garment and decode the word marked on the garment to read "fit.” In other implementations other alphanumeric text or other symbology can be used.
  • the user or other would then provide a response (step 156) such as through use of the communication device.
  • the computer 162 is used to transmit a response 174 in the form of the word "fit.”
  • the method 150 then involves having the user or other receive a reward (step 158).
  • the computer 162 transmits a message 176, which can be a portion of a story or other type of information.
  • reward content can be presented through a phone, television, film, book, other garments, short messaging service, or other media, communication device, or information providing system and/or service.
  • a garment 182 has a keyed message 132 that is camouflaged by graphic elements 144.
  • a short message service (SMS) of a cell phone 186 is then used to send a response (step 156) in the form of the first word "nothing" 188 of the message contained within the keyed message 132.
  • the cell phone 186 is then used to receive a reward (step 158) in the form of an SMS message containing a portion of a story.
  • SMS short message service
  • FIG. 10 An exemplary masking method 200 for the interpretive garment marking system is shown in Figure 10 in which a mask is obtained (step 202).
  • the mask has highlighting portions and non-highlighting portions that are aligned with emphasized portions and non-emphasized portions, respectively, of a garment (step 204).
  • the non- highlighting portions are used to de-emphasize portions of a garment so that some markings on the garment are ignored in favor of markings that are emphasized by the highlighting portions of the mask, thereby data contained in markings on the garment can be perceived (step 206).
  • the non-highlighting portions can cover or at least partially obscure the non-emphasized portions of the garment so that visual perception of the markings within the non-emphasized portions is at least reduced if not eliminated.
  • the non-emphasized portions may be resolved from another sort of distinction between how the non-highlighting portions and the highlighting portions engage with their respective portions of the garment to cause a distinction in how the non-emphasized portions and emphasized portions are visually perceived. This distinction may be caused by a distinction in coloring, shading, framing, obscuring or other action on the non-emphasized and/or emphasized portions of the garment depending upon the action involved.
  • the highlighting portions of the mask are generally some sort of framed areas, windows, voids, openings, colored transparencies or other features to distinguish the emphasized portions of the garment from the non-emphasized portions of the garment.
  • a first example 210 of the masking method 200 is shown in Figure 11 in which a garment 212 has character based markings 214.
  • a computer 216 is used to retrieve a displayed mask 218.
  • a paper version of the mask 220 is printed having indications where openings 222 are to be cut out from the paper to form the highlighting portions of the mask whereas remaining portions 224 of the paper are used as the non- highlighting portions of the mask (step 202).
  • the mask 220 is placed over the garment 212 to align the openings 222 with portions of the markings 214 to resolve the message "nothing to hide".
  • a second example 230 of the masking method 200 is shown in Figures 12 and 13 in which a garment 232 has the markings 214 on a front side 234.
  • the garment has a backside 236 that can be used as a mask.
  • the backside 236 has several openings 238 that are highlighting portions.
  • the openings 238 allow the rays of light to distinguish those parts of the markings 214 in alignment with the openings as emphasized portions 242 as shown in Figure 13.
  • the garment is so fabricated to implement a predetermined alignment between the openings 238 and the emphasized portions 242 of the markings 214.
  • a third example 250 of the masking method 200 is shown in Figures 14 and 15 in which a first garment 252 has the markings 214 on a front side 254.
  • a second garment 256 has a front side 258 with openings 260 to be used as highlighting portions of a mask.
  • a combination 262 is formed as shown in Figure 15. The combination 262 allows for alignment of the openings 260 with those portions of the markings 214 that result as emphasized portions 264 to resolve the message "nothing to hide".
  • a garment may contain another kind of mask or other decoding key within itself such as a Rosetta stone hidden somewhere on the garment.
  • Other forms such as Web, phone, TV, film, books, other garments, SMS, etc. may contain unlocking mechanisms for a code (cipher, print, etc.) on a garment containing a word, thought, or phrase.
  • a collection of symbols 270 used in exemplary selection based implementations of the interpretive garment marking system is shown in Figure 16. In this example, the collection 270 includes a happy face 272, a bored face 274, and a sad face 276.
  • the collection 270 is shown in Figure 17 as marking a garment 278 with the symbols dispersed about the garment so that they are sufficiently separated from each other to allow for selection of a particular symbol out of the collection by pointing or otherwise gesturing to the area on the garment in which a particular symbol is located.
  • a user can convey a ⁇ message or other information represented in this case by one of the collection of symbols 270.
  • collections of other markings can be utilized.
  • a hand 280 of a wearer of the garment 278 is gesturing toward the happy face 272, which may be done to convey to a viewer familiar with the interpretive garment marking system a feeling of the wearer associated with happiness.
  • a portion of the collection 270 is shown in Figure 18 as marking a garment 282 with the happy face 272 and the sad face 276 symbols dispersed about the garment.
  • a portion of a sentence 284 is also marked on the garment 282 in which a selection of one of the symbols complements the sentence portion 284 to complete a sentence in the present depicted case concerning feelings of a wearer of the garment based upon a selection between the happy face 272 symbol and the sad face 276 symbol.
  • a statement of these feelings is conveyed to others familiar with the interpretive garment marking system by covering all but one of the symbols.
  • this covering is accomplished by the hand 280 of the wearer of the garment 282 being placed over the symbol to be excluded from consideration by others (in this case the sad face 276 symbol).
  • the happy face 272 is the only symbol that remains uncovered so that the wearer of the garment 282 is able to undergo self-expression of happiness without having to vocalize such feelings.
  • interpretive garment marking system uses other markings (sometimes of a more complex and less intuitive nature) to involve gesturing language with garments. Implementations using other placement of signals, characters, or symbols on one or more garments that indicate one or more words, thoughts, or phrases based on location and/or orientation of the wearer's limbs or digits are also included within the system.
  • a depiction of a right hand 290 in an exemplary orientation 291 to be used with a signing based implementation of the interpretive garment marking system is shown in Figure 20.
  • the right hand 290 is depicted as having a first digit (thumb) 292, a second digit 294, a third digit 296, a fourth digit 298, and a fifth digit 300.
  • a garment 302 is shown in Figure 21 as having markings 304 with a first digit signing placement indicator 306, second digit signing placement indicator 308, and fifth digit signing placement indicator 310.
  • the markings 304 are intended to guide placement of the first digit, the second digit, and the fifth digit of the wearer's hand on to the first digit signing placement indicator 306, the second digit signing placement indicator 308, and the fifth digit signing placement indicator 310, respectively, to cause the wearer's hand to assume the depicted orientation 291 of Figure 20 and thereby convey an expression by the wearer of the garment of "I love you" to a nearby visual observer without need of vocalization.
  • the various signing placement indicators of the markings 304 can be further distinguished from one another by differences in shape, color, or other feature to additionally guide placement. Alternatively, the markings 304 could serve as a message to one or more trained observers independent of whether placement of the hand 290 occurs thereon.
  • Other signing based implementations use other signing placement indicators for other orientations of one or more digits, hands, and/or limbs to convey various expressions.
  • a garment 312 having a left sleeve 314 utilizing a physical manipulation implementation of the interpretive garment marking system is shown in a first stage, a second stage, and a third stage of message covering in Figure 22.
  • the first stage 316 involves the sleeve 314 fully unrolled so that no message is shown.
  • the second stage 318 the sleeve's end portion is rolled or flipped up a first degree to reveal a portion of its inner surface with a marking having a first message thereon (e.g. "Nothing" for the case depicted in Figure 22). Care is used in rolling or flipping the sleeve so that the end portion of the sleeve 314 is turned inside out with one fold so that the first message is not otherwise covered up in the rolling process.
  • the sleeve 314 is rolled or flipped up a second degree larger than the first degree to reveal a second marking positioned on the inner surface of the sleeve with a second message thereon (e.g. "to Hide” for the case depicted in Figure 22) along with the first message.
  • a second message thereon e.g. "to Hide” for the case depicted in Figure 22
  • the sleeve is further turned inside out with still one fold so that both the first message and the second message are visible.
  • Other physical manipulation implementations can be used in which garments are physically manipulated in other ways to decode or reveal characters, symbols, or other sorts of information or messages through such operations as folding, rolling, pulling strings, turning portions of garments or turning whole garments inside-out to either wear or display, or other sorts of manipulation of garments.
  • the message "NOTHING TO HIDE" has been used as an example for several embodiments described, the messages and information may be used with the interpretive garment marking system.
  • a garment 322 incorporating a single garment combination implementation of the interpretive garment marking system is shown in an uncombined mode 323 in Figure 23.
  • the garment 322 has a trunk 324 having first markings 326 and a left sleeve 328 with second markings 330.
  • the first markings 326 and the second markings 330 are both fully visible.
  • the left sleeve 328 is folded to bring it across the trunk 324.
  • the left sleeve 328 blocks some of the first markings 326 from view and the second markings 330 remain visible to complement that portion of the first markings that also remains visible.
  • the second markings 330 combine with the visible portion of the first markings 326 to produce recognizable characters "edoc" 334 and a symbol 336 (a cross in a circle).
  • other garments are used in particular physical configurations to uncover, reveal, or otherwise decode hidden messages.
  • the combination mode 332 may be achieved while wearing the garment 322 by crossing the left arm of the wearer over his chest to combine the second markings 330 with the first markings 326.
  • a first garment 338 having first markings 340 shown in an uncombined mode in Figure 25 and a second garment 342 having second markings 344 shown in an uncombined mode in Figure 26 are both used in a multiple garment combination implementation of the interpretive garment marking system.
  • the first garment 338 and the second garment 342 are shown in Figure 27 being brought side by side with each other in a combined mode 346.
  • the first markings 340 and the second markings 344 combine to form a group of characters "edoc" 348 and a symbol 350 (a cross in a circle).
  • two or more people wearing associated garments decode or otherwise uncover the message by interacting with one another, being adjacent to, or being in proximity with one another. This can be accomplished by such circumstances as the persons standing next to each other or having one person's arm around another person to reveal an association between markings on their respective garments.
  • Another exemplary implementation includes a garment 352 shown if Figure 28 as having the camouflaged characters 142 and the graphic elements 144 as used in other implementations discussed above.
  • the garment 352 further has symbols 354 partially hidden within the camouflaged characters 142 and/or the graphic elements 144.
  • a user locates the garment 352 and finds a hang tag 356 with instructions 357 affixed to the garment.
  • the instructions 357 reveal that a base message is located on the garment 352, such as on an interior surface of the garment, for instance, on an inside front bottom surface 358 as shown in Figure 29.
  • the instructions 357 may reveal that the base message is somehow coded or otherwise concealed.
  • the instructions may just indicate a general location of the base message and leave it to a user to discover the nature of the base message, which also include a series of symbols, characters and/or images.
  • the instructions may also state what the content of the base message is by expressing the content in a predicted functional language of a likely user type. For instance, in the case of the present depicted implementation, for an likely user having English as the user's functional language, the instructions may indicate that message content may be "nothing to hide," with the equivalent base message being the keyed message 132, coded as shown in Figure 29. A user knowing the that the base message is coded could then examine the base message to determine how it was coded by using the knowledge of the message content conveyed by the instructions 357.
  • the depicted case of the base message involves the keyed message 132 having a message content of "nothing to hide" as the decoded message with the resolved characters 128 as shown in Figure 30.
  • a user may deduce a translation procedure using a correspondence 360 providing the corresponding keyed locations 124 of the keyed characters 122 and offering keys 126 to guide decoding of the keyed message 132.
  • the user could then examine the symbols 354 on the garment to decode them.
  • a correspondence 368 for a keyed message 370 is shown in Figure 31 with an associated decoded message having the resolved characters 379, "scream.”
  • a user can then enter the decoded message, "scream,” into a computer 376, shown in Figure 32, or other device, having a monitor 378 displaying an entry screen 380.
  • a reward such as a story content 382 can be supplied by the computer 376.
  • Some implementations use a floral code 382 shown in Figure 33 having floral symbols 384 associated with an alphabet 386 and a numerical order 388.
  • An exemplary floral code implementation 390 of the word "deified" having seven letters of the floral code 382 is shown in Figure 34 having a first floral symbol 392-1 through a seventh floral symbol 392-7 corresponding to a first of the seven letters 394-1 of

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Textile Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Professional, Industrial, Or Sporting Protective Garments (AREA)
  • Outerwear In General, And Traditional Japanese Garments (AREA)

Abstract

An interpretive garment marking system and method allows for one or more garments to be used to convey messages or information, or otherwise provide forms of interaction with a first group of humans. Conveyance and interaction with the first group is done without conveyance and interaction with a second different group of humans even though the humans of both groups have substantially similar access to visually perceive the garments. Implementations include encryption, keying, camouflage, authentication, masking, selection, signing, manipulation, and/or combination.

Description

SYSTEM AND METHOD FOR INTERPRETIVE GARMENTS
BACKGROUND OF THE INVENTION
Description of the Related Art
Some conventional garments are marked with text, which can be read by members of the general public and provide messages/information to all who care to read the text.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S)
Figure 1 is a substitution table containing an exemplary substitutional code used in an encryption based implementation of an interpretive garment marking system.
Figure 2 is an elevational front side view of a garment incorporating the exemplary substitutional code shown in Figure 1.
Figure 3 is a keyed character table containing exemplary keyed characters used in a key based implementation of the interpretive garment marking system.
Figure 4 is an elevational front side view of a garment incorporating the exemplary keyed characters shown in Figure 3.
Figure 5 is a schematic illustration of an example message containing a camouflaged character based implementation of the interpretive garment marking system.
Figure 6 is an elevational front side view of a garment incorporating the exemplary camouflaged characters shown in Figure 5.
Figure 7 a flowchart of an exemplary challenge-response authentication method for the interpretive garment marking system. Figure 8 is a schematic of an associated first implementation of the authentication method of Figure 7.
Figure 9 is a schematic of an associated second implementation of the authentication method of Figure 7.
Figure 10 is a flowchart of an exemplary masking method for the interpretative garment marking system. Figure 11 is a schematic of an associated first implementation of the masking method of Figure 10.
Figure 12 are front side and back side elevational views of a garment associated with a second implementation of the exemplary masking method of Figure 10.
Figure 13 is an elevational front side view of the garment of Figure 12 during execution of the second implementation of the exemplary masking method of Figure 10.
Figure 14 is an elevational front side view of a pair of garments associated with a third implementation of the exemplary masking method of Figure 10.
Figure 15 is an elevational front side view of the pair of garments of Figure 14 during execution of the third implementation of the exemplary masking method of Figure 10.
Figure 16 is a schematic depicting exemplary symbols used in selection based implementations of the interpretive garment marking system.
Figure 17 is an elevational front side view of a garment incorporating the exemplary symbols shown in Figure 16 with a first selection based implementation of the interpretive garment marking system shown in use.
Figure 18 is an elevational front side view of a garment incorporating the exemplary symbols shown in Figure 16 with a second selection based implementation of the interpretive garment marking system.
Figure 19 is an elevational front side view of the garment of Figure 18 shown in use.
Figure 20 is a depiction of a hand in an exemplary position to be used with a signing based implementation of the interpretive garment marking system.
Figure 21 is an elevational front side view of a garment incorporating position markers for the exemplary hand position of Figure 20 for use with the signing based implementation of the interpretive garment marking system.
Figure 22 is an elevational front side view of a garment incorporating a physical manipulation implementation of the interpretive garment marking system shown in three degrees of message covering.
Figure 23 is an elevational front side view of a garment incorporating a single garment combination implementation of the interpretive garment marking system shown in an uncombined mode. Figure 24 is an elevational front side view of the garment of Figure 23 shown in a combined mode.
Figure 25 is an elevational front side view of a first garment used in a multiple garment combination implementation of the interpretive garment marking system shown in an uncombined mode.
Figure 26 is an elevational front side view of a second garment used in the multiple garment combination implementation of the interpretive garment marking system shown in an uncombined mode.
Figure 27 is an elevational front side view of the first garment of Figure 25 and the second garment of Figure 26 shown in a combined mode.
Figure 28 is an elevational front side view of a garment incorporating the exemplary camouflaged characters shown in Figure 5 and incorporating other symbols on the garment.
Figure 29 is an elevational front side view of the garment of Figure 28 further showing a portion of an interior surface containing a base message.
Figure 30 is a schematic of a correspondence involving the base message shown in Figure 29.
Figure 31 is a schematic of a correspondence involving a message involving the symbols of Figure 28. Figure 32 is a schematic of a implementation using the garment of Figure
28 with a scenario involving inputting an decoded message from the symbols of Figure 28 into a computer.
Figure 33 is a table containing a floral code.
Figure 34 is an implementation using the floral code from the table of Figure 33.
DETAILED DESCRIPTION OF THE INVENTION
An interpretive garment marking system and method allows for one or more garments to be used to convey messages or information, or otherwise provide forms of interaction with a first group of one or more humans (referred to herein as "the private group"). Conveyance and interaction with the first group is done without conveyance and interaction with a second different group of humans (referred to herein as "the public group") even though the humans of both the private group and the public group have substantially similar access to visually perceive the garments. The humans of the private and public groups differ in that the humans of the private group have an ability to acquire information through use of one or more marked garments of the system by interpretation including decryption, unlocking, decloaking, authentication, masking, selection, signing, manipulation, combining, and/or combinations thereof. Depending upon a particular implementation of the system, an ability to interpret the one or more garments used can be obtained through various ways including training, use of a reference, natural ability, and/or possession of a communication device along with visual access to the one or more garments.
The system has many uses. For example, the system could be used in an educational setting where children are encouraged to learn forms of abstract thinking through one or more mechanisms of interpretation available for implementation with the system. This abstract thinking could be encouraged through use of the system since children are typically motivated to be included within a group-private group in this case. In this example, to belong to the private group, one must be able to communicate with other members of the private group by either providing a message or other information to others in the private group through use of the system and/or interpret messages provided through the system. Thus a motivation to belong to a private group also motivates to acquire skill in interpretation and abstract thinking involved with the system. In another example, adolescents tend to seek forms of privacy in communication with one another. The system offers many forms of communication that can be performed in a private manner even while communication occurs in a public setting. Consequently, the system may assist with desired communication in settings that are otherwise less conducive to such communication. An encryption based implementation of the system can use a substitution table 100 such as that shown in Figure 1 containing a substitutional code with sufficient mapping information for encryption using at least in part a substitutionary approach. By the substitutionary approach, an original plaintext letter 102 of a word is replaced by a substitute ciphertext letter 104 when the word is being marked onto a garment. For example, a garment 106 depicted in Figure 2 has been marked with ciphertext words 108 that are encrypted according to the substitution table 100. The ciphertext words 108 are encrypted on the garment 106 as "mlgsrmt gl srwv." Through use of the substitution table 100 or by other ways, information can be acquired by decrypting the words 108 on the garment 106 to form a plaintext message "nothing to hide". Other plaintext messages, phrases, story elements, or other uses of an established language can be disguised or otherwise alternatively represented by marking ciphertext on a garment with encryption.
In general, substitution involves transforming at least a portion of a plaintext message into something else. Another method of encryption involves permutation, which involves moving portions of plaintext around. For example, an exemplary permutation method could reverse pairs of plaintext letters such that ABCD would become BADC. Other implementations can combine substitution with permutation to enhance encryption. A keyed character table 120 containing exemplary keyed characters 122 used in a key based implementation of the system is shown in Figure 3. For each keyed character 122, the keyed character table 120 further includes a key location 124 that shows location of a key 126 in the depicted example, the concave side of the curved interior lines, and a resolved character 128 that results when the key is utilized. In the depicted case, each of the keys 126 is utilized by covering of the key such as by with a digit of a hand to block a portion of the keyed character. The keys 126 show a person where to place a finger to block the view of the lines in that area of the keyed character 122, thus producing for the viewing by the user the change of the resolved character 128, which is readable as a letter. For example, the keyed message 132 of Figure 4, when the keyed characters 122 are all resolved, reads "NOTHING TO HIDE". The depicted implementation of the keyed characters 122 uses characters of a particular shape to be integrated with the keys 126 given the particular font of the keyed characters and placement and shape of the keys. Other fonts can be used for the keyed characters 122 and other shaping and placement of the keys 126 can also be used. Other implementations may use keyed signals and/or symbols, alone or in combination with the keyed characters 122. Other rules regarding formation or creation of characters, symbols, or signals can be used to produce other forms of the keys 126.
An example of a camouflaged message 140 having camouflaged characters 142 associated with a camouflaged character based implementation of the interpretive garment marking system is shown in Figure 5. The camouflaged characters 142 are positioned with respect to other elements displayed such as graphic elements 144 or other garment features so that the camouflaged characters are less apparent to an undiscerning eye. A garment 146 incorporating the exemplary camouflaged characters 142 is shown in Figure 6. Other styles of camouflage are used with other implementations in which characters, signals, and/or symbols are hidden from undiscerning eyes within graphic elements of the garment or other garment features.
A challenge-response authentication method 150 for the interpretive garment marking system is shown in Figure 7 along with an associated first example 160 shown in Figure 8 and an associated second example 180 shown in Figure 9. The method 150 receives a challenge (step 152) generally from a communication device. The challenge typically contains instructions to assist in acquiring information somehow through the use of or otherwise association with a garment of the system. For instance in the first example 160, a computer 162 displays a prompt
164 asking for a word found on John's bike. A user or other would then research this issue through on-line access, such as the Internet, or local access, information concerning a garment (step 154). In the first example 160, a garment 166 is entitled "John's bike" 168 and is marked with a representation 170 of a motorcycle having an indication 172 of a coded word, as depicted, coded according to the character table 120 of Figure 3 that when the coded word is decoded it reads "fit." As a result of the research step 164, the user would locate the garment and decode the word marked on the garment to read "fit." In other implementations other alphanumeric text or other symbology can be used. According to the method 150, the user or other would then provide a response (step 156) such as through use of the communication device. In the first example 160, the computer 162 is used to transmit a response 174 in the form of the word "fit."
The method 150 then involves having the user or other receive a reward (step 158). In the first example 160, the computer 162 transmits a message 176, which can be a portion of a story or other type of information. In other implementations reward content can be presented through a phone, television, film, book, other garments, short messaging service, or other media, communication device, or information providing system and/or service.
In the second example 180 of Figure 9, a garment 182 has a keyed message 132 that is camouflaged by graphic elements 144. A user or other researches the garment 182 (step 154) to acquire information pertaining to a message "NOTHING TO HIDE" contained within the keyed message 132 as described above with respect to Figures 3 and 4. In the second example 180, a short message service (SMS) of a cell phone 186 is then used to send a response (step 156) in the form of the first word "nothing" 188 of the message contained within the keyed message 132. The cell phone 186 is then used to receive a reward (step 158) in the form of an SMS message containing a portion of a story.
An exemplary masking method 200 for the interpretive garment marking system is shown in Figure 10 in which a mask is obtained (step 202). The mask has highlighting portions and non-highlighting portions that are aligned with emphasized portions and non-emphasized portions, respectively, of a garment (step 204). The non- highlighting portions are used to de-emphasize portions of a garment so that some markings on the garment are ignored in favor of markings that are emphasized by the highlighting portions of the mask, thereby data contained in markings on the garment can be perceived (step 206).
In some implementations, the non-highlighting portions can cover or at least partially obscure the non-emphasized portions of the garment so that visual perception of the markings within the non-emphasized portions is at least reduced if not eliminated. In other implementations, the non-emphasized portions may be resolved from another sort of distinction between how the non-highlighting portions and the highlighting portions engage with their respective portions of the garment to cause a distinction in how the non-emphasized portions and emphasized portions are visually perceived. This distinction may be caused by a distinction in coloring, shading, framing, obscuring or other action on the non-emphasized and/or emphasized portions of the garment depending upon the action involved. In some implementations, the highlighting portions of the mask are generally some sort of framed areas, windows, voids, openings, colored transparencies or other features to distinguish the emphasized portions of the garment from the non-emphasized portions of the garment.
A first example 210 of the masking method 200 is shown in Figure 11 in which a garment 212 has character based markings 214. A computer 216 is used to retrieve a displayed mask 218. A paper version of the mask 220 is printed having indications where openings 222 are to be cut out from the paper to form the highlighting portions of the mask whereas remaining portions 224 of the paper are used as the non- highlighting portions of the mask (step 202). The mask 220 is placed over the garment 212 to align the openings 222 with portions of the markings 214 to resolve the message "nothing to hide". A second example 230 of the masking method 200 is shown in Figures 12 and 13 in which a garment 232 has the markings 214 on a front side 234. The garment has a backside 236 that can be used as a mask. The backside 236 has several openings 238 that are highlighting portions. When the garment 232 is viewed from the front side 234 with rays of light (not shown) striking the backside 236, the openings 238 allow the rays of light to distinguish those parts of the markings 214 in alignment with the openings as emphasized portions 242 as shown in Figure 13. The garment is so fabricated to implement a predetermined alignment between the openings 238 and the emphasized portions 242 of the markings 214. A third example 250 of the masking method 200 is shown in Figures 14 and 15 in which a first garment 252 has the markings 214 on a front side 254. A second garment 256 has a front side 258 with openings 260 to be used as highlighting portions of a mask. When the second garment 256 is placed over the first garment 252, such as when the first garment is firstly put on by a human and the second garment is secondly put on by the human, a combination 262 is formed as shown in Figure 15. The combination 262 allows for alignment of the openings 260 with those portions of the markings 214 that result as emphasized portions 264 to resolve the message "nothing to hide".
In other implementations of the masking method 200, other combinations of garments are used such is a combination of a tie, a hat, and a shirt, etc. A garment may contain another kind of mask or other decoding key within itself such as a Rosetta stone hidden somewhere on the garment. Other forms such as Web, phone, TV, film, books, other garments, SMS, etc. may contain unlocking mechanisms for a code (cipher, print, etc.) on a garment containing a word, thought, or phrase. A collection of symbols 270 used in exemplary selection based implementations of the interpretive garment marking system is shown in Figure 16. In this example, the collection 270 includes a happy face 272, a bored face 274, and a sad face 276. The collection 270 is shown in Figure 17 as marking a garment 278 with the symbols dispersed about the garment so that they are sufficiently separated from each other to allow for selection of a particular symbol out of the collection by pointing or otherwise gesturing to the area on the garment in which a particular symbol is located. By gesturing with respect to a particular symbol, a user can convey a ■ message or other information represented in this case by one of the collection of symbols 270. In other implementations, collections of other markings can be utilized. In the depicted example of the garment 278, a hand 280 of a wearer of the garment 278 is gesturing toward the happy face 272, which may be done to convey to a viewer familiar with the interpretive garment marking system a feeling of the wearer associated with happiness. A portion of the collection 270 is shown in Figure 18 as marking a garment 282 with the happy face 272 and the sad face 276 symbols dispersed about the garment. A portion of a sentence 284 is also marked on the garment 282 in which a selection of one of the symbols complements the sentence portion 284 to complete a sentence in the present depicted case concerning feelings of a wearer of the garment based upon a selection between the happy face 272 symbol and the sad face 276 symbol. A statement of these feelings is conveyed to others familiar with the interpretive garment marking system by covering all but one of the symbols.
As depicted in Figure 19, this covering is accomplished by the hand 280 of the wearer of the garment 282 being placed over the symbol to be excluded from consideration by others (in this case the sad face 276 symbol). As a result, the happy face 272 is the only symbol that remains uncovered so that the wearer of the garment 282 is able to undergo self-expression of happiness without having to vocalize such feelings.
Other selection based implementations of the interpretive garment marking system use other markings (sometimes of a more complex and less intuitive nature) to involve gesturing language with garments. Implementations using other placement of signals, characters, or symbols on one or more garments that indicate one or more words, thoughts, or phrases based on location and/or orientation of the wearer's limbs or digits are also included within the system. A depiction of a right hand 290 in an exemplary orientation 291 to be used with a signing based implementation of the interpretive garment marking system is shown in Figure 20. The right hand 290 is depicted as having a first digit (thumb) 292, a second digit 294, a third digit 296, a fourth digit 298, and a fifth digit 300. In the depicted orientation 291 of the right hand 290, the first digit 292, the second digit 294, and the fifth digit 300 are extended whereas the third digit 296 and the fourth digit 298 are retracted to convey a signing expression of "I love you." A garment 302 is shown in Figure 21 as having markings 304 with a first digit signing placement indicator 306, second digit signing placement indicator 308, and fifth digit signing placement indicator 310. The markings 304 are intended to guide placement of the first digit, the second digit, and the fifth digit of the wearer's hand on to the first digit signing placement indicator 306, the second digit signing placement indicator 308, and the fifth digit signing placement indicator 310, respectively, to cause the wearer's hand to assume the depicted orientation 291 of Figure 20 and thereby convey an expression by the wearer of the garment of "I love you" to a nearby visual observer without need of vocalization. The various signing placement indicators of the markings 304 can be further distinguished from one another by differences in shape, color, or other feature to additionally guide placement. Alternatively, the markings 304 could serve as a message to one or more trained observers independent of whether placement of the hand 290 occurs thereon. Other signing based implementations use other signing placement indicators for other orientations of one or more digits, hands, and/or limbs to convey various expressions.
A garment 312 having a left sleeve 314 utilizing a physical manipulation implementation of the interpretive garment marking system is shown in a first stage, a second stage, and a third stage of message covering in Figure 22. As shown, the first stage 316 involves the sleeve 314 fully unrolled so that no message is shown. With the second stage 318, the sleeve's end portion is rolled or flipped up a first degree to reveal a portion of its inner surface with a marking having a first message thereon (e.g. "Nothing" for the case depicted in Figure 22). Care is used in rolling or flipping the sleeve so that the end portion of the sleeve 314 is turned inside out with one fold so that the first message is not otherwise covered up in the rolling process.
In the third stage 320, the sleeve 314 is rolled or flipped up a second degree larger than the first degree to reveal a second marking positioned on the inner surface of the sleeve with a second message thereon (e.g. "to Hide" for the case depicted in Figure 22) along with the first message. Again, the sleeve is further turned inside out with still one fold so that both the first message and the second message are visible. Other physical manipulation implementations can be used in which garments are physically manipulated in other ways to decode or reveal characters, symbols, or other sorts of information or messages through such operations as folding, rolling, pulling strings, turning portions of garments or turning whole garments inside-out to either wear or display, or other sorts of manipulation of garments. Of course, while the message "NOTHING TO HIDE" has been used as an example for several embodiments described, the messages and information may be used with the interpretive garment marking system.
A garment 322 incorporating a single garment combination implementation of the interpretive garment marking system is shown in an uncombined mode 323 in Figure 23. The garment 322 has a trunk 324 having first markings 326 and a left sleeve 328 with second markings 330. In the uncombined mode 323, the first markings 326 and the second markings 330 are both fully visible. As shown in Figure 24, when the garment 322 is positioned in a combined mode 332, the left sleeve 328 is folded to bring it across the trunk 324. In the combined mode 332, the left sleeve 328 blocks some of the first markings 326 from view and the second markings 330 remain visible to complement that portion of the first markings that also remains visible. In the depicted implementation of the combined mode 332, the second markings 330 combine with the visible portion of the first markings 326 to produce recognizable characters "edoc" 334 and a symbol 336 (a cross in a circle). In other implementations, other garments are used in particular physical configurations to uncover, reveal, or otherwise decode hidden messages. The combination mode 332 may be achieved while wearing the garment 322 by crossing the left arm of the wearer over his chest to combine the second markings 330 with the first markings 326. A first garment 338 having first markings 340 shown in an uncombined mode in Figure 25 and a second garment 342 having second markings 344 shown in an uncombined mode in Figure 26 are both used in a multiple garment combination implementation of the interpretive garment marking system. The first garment 338 and the second garment 342 are shown in Figure 27 being brought side by side with each other in a combined mode 346. In the combined mode 346, the first markings 340 and the second markings 344 combine to form a group of characters "edoc" 348 and a symbol 350 (a cross in a circle). In the depicted implementation and other multiple garment combination implementations, two or more people wearing associated garments decode or otherwise uncover the message by interacting with one another, being adjacent to, or being in proximity with one another. This can be accomplished by such circumstances as the persons standing next to each other or having one person's arm around another person to reveal an association between markings on their respective garments. Another exemplary implementation includes a garment 352 shown if Figure 28 as having the camouflaged characters 142 and the graphic elements 144 as used in other implementations discussed above. The garment 352 further has symbols 354 partially hidden within the camouflaged characters 142 and/or the graphic elements 144. In an exemplary scenario, a user locates the garment 352 and finds a hang tag 356 with instructions 357 affixed to the garment.
In the exemplary implementation, the instructions 357 reveal that a base message is located on the garment 352, such as on an interior surface of the garment, for instance, on an inside front bottom surface 358 as shown in Figure 29. The instructions 357 may reveal that the base message is somehow coded or otherwise concealed. Alternatively, the instructions may just indicate a general location of the base message and leave it to a user to discover the nature of the base message, which also include a series of symbols, characters and/or images.
The instructions may also state what the content of the base message is by expressing the content in a predicted functional language of a likely user type. For instance, in the case of the present depicted implementation, for an likely user having English as the user's functional language, the instructions may indicate that message content may be "nothing to hide," with the equivalent base message being the keyed message 132, coded as shown in Figure 29. A user knowing the that the base message is coded could then examine the base message to determine how it was coded by using the knowledge of the message content conveyed by the instructions 357. The depicted case of the base message involves the keyed message 132 having a message content of "nothing to hide" as the decoded message with the resolved characters 128 as shown in Figure 30. A user may deduce a translation procedure using a correspondence 360 providing the corresponding keyed locations 124 of the keyed characters 122 and offering keys 126 to guide decoding of the keyed message 132. With this gained knowledge regarding coding of the base message as provided by the correspondence 360, the user could then examine the symbols 354 on the garment to decode them. For the depicted case, a correspondence 368 for a keyed message 370 is shown in Figure 31 with an associated decoded message having the resolved characters 379, "scream."
A user can then enter the decoded message, "scream," into a computer 376, shown in Figure 32, or other device, having a monitor 378 displaying an entry screen 380. Upon entry of the decoded message, "scream," a reward, such as a story content 382 can be supplied by the computer 376.
Some implementations use a floral code 382 shown in Figure 33 having floral symbols 384 associated with an alphabet 386 and a numerical order 388. An exemplary floral code implementation 390 of the word "deified" having seven letters of the floral code 382 is shown in Figure 34 having a first floral symbol 392-1 through a seventh floral symbol 392-7 corresponding to a first of the seven letters 394-1 of
"deified" through a seventh of the seven letters 394-7. The floral code implementation
390 has a symmetrical configuration due to the symmetrical nature of the word "deified." With other words the resultant floral code implementation would take on another configuration depending upon the word, phrase, sentence or other alphanumeric text to be coded.
From the foregoing it will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims.

Claims

CLAIMS The invention claimed is
1. A system comprising: a garment having markings, the markings including encrypted symbols.
2. The system of claim 1 wherein the encrypted symbols are encrypted at least in part in association with a substitution table.
3. The system of claim 1 wherein the encrypted symbols include encrypted characters.
4. The system of claim 1 wherein the garment is a shirt.
5. A system comprising: a garment having markings, the markings including keyed characters, each keyed character having a portion indicating a placement.
6. The system of claim 5 wherein the placement is a placement of a digit of a hand on the portion to observe the portion and reveal a resolved character.
7. A system comprising: a garment having markings, the markings having symbols and graphic elements, the graphic elements shaped and arranged with respect to the symbols to at least partially conceal the symbols from ready perception by a human.
8. The system of claim 7 wherein the symbols are characters.
9. A method comprising: receiving a challenge; researching a garment to determine a response to the challenge; providing the response; and receiving a reward based upon the response.
10. The method of claim 9 wherein the reward is associated with content presented by a mobile device.
11. The method of claim 9 wherein the mobile device presents audio content.
12. The method of claim 9 wherein the mobile device presents content through a display.
13. The method of claim 9 wherein the mobile device is a cell phone.
14. The method of claim 9 wherein the reward is associated with online content.
15. The method of claim 9 wherein the researching a garment includes accessing at least one of the following: an on-line network or a local storage.
16. The method of claim 9 wherein the researching a garment includes one of the following: decrypting symbols on the garment, unlocking symbols on the garment, decloaking symbols on the garment, masking symbols on the garment, manipulating the garment, combining a first portion of the garment with a second portion of the garment, or combining a portion of a first garment with a portion of a second garment.
17. The method of claim 9 wherein the receiving is done with a communication device.
18. A method comprising: acquiring a mask; aligning a mask with markings on a garment; and perceiving information from a portion of the markings on the garment emphasized by the mask when the mask is positioned relative to the garment.
19. The method of claim 18 wherein the mask is a sheet of paper.
20. The method of claim 18 wherein the mask is another garment.
21. The method of claim 18 wherein the mask is a portion of the garment.
22. A method comprising: marking a garment with a plurality of symbols each representing different information; and indicating a selected one of the symbols.
23. The method of claim 22 wherein the indicating includes gesturing toward the selected one of the symbols.
24. The method of claim 22 wherein the indicating includes covering all but the selected one of the symbols.
25. The method of claim 24 wherein the covering includes covering with a hand.
26. A method comprising: marking a garment with signing placement indicators; and placing portions of a human body on each of the signing placement indicators.
27. The method of claim 26 wherein the portions of the human body are digits of a hand and the signing placement indicators cause the digits of the hand to assume the position of a hand sign.
28. A method comprising: positioning a marking on a garment to hide the marking while wearing the garment in a first stage; and manipulating a portion of the garment to be worn in a second stage to uncover the marking to be visible by someone other than the wearer.
29. The method of claim 28 wherein the garment has a sleeve with an inner surface and the positioning places the marking on the inside surface of the sleeve.
30. A garment comprising: a first portion having a first marking; a second portion having a second marking, the first marking and the second marking configured to visibly display a combined symbol when the first portion is placed over the second portion.
31. The garment of claim 30 wherein the combined symbol includes at least one character.
32. A system comprising: a first garment having a first portion with a first marking; a second garment having a second portion with a second marking, the first marking and second marking configured to visibly display a combined symbol when the first portion is placed in an orientation with respect to the second portion.
33. The system of claim 32 wherein the orientation includes placement of the first and second garments adjacent one another.
PCT/US2005/036864 2005-08-17 2005-10-12 System and method for interpretive garments WO2007021291A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US70925205P 2005-08-17 2005-08-17
US60/709,252 2005-08-17
US11/213,331 2005-08-26
US11/213,331 US20070050880A1 (en) 2005-08-17 2005-08-26 System and method for interpretive garments

Publications (2)

Publication Number Publication Date
WO2007021291A2 true WO2007021291A2 (en) 2007-02-22
WO2007021291A3 WO2007021291A3 (en) 2008-01-03

Family

ID=37757987

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/036864 WO2007021291A2 (en) 2005-08-17 2005-10-12 System and method for interpretive garments

Country Status (2)

Country Link
US (1) US20070050880A1 (en)
WO (1) WO2007021291A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2110035A1 (en) * 2008-04-16 2009-10-21 GX, Inc. Clothing with complementary designs and method of use

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130117909A1 (en) 2009-01-20 2013-05-16 Matthew Paas System and method of associating a personalized article of clothing displaying travel history with information related to a person wearing the article of clothing
US20100192433A1 (en) * 2009-02-03 2010-08-05 Robert Lewis Coded message clothing and system thereof
US20110099683A1 (en) * 2009-08-20 2011-05-05 Howard Fredrick T Method for producing clothing
US9251143B2 (en) 2012-01-13 2016-02-02 International Business Machines Corporation Converting data into natural language form
US20140359914A1 (en) * 2013-06-11 2014-12-11 Pamela Meyer Systems and Methods for Clothing Indicating Encoded Regional Association

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4999848A (en) * 1989-09-22 1991-03-19 Oney Dale E Novelty shirt
USD377707S (en) * 1995-05-24 1997-02-04 Kamat Balkrishna D Surface pattern applied to an upper body garment
WO1998028712A1 (en) * 1996-12-10 1998-07-02 North River Consulting, Inc. Simultaneous display of a coded message together with its translation
US6782554B1 (en) * 2003-06-19 2004-08-31 Susan Froehlich Apparel-related entertainment system
US20040216209A1 (en) * 2003-03-05 2004-11-04 Dickey Robert A. Swimwear as information device

Family Cites Families (83)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3289320A (en) * 1964-06-23 1966-12-06 George L Mair Teaching apparatus having uncoding template for coded answers
US4275381A (en) * 1980-01-02 1981-06-23 Siegal Richard G Operator readable and machine readable character recognition system
JPS58208690A (en) * 1982-05-28 1983-12-05 Seiko Instr & Electronics Ltd Bar code input electronic time piece
US4481412A (en) * 1982-06-21 1984-11-06 Fields Craig I Interactive videodisc training system with bar code access
US4512581A (en) * 1983-01-20 1985-04-23 Paula Blaine International, Ltd. Hidden message puzzle packet
US4530349A (en) * 1983-12-06 1985-07-23 Dorothy Metzger Therapy aid for treating cystic fibrosis
US4650219A (en) * 1985-04-15 1987-03-17 Malcolm Sigman Child I.D. system
US4737108A (en) * 1987-04-22 1988-04-12 Chepaitis Elia V Tactile code for the visually impaired and blind
US4991233A (en) * 1987-08-27 1991-02-12 Andrew Hall Garment with indicia
US5594228A (en) * 1988-08-25 1997-01-14 Symbol Technologies, Inc. Self-checkout, point-of-transaction system including deactivatable electro-optically coded surveillance tags
US5036610A (en) * 1988-09-23 1991-08-06 Van Kirk Fehr Pet locator system and method
EP0371787A2 (en) * 1988-11-30 1990-06-06 LaPointe, Jacques Decryption device
US5286204A (en) * 1989-09-28 1994-02-15 Touch Books, Inc. Tactile symbols for color recognition
US5121505A (en) * 1990-11-15 1992-06-16 Michael Ludmer Tourist map construction in combination with an article of clothing
KR950010298B1 (en) * 1991-03-29 1995-09-14 가시오 게이상기 가부시끼가이샤 Electronic reading device
US5486112A (en) * 1991-10-03 1996-01-23 Troudet; Farideh Autonomous wearable computing device and method of artistic expression using same
US5275818A (en) * 1992-02-11 1994-01-04 Uwe Kind Apparatus employing question and answer grid arrangement and method
US5416310A (en) * 1993-05-28 1995-05-16 Symbol Technologies, Inc. Computer and/or scanner system incorporated into a garment
US5923735A (en) * 1996-05-29 1999-07-13 Symbol Technologies, Inc. Self-service checkout system utilizing portable self-checkout communications terminal
USD357567S (en) * 1993-10-15 1995-04-25 Fingleson Linda J Garment having printed instructions for self-examination of the breasts
US5556282A (en) * 1994-01-18 1996-09-17 Middlebrook; R. David Method for the geographical processsing of graphic language texts
US5878116A (en) * 1994-04-14 1999-03-02 Scott; James D. Method of locating a lost pet, person or object
US5912653A (en) * 1994-09-15 1999-06-15 Fitch; Stephan J. Garment with programmable video display unit
US5570081A (en) * 1994-11-02 1996-10-29 Holstrom; Stephen L. Lost article tracking system
US5479661A (en) * 1995-01-03 1996-01-02 Fingleson; Linda J. Garment having printed instructions for self-examination of the breasts
US5742940A (en) * 1995-09-21 1998-04-28 Katrina Sparks Garment including a pocket for holding reading material
US5718589A (en) * 1995-11-20 1998-02-17 Mccracken; Jill J. Learning enhancing system, and method of teaching
US6064307A (en) * 1996-04-02 2000-05-16 John P. Herres, Jr. Method for relating information about an article to a finder of the article
US5839215A (en) * 1996-12-27 1998-11-24 Lasprogata; Denise L. Raised indicia labels
US5933873A (en) * 1997-01-08 1999-08-10 The Burton Corporation Identification display system and method therefor
US5962834A (en) * 1997-03-17 1999-10-05 Markman; Herbert L. Inventory tracking and management apparatus with multi-function encoding unit
US5964354A (en) * 1997-03-31 1999-10-12 Skinner; Karl R. Garment sorter
WO1998047062A1 (en) * 1997-04-15 1998-10-22 Perkins Michael T A supportive belt system integrating computers, interfaces, and other devices
US6393745B1 (en) * 1998-09-24 2002-05-28 Emiko Miki Display media back pack and method of visual display
WO2000041124A1 (en) * 1998-12-30 2000-07-13 Chao Liu Invisible graphics context identifying system and fabrication method thereof
US6574672B1 (en) * 1999-03-29 2003-06-03 Siemens Dematic Postal Automation, L.P. System, apparatus and method for providing a portable customizable maintenance support computer communications system
US6554707B1 (en) * 1999-09-24 2003-04-29 Nokia Corporation Interactive voice, wireless game system using predictive command input
US6324053B1 (en) * 1999-11-09 2001-11-27 International Business Machines Corporation Wearable data processing system and apparel
US20050037844A1 (en) * 2002-10-30 2005-02-17 Nike, Inc. Sigils for use with apparel
US6714133B2 (en) * 1999-12-15 2004-03-30 Koninklijke Philips Electronics N.V. Short range communication system
US7150400B2 (en) * 2004-05-18 2006-12-19 Tripletail Ventures, Inc. Method and apparatus for capturing and decoding an image of a remotely located bar code
US6243870B1 (en) * 2000-03-14 2001-06-12 Pod Development, Inc. Personal computer network infrastructure of an article of clothing
US6773344B1 (en) * 2000-03-16 2004-08-10 Creator Ltd. Methods and apparatus for integration of interactive toys with interactive television and cellular communication systems
US20020057440A1 (en) * 2000-05-19 2002-05-16 Michael Weiner Document with embedded information
USD444291S1 (en) * 2000-06-02 2001-07-03 Kathleen M Poradzisz Decorative shirt
CN100437574C (en) * 2000-07-06 2008-11-26 金时焕 Information searching system and method thereof
US6895261B1 (en) * 2000-07-13 2005-05-17 Thomas R. Palamides Portable, wireless communication apparatus integrated with garment
US6314581B1 (en) * 2000-11-02 2001-11-13 Charles F. Bond Shirt with messages under collar
US6965683B2 (en) * 2000-12-21 2005-11-15 Digimarc Corporation Routing networks for use with watermark systems
US20080113675A1 (en) * 2001-02-21 2008-05-15 Harris Scott C Applications of broadband media and position sensing phones
US6481134B1 (en) * 2001-04-02 2002-11-19 Alicia Aledo Tag for attaching to a garment having an attribute and identifying the attribute to a person unable to visually identify the attribute
US6507486B2 (en) * 2001-04-10 2003-01-14 Xybernaut Corporation Wearable computer and garment system
US7030855B2 (en) * 2001-05-10 2006-04-18 Metcalf Darrell J Video-imaging apparel with user-control system
US6563424B1 (en) * 2001-05-22 2003-05-13 Nokia Corporation Smart garment system, method and apparatus involved for integrating electronic devices into garments
US7321785B2 (en) * 2001-08-08 2008-01-22 Harris Scott C Eyeglasses with wireless audio capability
US6729884B1 (en) * 2001-11-13 2004-05-04 Metavante Corporation E-Critter game for teaching personal values and financial responsibility to a child
US20050282633A1 (en) * 2001-11-13 2005-12-22 Frederic Nicolas Movement-sensing apparatus for software
US6899337B2 (en) * 2002-02-01 2005-05-31 Win ‘n’ Grin Amusements Pty Ltd. Crane amusement game
US6967566B2 (en) * 2002-04-05 2005-11-22 Creative Kingdoms, Llc Live-action interactive adventure game
US6691155B2 (en) * 2002-06-20 2004-02-10 Linda Gottfried Multimedia system for sharing brand information keeps history of modifications of production information by consumers to allow recreating multimedia interface in its previous formats
US7303471B2 (en) * 2002-08-27 2007-12-04 Micron Technology, Inc. Method and system for transferring data to an electronic toy or other electronic device
US7287984B2 (en) * 2002-10-15 2007-10-30 Techenable, Inc. System and method for providing a visual language for non-reading sighted persons
US8206219B2 (en) * 2002-10-30 2012-06-26 Nike, Inc. Interactive gaming apparel for interactive gaming
WO2004090798A1 (en) * 2003-04-07 2004-10-21 Silverbrook Research Pty Ltd Sensing device for coded data
JP2004320140A (en) * 2003-04-11 2004-11-11 Canon Inc Information exchange system
USD522213S1 (en) * 2003-06-16 2006-06-06 Nova Co., Ltd. T-shirt
US20050029358A1 (en) * 2003-08-07 2005-02-10 Mankins David Patrick Bar code input for camera-equipped wireless devices
US7265970B2 (en) * 2003-10-01 2007-09-04 Adwalker (Ip) Limited Apparatus
US20050089823A1 (en) * 2003-10-14 2005-04-28 Alan Stillman Method and apparatus for communicating using pictograms
EP1533678A1 (en) * 2003-11-24 2005-05-25 Sony International (Europe) GmbH Physical feedback channel for entertaining or gaming environments
US20050123888A1 (en) * 2003-12-05 2005-06-09 Lee Fu C. Interactive reading system
GB2409786B (en) * 2003-12-29 2006-12-13 Nokia Corp Content distribution
WO2005082551A1 (en) * 2004-02-27 2005-09-09 John Griffits Electronic sock sorting and mating system
US7540741B2 (en) * 2004-03-31 2009-06-02 The Procter & Gamble Company Toilet training aides and kits
US20050239029A1 (en) * 2004-04-23 2005-10-27 Yzermans Erin K Method of enunciating a prerecorded message related to toilet training in response to a contact
US7686692B2 (en) * 2004-05-10 2010-03-30 Sony Computer Entertainment Inc. Pattern codes used for interactive control of computer applications and video game applications
US7107621B2 (en) * 2004-06-03 2006-09-19 Frank Meekins Optical illusion wear
US8628333B2 (en) * 2004-09-10 2014-01-14 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Method and apparatus for performance optimization through physical perturbation of task elements
US20060094504A1 (en) * 2004-11-03 2006-05-04 George Polchin Method and apparatus for dynamic enhancement of video games with vendor specific data
JP2008527563A (en) * 2005-01-16 2008-07-24 ズランゴー リミテッド Iconic communication
US7674747B1 (en) * 2005-07-15 2010-03-09 Edward L. Long Appearance changing decorations on fabric using disappearing ink
US8047915B2 (en) * 2006-01-11 2011-11-01 Lyle Corporate Development, Inc. Character for computer game and method
US7310830B2 (en) * 2006-03-24 2007-12-25 Joseph Kuharcik Method of messaging

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4999848A (en) * 1989-09-22 1991-03-19 Oney Dale E Novelty shirt
USD377707S (en) * 1995-05-24 1997-02-04 Kamat Balkrishna D Surface pattern applied to an upper body garment
WO1998028712A1 (en) * 1996-12-10 1998-07-02 North River Consulting, Inc. Simultaneous display of a coded message together with its translation
US20040216209A1 (en) * 2003-03-05 2004-11-04 Dickey Robert A. Swimwear as information device
US6782554B1 (en) * 2003-06-19 2004-08-31 Susan Froehlich Apparel-related entertainment system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2110035A1 (en) * 2008-04-16 2009-10-21 GX, Inc. Clothing with complementary designs and method of use

Also Published As

Publication number Publication date
WO2007021291A3 (en) 2008-01-03
US20070050880A1 (en) 2007-03-08

Similar Documents

Publication Publication Date Title
Horton The almost universal language: Graphics for international documents
US20070050880A1 (en) System and method for interpretive garments
Curley A Conspiracy of Images: Andy Warhol, Gerhard Richter, and the Art of the Cold War
US20050032026A1 (en) System and method for integrating tactile language with the visual alphanumeric characters
NZ550848A (en) Method for safely logging onto a technical system
Mogaji UK universities’ corporate visual identities (CVI)
Yamada Westernization and cultural resistance in tattooing practices in contemporary Japan
Brownlee The Commerce of Vision: Optical Culture and Perception in Antebellum America
US4204341A (en) Transparent communication chart
Struyk Gangs in our schools: Identifying gang indicators in our school population
WO2010091039A1 (en) Coded message clothing and system thereof
US20050255441A1 (en) Prayer/study aid
Wilson Reproducing the contours of Venetian identity in sixteenth-century costume books
Gordon In sight of America: Photography and United States immigration policy, 1880–1930
Iida Branding a University and a Faculty: Seeking a Visual-identity Logo for GLOMAC
Kropp Kings in Cuirass—Some Overlooked Full-Length Portraits of Herodian and Nabataean Dynasts
Wiana Fashion as a Language of Non Verbal Communication
Tian et al. Graphic design for learning Chinese characters: Opinions about effectiveness and aesthetics from audience with and without Chinese culture backgrounds
JP3148100U (en) Home business card
Çolak Contemporary art and the critique of everyday nationalism
Benincasa The Girls With The Headscarf: Unintended Reverse Discrimination at the School Parade on Greek National Holidays
Galarte The Crowns of Stuzo clothing: Design, representation, and self-craft
Chare Transcribing the corporeal: physical feminism, autobiography and the intermedial
US20040256458A1 (en) Decoding system and method for using same
Kumar PRODUCT AT THE CROSSROADS OF SPACE, LANGUAGE AND MEANING.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05810292

Country of ref document: EP

Kind code of ref document: A2