US20120216116A9 - Method for customizing avatars and heightening online safety - Google Patents
Method for customizing avatars and heightening online safety Download PDFInfo
- Publication number
- US20120216116A9 US20120216116A9 US10/862,396 US86239604A US2012216116A9 US 20120216116 A9 US20120216116 A9 US 20120216116A9 US 86239604 A US86239604 A US 86239604A US 2012216116 A9 US2012216116 A9 US 2012216116A9
- Authority
- US
- United States
- Prior art keywords
- avatar
- user
- users
- muscles
- animation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 67
- 210000003205 muscle Anatomy 0.000 claims abstract description 74
- 238000004891 communication Methods 0.000 claims abstract description 23
- 239000000796 flavoring agent Substances 0.000 claims abstract description 5
- 235000019634 flavors Nutrition 0.000 claims abstract description 5
- 230000004048 modification Effects 0.000 claims description 19
- 238000012986 modification Methods 0.000 claims description 19
- 230000003068 static effect Effects 0.000 claims description 4
- 230000006399 behavior Effects 0.000 claims description 3
- 230000008859 change Effects 0.000 claims description 3
- 238000005728 strengthening Methods 0.000 claims description 3
- 230000003313 weakening effect Effects 0.000 claims description 2
- 230000001131 transforming effect Effects 0.000 claims 2
- 230000003993 interaction Effects 0.000 abstract description 14
- 244000062645 predators Species 0.000 abstract description 14
- 230000008569 process Effects 0.000 abstract description 10
- 230000007246 mechanism Effects 0.000 abstract description 7
- 230000001960 triggered effect Effects 0.000 abstract description 5
- 230000014509 gene expression Effects 0.000 description 16
- 230000008901 benefit Effects 0.000 description 13
- 230000000694 effects Effects 0.000 description 9
- 230000000007 visual effect Effects 0.000 description 8
- 238000013459 approach Methods 0.000 description 7
- 230000001815 facial effect Effects 0.000 description 6
- 210000003484 anatomy Anatomy 0.000 description 5
- 238000004088 simulation Methods 0.000 description 5
- 241000282414 Homo sapiens Species 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 239000013598 vector Substances 0.000 description 4
- 230000008451 emotion Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 2
- 230000003292 diminished effect Effects 0.000 description 2
- 230000008921 facial expression Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 210000000887 face Anatomy 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000002156 mixing Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000002040 relaxant effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T13/00—Animation
- G06T13/20—3D [Three Dimensional] animation
- G06T13/40—3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/53—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing
- A63F2300/538—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing for performing operations on behalf of the game client, e.g. rendering
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/60—Methods for processing data by generating or executing the game program
- A63F2300/6009—Methods for processing data by generating or executing the game program for importing or creating game content, e.g. authoring tools during game development, adapting content to different platforms, use of a scripting language to create content
- A63F2300/6018—Methods for processing data by generating or executing the game program for importing or creating game content, e.g. authoring tools during game development, adapting content to different platforms, use of a scripting language to create content where the game content is authored by the player, e.g. level editor or by game device at runtime, e.g. level is created from music data on CD
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/60—Methods for processing data by generating or executing the game program
- A63F2300/6063—Methods for processing data by generating or executing the game program for sound processing
- A63F2300/6081—Methods for processing data by generating or executing the game program for sound processing generating an output signal, e.g. under timing constraints, for spatialization
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/60—Methods for processing data by generating or executing the game program
- A63F2300/66—Methods for processing data by generating or executing the game program for rendering three dimensional images
- A63F2300/6607—Methods for processing data by generating or executing the game program for rendering three dimensional images for animating game characters, e.g. skeleton kinematics
Definitions
- This invention relates to the fields of avatar creation, multimedia communication, specifically to exchange of visual and audio information in online communication. This invention also relates to the area of safety in online communication.
- filtering software e.g. parental monitoring software
- online application e.g. online chat
- the functions of the monitoring software are limited to recording visited web sites, capturing the screen when certain keywords are typed, and logging conversations.
- the protection of children is no real-time, and potential predators are not discouraged or penalized promptly.
- a substantial amount of offline time is needed from parents, who may be very busy.
- the present invention defines a method for an ordinary computer user to customize a virtual character or avatar, so as to determine how the character is animated afterwards.
- the animation method used is preferably intuitive and simple. Interaction with the virtual character can preferably involve animation of its face.
- the method can be used in stand-alone applications and multimedia communication, such as online chat room and email. Users may be able to be creative in the process of animation, thus revealing personal flavors and personality traits through the virtual characters. Therefore, other users viewing a virtual character may better understand the creator of the character.
- the method has several benefits, which include offering customized avatars and heightening online safety, especially for young users in online chat sessions.
- the present invention defines a method to intelligently process messages, which may be sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles.
- the method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be detected. Then, instructions can be triggered by the intelligent systems. Preferably, graphic outputs will be displayed to alert potential victims and discourage predators. This service can be rendered in real time.
- a method is defined for an ordinary computer user to customize an avatar, so as to determine how the avatar is animated afterwards.
- the animation method used is preferably intuitive and simple so that ordinary computer users can learn and manipulate avatars easily and efficiently.
- Interaction with the virtual character can preferably involve animation of its face.
- the invention comprises the steps of offering an avatar a default setting of a mechanism of muscle movement, and a user interacts with the mechanism of muscle movement so as to customize the avatar.
- the method is preferably used in stand-alone application and multimedia communication, such as Internet, email and wireless applications. Users are able to be creative in the process of animation, thus may reveal personal flavors and personality traits through an avatar.
- a method is defined for an intelligent system to analyze potentially damaging information, and send special signals to users in real time, so as to alert potential victims and discourage predators.
- the present invention defines a method to intelligently process messages that are being sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles.
- the method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be captured. Then, instructions can be triggered by the intelligent systems. As a result, graphic outputs will be displayed to alert potential victims and discourage predators.
- the services can be offered in real time.
- FIG. 1 shows a general procedure of the present invention.
- FIG. 2 illustrates a dialog box in customizing an avatar.
- FIG. 3 illustrates an example in which a simulated mouth is enlarged.
- FIG. 4 illustrates the default setting of control polygons, which are located near the ends of simulated muscles.
- FIG. 5 illustrates embedding control points with feature points in a generic avatar.
- FIG. 6 shows an example in which the boundary of mouth area is changed in basic animation.
- FIG. 7 illustrates that a boundary of the areas approximates the locations of control points.
- FIG. 8 illustrates an interface that allows a user to modify virtual muscles.
- FIG. 9 illustrates an example in which a control point simulating a strengthened muscle is moved a greater amount of distance than other control points.
- FIG. 10 shows the effect of curve points and vertices after the modification of control points.
- FIG. 11 illustrates a high-level abstraction of the implementation of stand-alone applications.
- FIG. 12 illustrates using customized avatars used in multimedia communication.
- FIG. 13 illustrates the control hierarchy used in the present invention.
- FIG. 14 illustrates the overview of the present invention.
- FIG. 15 illustrates the work flow of the intelligent system in FIG. 14 .
- FIG. 16 illustrates instructions are used to generate graphic outputs.
- FIG. 17 shows an example of a discouraging avatar.
- FIG. 18 shows an embodiment of graphic interface in the present invention.
- FIG. 19 shows high-level controls are used to control 3D avatars.
- an avatar means a virtual character. Since the face is the most expressive part of a virtual character, this document focuses on the virtual face. Thus, an avatar and a virtual face are interchangeable in this document. If it is not otherwise stated, avatars in this document are three-dimensional models.
- FIG. 1 The implementation of the present invention is illustrated in FIG. 1 .
- the procedures are described as follows.
- a user can select an avatar from a number of predefined 3D avatars 30 .
- the chosen avatar can then represent the user him/herself 32 .
- the selection may be done either online or offline, e.g. from a CD-ROM disk.
- a normal graphic interface can allow a user to select the avatars.
- a user can also build an avatar from realistic photos. Afterwards, the avatar can be remotely controlled by the user 34 .
- a user should be able to modify the chosen avatar.
- the modification can be done by interactively using a mouse connected to a computer, or using a dialog box.
- the purpose of modification is to allow a user to customize the static geometry of the avatar.
- FIG. 2 illustrates a dialog box for this purpose.
- a user can modify facial features by using interactive controls 36 and 38 .
- modification of an avatar can be done by changing the geometry of the model. For example, enlarging mouth can be done by increasing the geometric area (3D volume) of a simulated mouth.
- FIG. 3 illustrates an example in which the mouth is enlarged from 42 A to 42 B in an avatar (virtual face) 40 .
- Conventional 3D animation can offer many modification tools, e.g. free form deformation. If a user modifies a model by using a high-level interface (e.g. dialog box), the modification can be done implicitly.
- FIG. 4 illustrates the default setting of control polygons ( 44 , 46 and 48 ) of the rational curves, in which the control points are located near the ends of virtual (or simulated) muscles. The connection of control points of a curve forms a control polygon. This default setting of curves offers an embedded mechanism of muscle movement. Users are however allowed to modify on the basis of the default setting (discussed shortly).
- Control points of rational curves can be embedded in a generic avatar (face model).
- FIG. 5 illustrates the approach.
- points 52 , 54 and 56 are three figure points on a generic avatar.
- 52 , 54 and 56 can be an out corner of an eye, a low-out corner of the nose and an out corner of the mouth respectively.
- Point 50 is any control point of a rational curve in the area. All points are located in three-dimensional space, each with (x,y,z) coordinates.
- P, I, J and K represent the vectors to the points 50 , 52 , 54 and 56 respectively.
- multiple feature points can be used in determining a control point.
- more then three feature points may appear in the above formula, each with a weighting coefficient.
- the coefficients can be calculated when a generic avatar is created and curve points are positioned according to the techniques in FIG. 4 .
- control points can be embedded in a generic avatar.
- the positions of the control points will be automatically updated, and the rational curves can be recalculated accordingly. Since control points are located near ends of the muscles and all human faces have the same muscles, the association (embedding) of control points can be standardized across all avatars.
- Embedding control points in this way offers flexibility of avatar customization.
- Some industry standard e.g. MPEG-4 specifically requires face models (avatars) to have a set of feature points. Therefore, another benefit of this approach is compatibility.
- User controlled animation can be separated into basic animation and advanced animation. They are different in technical requirement to users. But basic animation and advanced animation have the same purpose, which is to allow users to be creative and to generate sufficient variety of avatars through their interaction with the avatars.
- FIG. 6 shows an example, in which the mouth boundary is changed from 58 A to 58 B.
- this phase doesn't affect static geometry of an avatar, instead affects the areas that are influenced by simulated muscles.
- the surface of a virtual face is separated into a number of areas (e.g. mouth, eyes), and each area is affected by one or more rational curves (Huang*).
- Huang* rational curves
- control points like 62 A on an original boundary 60 A, are moved to new positions, like 62 B on a new boundary 60 B, along simulated muscles like 63 .
- FIG. 8 illustrates an intuitive interface that allows a user to modify virtual muscles.
- virtual muscles like 64 depict a sneering muscle
- 66 depict a smiling muscle
- the location of these muscles can approximate the locations of real muscles.
- the virtual muscles can be rendered in a different color from background face area, so the muscles can be identified and modified.
- a small text box near the cursor can be prompted to tell what muscle it is (e.g. smiling muscle or the zygomaticus major muscle, sneering muscle or the levator labii superioris muscle, etc).
- a higher-level interface can modify several muscles simultaneously.
- an interface can allow users to change forcefulness of expressions (e.g. happiness and sadness), and each expression will be affected by several muscles.
- the association between expressions and muscles can be implemented by simple data structures, e.g. arrays.
- a user can modify characteristics of a muscle, e.g. its length, direction, in 3D space.
- Multiple windows can display on a computer screen multiple views of a 3D face model. For example, one window shows a front view and another shows a side view.
- the length of a muscle can be modified by moving the end of the muscle which is approximated by control points of rational curves (refer to FIG. 4 ).
- the directions of muscles are approximated by 3D gradients, which determine how the curves affect polygonal vertices of an avatar (Huang*).
- modifying directions of muscles changes the 3D gradients.
- control points of rational curves are located near surface boundary of an avatar (Huang*), but the users should have the freedom to move muscle ends (approximated by control points) substantially below or above the boundary.
- An important purpose of this freedom is to enable sufficient variety of animation.
- the present invention also allows a user to strengthen or weaken a muscle.
- the effect of a muscle is simulated by one or more control points of a rational curve (Huang*).
- Huang* a control point simulating the muscle can be more substantially modified than other control points of a curve, vice versa for weakening a muscle.
- a curve can be modified by repositioning control points or changing weights (Huang*).
- FIG. 9 illustrates an example, in which a control point 68 A approximating a strengthened muscle 66 is moved a greater amount of distance than other control points, to a new position 68 B.
- the additional movement of the control point can be proportional to the amount of the strengthening, e.g.
- the number of mouse clicks on the virtual muscle There can be constraints in how many times the muscle can be strengthened, or how much distance the control point can be moved. The constraints can be pre-determined in a generic avatar. For example, the maximum variation from a default setting can be one quarter of the width of the avatar, if control points are repositioned. Visual feedback can be given to indict the successful strengthening, e.g. the virtual muscle becoming stronger or thicker.
- curve point 70 A is closer to 68 A or influenced more substantially by 68 A (Huang*) than curve points 72 A and 74 A. Points 70 A, 72 A and 74 A move to new position 70 B, 72 B and 74 B respectively. Because 68 A is moved a greater distance than other control points of the curve, the movement distance from 70 A to 70 B will be larger than other distances like from 72 A to 72 B, and 74 A to 74 B.
- the vertices of an avatar are associated with the curve points and the association is based on anatomy (Please refer to Huang*).
- the vertices of the avatar e.g. 76
- the vertices of the avatar closer to the line from 70 A to 70 B will move greater distances than other vertices further away (e.g. 78 and 80 ) from the line.
- 68 A can approximate a muscle end and the line from 70 A to 70 B can approximate a strengthened muscle as in FIG. 9
- the simulation will make the area near the strengthened muscle move more forcefully, which is very realistic.
- weights of control points can be modified (Huang*).
- a realistic simulation can be intuitively achieved by simply modifying a small number of control points based on users' interaction on virtual muscles.
- Significant benefits of this approach include that the connection between the user interaction and underlying operation is intuitive and straight forwards, the simulation mechanism is anatomy-based and thus the result is realistic. Therefore, users can very intuitively customize avatars.
- the animation methods described are intuitive and effective. Users only interact with the virtual muscles. The underlying operation (e.g. mathematical) is hidden from users. Furthermore, users can be creative in the process of animation or interaction with virtual faces. Besides being intuitive and effective to ordinary computer users, the animation methods should preferably offer sufficient facilities so that users can generate a great variety of animation. Therefore, other animation methods satisfying this requirement may also be used in user controlled animation, i.e. within the scope of this invention.
- an avatar Once an avatar is customized, it can be used in stand-alone applications or multimedia communication.
- the customized avatar can act as a general 3D graphic interface.
- the avatar can be displayed in a graphic window, e.g. OpenGL window. For example, it can read out a text file.
- a text-to-speech (TTS) system e.g. Microsoft Speech SDK
- TTS text-to-speech
- Viames can be determined by TTS.
- Visemes are visual mouth shapes that occur during speech.
- visemes can be transformed to the movement of muscles (e.g. the zygomaticus major muscle). Since curve modification intuitively simulates muscle movement (Huang*), then visemes can thus be simulated by modifying the curves.
- FIG. 11 illustrates a high-level abstraction of the implementation of the stand-alone applications. Visemes 86 are fed to a functional module that transforms visemes to muscle movement 88 . Parameters representing muscle movement are then fed to a functional module that transforms muscle movement to curve modifications 90 . Then avatar animation 92 is outputted.
- FIG. 11 focuses on the visual aspect. The applications should also have other functions of file opening, phoneme processing, etc.
- the avatar can be selectively published, i.e. uploaded to the server maintained by a service provider.
- the application areas of multimedia communication include but not limit to Internet, email and wireless.
- an online application e.g. email or chat
- the avatar can be sent to other users who are connected to the server.
- the avatar can represent its creator.
- the avatar can express/speak in a way that is genuinely determined by its creator.
- a user can input a line of text. When the text is sent to a remote site, it will be spoken out by the customized avatar.
- the techniques of stand-alone applications can be used in the remote site.
- FIG. 12 illustrates an embodiment.
- a user X 94 uploads a customized avatar 100 to a service provider 96 .
- the service provider 96 can provide Internet services, email or wireless services.
- User Y 98 can also connect to the service provider 96 and download the customized avatar 100 .
- the customized avatar 100 can act as a graphic agent for user X 94 . If user X 94 sends email to user Y 98 , the email message can be spoken out by the avatar 100 . If users X 94 and Y 98 are in the same online chat session, the avatar can also speak out user X's message in user Y's local computer. If users X 94 and Y 98 have frequent communication, user Y 98 can save the avatar in his/her local computer. The avatar can be saved as a set of vertices and related texture images. Thus, the avatar can be uploaded and downloaded only when user X 94 modifies it.
- the avatar can be animated while speak out messages in wireless devices (mobile phones). Users may prefer to look at (customized) speaking avatars, thus moving wireless devices away from their heads. As a result, it may help to decrease the potential risk of radiation from high frequencies. Therefore, the present invention offers a benefit of risk reduction in wireless communication.
- V aV v +bV e
- V the movement of a vertex on the face model.
- V v the movement contributed by a present viseme and V e is the movement contributed by an emotion.
- They have scalar coefficients a and b respectively.
- V, V v and V e are vectors.
- V v and V e both approximate muscle movement and can be obtained from the above description.
- the vectors can be affected by personality, culture, etc.
- the movement of a polygonal vertex can be a sum of vectors, each of which individually represent elementary movement from either speech or emotion. As a result, an ordinary user can intuitively determine how an avatar expresses and speaks.
- FIG. 13 further illustrates the control hierarchy used in the present invention. As shown in FIG. 13 , control points 102 affect points 104 on rational curves, which in turn affect vertices 106 of an avatar (or model).
- the technology is especially suitable for using in multimedia communication. Because of the hierarchy, a decoder generally needs to know only high-level parameters (i.e. control points). Therefore, the technology can significantly improve coding efficiency and can be very economic in terms of communication bandwidth. This advantage is crucially important in communications where bandwidth is a precious resource, e.g. wireless.
- FIG. 14 illustrates an overview of another aspect of the present invention.
- Client 108 and client 114 both connect to a service provider 110 , who may provide online services (e.g. chat sessions).
- client 108 uploads messages 118 to the service provider 110 , then the messages 118 are downloaded to client 114 .
- An intelligent system 112 or filter analyzes the messages 118 in this process.
- the intelligent system 112 may reside in a server of the service provider 110 , or any of the clients.
- the intelligent system 112 can be implemented using software, hardware. It can have any level of machine intelligence and machine learning capabilities. If the intelligent system 112 finds potentially damaging info in the messages 118 , special signals 116 will be sent to the clients. For example, alert signals will be sent to client 114 and discouraging signals will be sent to client 108 .
- the details of the implementation will be given as follows.
- FIG. 15 illustrates the work flow of the intelligent system in FIG. 14 .
- Messages 118 sent between clients are analyzed by the intelligent system 112 .
- Messages 118 can be a number of formats, including texts input by a client, recognized speech from a client, etc.
- the intelligent system 112 contains a number of rules 120 that are used to monitor potentially damaging information. The following are some examples that the rules 120 may be monitoring:
- the rules 120 can be set by a service provider 110 or parents of young users. Rules 120 can be pre-determined or dynamically set, or learnt using any intelligent method.
- the messages 118 are analyzed against the rules 120 .
- the messages 118 can be scanned to see if they contain any of the monitored requests (e.g. (a) to (d)), or their variations.
- special instructions 122 in FIG. 16 ) are triggered by the intelligent system and sent to clients. For example, alert signals are sent to client Y 114 and discouraging signals are sent to client X 108 .
- FIG. 16 illustrates a preferred embodiment in which the instructions 122 generate graphic outputs 126 .
- Instructions 122 can first act on a graphic database 124 , which may contain two-dimensional (2D) bitmaps or three-dimensional (3D) models.
- the bitmaps and models can be customized by clients. Customizing 3D models is disclosed in the previous part of this document.
- the instructions 122 can trigger alert or discouraging graphic outputs from the graphic database 124 .
- FIG. 17 shows a simple example of a discouraging avatar, which is face image or model.
- a discouraging avatar can have an unattractive expression, such as an evil expression.
- An alert avatar can have a surprising or a fear expression. Since the face is very expressive and facial expressions can be universally understood, facial images or models are preferred in the present invention.
- an avatar means a virtual character. Since the face is preferred, this document focuses on the virtual face. Thus, an avatar and a virtual face are interchangeable in this document.
- FIG. 18 shows an embodiment of graphic interface 128 in the present invention.
- the up-right part 132 of the interface 128 is an avatar representing a remote client.
- the up-left part 130 of the interface 128 is an avatar representing a local client.
- an avatar at the up-right part 132 represents client X 108 and another avatar at up-left part 130 represent client Y 114 her/himself.
- a text input area 134 below the two avatars can allow users to input messages.
- the avatars can have pleasant and relaxing expressions.
- the avatars can also speak out the messages.
- the English language has 14 distinctive visemes, which are visual mouth shapes of phonemes.
- the graphic database (in FIG. 16 ) can store information of the 14 visemes. While messages are scanned, the visemes can be retrieved from text-to-speech (TTS) system, each viseme will lead to a relevant graphic output.
- TTS text-to-speech
- special graphic outputs e.g. the avatar in FIG. 17
- special graphic outputs will replace the normal avatar.
- the messages send from client X 108 to client Y 114 are detected as containing potentially damaging requests, instructions 122 will be triggered.
- client Y 114 's computer a discouraging avatar can be displayed as the remote model 132 , and an alert avatar can be displayed as the local model 130 . Therefore, intuitive visual information will instantly given to client Y 114 .
- a substantial benefit is that the system can instantly make client X 108 less attractive to client Y 114 , and make client Y 114 instantly be aware of potential damage.
- client X 108 Since discouraging and alert avatars can also be instantly displayed in client X 108 's computer, client X 108 is instantly discouraged or penalized for his behavior.
- a penalty scheme can be applied. Penalty points can be added to client X 108 's account each time he sends out a potentially damaging request. The penalty points can be fed to the instructions 122 in FIG. 16 . In other words, the more penalty points, the more unattractive the predator will be. In a chat session, cumulative penalty points can lead to a client expelled from the chat session, and unable to join again for some time.
- the visual information can be enhanced by audio signals.
- the avatar's voice can also become less attractive and more obviously threatening.
- An avatar's voice can be modified by changing frequency components, pitch, rate, emphasis, etc.
- FIG. 19 shows a preferred embodiment.
- An effective method in 3D modeling and animation was proposed by Huang*.
- This patent document takes the method as a preferable implementation that offers high-level controls for 3D avatars. Please refer to documents at the end of this specification for technical details.
- Huang built a direct connection between muscle movement and modification of parametric curves. Therefore, control points of the curves offer high-level abstraction of muscle movements/expressions. For example, in generating happiness expression, a muscle near the ear pulls the mouth outwards and upwards. To simulate this effect, control points near the ear and simulating the muscle are shifted outward and upward, or their weights are increased.
- a muscle located at the lower-outer sides of the mouth contracts and pulls the mouth corners downwards.
- control points located at the lower-outer sides of the mouth and simulating the muscle are moved outward from the mouth, or their weights are increased (Huang*). Since each expression is a direct result of certain muscle movement, the muscle movement can be simulated by modifying the high-level controls (i.e. control points of the curves).
- expression requests 136 (can be sent from instructions 122 ) are fed into a functional module 138 that offers mapping information about high-level controls.
- the mapping information can include a mapping between expressions and relevant modification of high-level controls (Huang*).
- the mapping then generates high-level parameters 142 (e.g. modification of control points), which modifies 3D avatars 140 .
- high-level controls By using high-level controls, the amount of information sent between clients and service providers is significant low, thus requesting less bandwidth.
- the present invention has a number of significant advantages and benefits.
- avatars are basically predefined by animators.
- the present invention allows ordinary computer users to genuinely customize avatars. Users not only can adjust static models, but also can decide dynamic behavior of avatars (e.g. simulated muscles). An ordinary user can intuitively determine how an avatar expresses and speaks.
- a user may enjoy the process of animation (or interaction). Furthermore, users may reveal personal flavors or traits in the process.
- a user can present an avatar or virtual character, just like he/she can present a creation in the real world. It may be to a user's own interest to build an attractive avatar. Users with different background (e.g. ages) may build avatars with distinctive differences. Therefore, the present invention can have a number of additional benefits, e.g. online safety.
- the method outlined in the patent document can be used in a wide range of multimedia application.
- it can be used in education (e.g. facial anatomy).
- the core inventive concept is that messages are analyzed against rules and potential damaging information is graphically indicated instantly. Therefore, protection and prevention are offered in real time.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Operations Research (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Processing Or Creating Images (AREA)
Abstract
In accord with the present invention, a method is defined for an ordinary computer user to customize an avatar, so as to determine how the avatar is animated afterwards. The animation method used is preferably intuitive and simple so that ordinary computer users can learn and manipulate avatars easily and efficiently. Interaction with the virtual character can preferably involve animation of its face. Preferably the invention comprises the steps of offering an avatar a default setting of a mechanism of muscle movement, and a user interacts with the mechanism of muscle movement so as to customize the avatar. The method is preferably used in stand-alone application and multimedia communication, such as Internet, email and wireless applications. Users are able to be creative in the process of animation, thus may reveal personal flavors and personality traits through an avatar. In accord with the present invention, a method is defined for an intelligent system to analyze potentially damaging information, and send special signals to users in real time, so as to alert potential victims and discourage predators. The present invention defines a method to intelligently process messages that are being sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles. The method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be captured. Then, instructions can be triggered by the intelligent systems. As a result, graphic outputs will be displayed to alert potential victims and discourage predators. The services can be offered in real time.
Description
- Not applicable
- Not applicable
- This invention relates to the fields of avatar creation, multimedia communication, specifically to exchange of visual and audio information in online communication. This invention also relates to the area of safety in online communication.
- With the increase power of computer hardware and communication bandwidth, graphic avatars are becoming more practical, especially in multimedia communication, e.g. online chat sessions. In the prior art, there are several major approaches with respect to the interaction between ordinary computer users and graphic avatars:
-
- (a) A user can select one of a plurality of different avatars or virtual characters, to represent the user him/herself.
- (b) A user can select different components (e.g. mouth, eyes and nose) of an avatar, which is similar to crime identification in police department.
- (c) A user can build an avatar from one or a plurality of photos. Thus, the avatar resembles the subject on the photo.
- In approaches (a) and (b), the user's identity is hidden since an avatar does not resemble the user. In approach (c), the subject's identity is not hidden. There are some applications (e.g. online chat) where the identities are desired to be covert.
- In all the above approaches (a), (b) and (c), the users have little room for creativity activity in setting the avatars. An avatar is either chosen from predefined ones, or is generated from photos. In contrast, in the real world, one can create customized characters by drawing on paper, etc.
- On the other hand, computer animation methods in the prior art are generally complex and time-consuming. Thus, professional animators are needed to create virtual characters or avatars. Usually, the more realistically an avatar, the more time-consuming it takes to create the avatar. As a result, ordinary users are unable to customize animation, e.g. determine expressions and speeches of avatars. Thus, animation (e.g. expression) of avatars in the prior art is basically predetermined by professional animators, even though users can superficially set the avatars.
- In the prior art, online safety for users is problematic. For example, an adult can pretend to be a youngster in online chat sessions, and eventually lure and harm youngsters. In the prior art, filtering software (e.g. parental monitoring software) is used to protect young users of online application (e.g. online chat). The functions of the monitoring software are limited to recording visited web sites, capturing the screen when certain keywords are typed, and logging conversations. However, the protection of children is no real-time, and potential predators are not discouraged or penalized promptly. Furthermore, a substantial amount of offline time is needed from parents, who may be very busy.
- Another way to battle online crime in the prior art is that the law enforcement personnel go online as youngsters and lure predators or pedophiles into a trap. This method is not efficient at all, because of the ratio of possible enforcement personnel to potentials predators.
- Therefore, the methods heretofore known suffer from a number of disadvantages, which include:
-
- (a) Ordinary computer users have little room for creative activity in setting the animation of avatars.
- (b) If a user's identity is hidden, an avatar that represents the user offers little clue about the user, since the animation of the avatar is mostly predefined by animators.
- (c) There lack effective ways to protect online users, e.g. in chat sessions.
- The present invention defines a method for an ordinary computer user to customize a virtual character or avatar, so as to determine how the character is animated afterwards. The animation method used is preferably intuitive and simple. Interaction with the virtual character can preferably involve animation of its face. The method can be used in stand-alone applications and multimedia communication, such as online chat room and email. Users may be able to be creative in the process of animation, thus revealing personal flavors and personality traits through the virtual characters. Therefore, other users viewing a virtual character may better understand the creator of the character. The method has several benefits, which include offering customized avatars and heightening online safety, especially for young users in online chat sessions.
- The present invention defines a method to intelligently process messages, which may be sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles. The method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be detected. Then, instructions can be triggered by the intelligent systems. Preferably, graphic outputs will be displayed to alert potential victims and discourage predators. This service can be rendered in real time.
- Accordingly, several objects and advantages of this invention are:
-
- (a) Users are protected in real-time.
- (b) Potential predators are discouraged in real time.
- (c) Parenting load that may be needed in the prior art is significantly decreased or diminished.
- (d) Decrease the pressure of law enforcement personnel.
- Still other objects and advantages will become apparent from a consideration of the ensuing description and drawings.
- In accord with the present invention, a method is defined for an ordinary computer user to customize an avatar, so as to determine how the avatar is animated afterwards. The animation method used is preferably intuitive and simple so that ordinary computer users can learn and manipulate avatars easily and efficiently. Interaction with the virtual character can preferably involve animation of its face. Preferably the invention comprises the steps of offering an avatar a default setting of a mechanism of muscle movement, and a user interacts with the mechanism of muscle movement so as to customize the avatar. The method is preferably used in stand-alone application and multimedia communication, such as Internet, email and wireless applications. Users are able to be creative in the process of animation, thus may reveal personal flavors and personality traits through an avatar.
- In accord with the present invention, a method is defined for an intelligent system to analyze potentially damaging information, and send special signals to users in real time, so as to alert potential victims and discourage predators.
- The present invention defines a method to intelligently process messages that are being sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles. The method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be captured. Then, instructions can be triggered by the intelligent systems. As a result, graphic outputs will be displayed to alert potential victims and discourage predators. The services can be offered in real time.
-
FIG. 1 shows a general procedure of the present invention. -
FIG. 2 illustrates a dialog box in customizing an avatar. -
FIG. 3 illustrates an example in which a simulated mouth is enlarged. -
FIG. 4 illustrates the default setting of control polygons, which are located near the ends of simulated muscles. -
FIG. 5 illustrates embedding control points with feature points in a generic avatar. -
FIG. 6 shows an example in which the boundary of mouth area is changed in basic animation. -
FIG. 7 illustrates that a boundary of the areas approximates the locations of control points. -
FIG. 8 illustrates an interface that allows a user to modify virtual muscles. -
FIG. 9 illustrates an example in which a control point simulating a strengthened muscle is moved a greater amount of distance than other control points. -
FIG. 10 shows the effect of curve points and vertices after the modification of control points. -
FIG. 11 illustrates a high-level abstraction of the implementation of stand-alone applications. -
FIG. 12 illustrates using customized avatars used in multimedia communication. -
FIG. 13 illustrates the control hierarchy used in the present invention. -
FIG. 14 illustrates the overview of the present invention. -
FIG. 15 illustrates the work flow of the intelligent system inFIG. 14 . -
FIG. 16 illustrates instructions are used to generate graphic outputs. -
FIG. 17 shows an example of a discouraging avatar. -
FIG. 18 shows an embodiment of graphic interface in the present invention. -
FIG. 19 shows high-level controls are used to control 3D avatars. - In this patent document, an avatar means a virtual character. Since the face is the most expressive part of a virtual character, this document focuses on the virtual face. Thus, an avatar and a virtual face are interchangeable in this document. If it is not otherwise stated, avatars in this document are three-dimensional models.
- The implementation of the present invention is illustrated in
FIG. 1 . The procedures are described as follows. - A user can select an avatar from a number of
predefined 3D avatars 30. The chosen avatar can then represent the user him/herself 32. The selection may be done either online or offline, e.g. from a CD-ROM disk. A normal graphic interface can allow a user to select the avatars. Alternatively, a user can also build an avatar from realistic photos. Afterwards, the avatar can be remotely controlled by theuser 34. - Preferably, a user should be able to modify the chosen avatar. The modification can be done by interactively using a mouse connected to a computer, or using a dialog box. The purpose of modification is to allow a user to customize the static geometry of the avatar.
FIG. 2 illustrates a dialog box for this purpose. A user can modify facial features by usinginteractive controls - Since a 3D avatar is usually represented by a polygonal model, modification of an avatar can be done by changing the geometry of the model. For example, enlarging mouth can be done by increasing the geometric area (3D volume) of a simulated mouth.
FIG. 3 illustrates an example in which the mouth is enlarged from 42A to 42 B in an avatar (virtual face) 40. Conventional 3D animation can offer many modification tools, e.g. free form deformation. If a user modifies a model by using a high-level interface (e.g. dialog box), the modification can be done implicitly. - For
FIG. 3 and other figures in this patent document, all operations on avatars are meant to be in 3D space. The figures illustrate on 2D for simplicity. - To allow ordinary computer users to customize avatars, animation methods can preferably be intuitive and effective to ordinary users. A novel method in 3D modeling and animation was proposed by Huang*. Huang used rational curves (NURBS curves) to simulate muscle movement. This patent document takes the method as a preferable implementation that allows ordinary users to effectively customize avatars. Please refer to documents at the end of this specification for technical details. Because human face anatomy is well known, by default the rational curves on avatars can be set on the basis of real muscles (Huang*).
FIG. 4 illustrates the default setting of control polygons (44, 46 and 48) of the rational curves, in which the control points are located near the ends of virtual (or simulated) muscles. The connection of control points of a curve forms a control polygon. This default setting of curves offers an embedded mechanism of muscle movement. Users are however allowed to modify on the basis of the default setting (discussed shortly). - Control points of rational curves can be embedded in a generic avatar (face model).
FIG. 5 illustrates the approach. InFIG. 5 , points 52, 54 and 56 are three figure points on a generic avatar. For example, 52, 54 and 56 can be an out corner of an eye, a low-out corner of the nose and an out corner of the mouth respectively.Point 50 is any control point of a rational curve in the area. All points are located in three-dimensional space, each with (x,y,z) coordinates. Thepoint 50 can be determined from 52, 54 and 56, e.g.
P=r*I+s*J+t*K
where r, s and t are scalar coefficients. Coefficients can be set individually for each coordinate component, i.e. x, y and z. P, I, J and K represent the vectors to thepoints FIG. 4 . - Therefore, control points can be embedded in a generic avatar. When the geometry of a generic avatar is modified or customized, the positions of the control points will be automatically updated, and the rational curves can be recalculated accordingly. Since control points are located near ends of the muscles and all human faces have the same muscles, the association (embedding) of control points can be standardized across all avatars.
- Embedding control points in this way offers flexibility of avatar customization. Some industry standard (e.g. MPEG-4) specifically requires face models (avatars) to have a set of feature points. Therefore, another benefit of this approach is compatibility.
- Conventional multimedia applications (e.g. graphic online chat) basically only allow ordinary users to select from predefined avatars, their components or gestures, etc. Thus ordinary users have little room for creative activity. This is because conventional animation methods are complex and not intuitive to users. Thus, the skills and time span required for conventional animation are beyond the reach of ordinary users.
- Interaction with an avatar is called user controlled animation in this document. User controlled animation can be separated into basic animation and advanced animation. They are different in technical requirement to users. But basic animation and advanced animation have the same purpose, which is to allow users to be creative and to generate sufficient variety of avatars through their interaction with the avatars.
- In basic animation, a user can interactively change the boundaries of areas by using a mouse.
FIG. 6 shows an example, in which the mouth boundary is changed from 58 A to 58B. Unlike the modification during building up of avatars (e.g.FIG. 3 ), this phase doesn't affect static geometry of an avatar, instead affects the areas that are influenced by simulated muscles. The surface of a virtual face is separated into a number of areas (e.g. mouth, eyes), and each area is affected by one or more rational curves (Huang*). Thus, after a user changes the area boundaries, the areas affected by different simulated muscles will be changed. In addition, control points of rational curves are positioned near muscle ends (Huang*). The boundaries of the areas can approximate the locations of muscle ends and thus control points of the curves, as illustrated inFIG. 7 . Thus, changing area boundaries also modifies the locations of the control points, which in turn modifies the curves. InFIG. 7 , control points, like 62A on anoriginal boundary 60A, are moved to new positions, like 62B on anew boundary 60B, along simulated muscles like 63. - In advanced animation, a user can directly modify virtual muscles, which are simulated by rational curves. Since rational curves simulate muscle movement (Huang*), modification of virtual muscles can also modify the curves. However, the curves are hidden from users and only virtual muscles are visible.
FIG. 8 illustrates an intuitive interface that allows a user to modify virtual muscles. On an avatar or avirtual face 40A, virtual muscles like 64 (representing a sneering muscle) and 66 (representing a smiling muscle) are displayed and a user can interactively manipulate them. The location of these muscles can approximate the locations of real muscles. The virtual muscles can be rendered in a different color from background face area, so the muscles can be identified and modified. When a user moves a cursor over a muscle, a small text box near the cursor can be prompted to tell what muscle it is (e.g. smiling muscle or the zygomaticus major muscle, sneering muscle or the levator labii superioris muscle, etc). Alternatively, a higher-level interface can modify several muscles simultaneously. For example, an interface can allow users to change forcefulness of expressions (e.g. happiness and sadness), and each expression will be affected by several muscles. The association between expressions and muscles can be implemented by simple data structures, e.g. arrays. - A user can modify characteristics of a muscle, e.g. its length, direction, in 3D space. Multiple windows can display on a computer screen multiple views of a 3D face model. For example, one window shows a front view and another shows a side view. When a user modifies a virtual muscle in one window, the effect of the modification can be observed in both windows. The length of a muscle can be modified by moving the end of the muscle which is approximated by control points of rational curves (refer to
FIG. 4 ). The directions of muscles are approximated by 3D gradients, which determine how the curves affect polygonal vertices of an avatar (Huang*). Thus, modifying directions of muscles changes the 3D gradients. There can be constraints in how much the length and direction of a muscle can be modified. For example, the simulated smiling and sneering muscles should not cross each other, since the real smiling and sneering muscles do not cross. - By default, the control points of rational curves are located near surface boundary of an avatar (Huang*), but the users should have the freedom to move muscle ends (approximated by control points) substantially below or above the boundary. An important purpose of this freedom is to enable sufficient variety of animation.
- The present invention also allows a user to strengthen or weaken a muscle. The effect of a muscle is simulated by one or more control points of a rational curve (Huang*). When a muscle is strengthened, a control point simulating the muscle can be more substantially modified than other control points of a curve, vice versa for weakening a muscle. To simulate expressions or speeches, a curve can be modified by repositioning control points or changing weights (Huang*).
FIG. 9 illustrates an example, in which acontrol point 68A approximating a strengthenedmuscle 66 is moved a greater amount of distance than other control points, to anew position 68B. InFIG. 9 , the additional movement of the control point can be proportional to the amount of the strengthening, e.g. the number of mouse clicks on the virtual muscle. There can be constraints in how many times the muscle can be strengthened, or how much distance the control point can be moved. The constraints can be pre-determined in a generic avatar. For example, the maximum variation from a default setting can be one quarter of the width of the avatar, if control points are repositioned. Visual feedback can be given to indict the successful strengthening, e.g. the virtual muscle becoming stronger or thicker. - When a control point like 68A is modified as in
FIG. 9 , points on acurve 82 closer to 68A can move greater distances than other points further away from 68A. As illustrated inFIG. 10 , curve point 70A is closer to 68A or influenced more substantially by 68A (Huang*) than curve points 72A and 74A.Points new position FIG. 9 , the simulation will make the area near the strengthened muscle move more forcefully, which is very realistic. Besides repositioning control points, weights of control points can be modified (Huang*). - Therefore, a realistic simulation can be intuitively achieved by simply modifying a small number of control points based on users' interaction on virtual muscles. Significant benefits of this approach include that the connection between the user interaction and underlying operation is intuitive and straight forwards, the simulation mechanism is anatomy-based and thus the result is realistic. Therefore, users can very intuitively customize avatars.
- The animation methods described are intuitive and effective. Users only interact with the virtual muscles. The underlying operation (e.g. mathematical) is hidden from users. Furthermore, users can be creative in the process of animation or interaction with virtual faces. Besides being intuitive and effective to ordinary computer users, the animation methods should preferably offer sufficient facilities so that users can generate a great variety of animation. Therefore, other animation methods satisfying this requirement may also be used in user controlled animation, i.e. within the scope of this invention.
- Once an avatar is customized, it can be used in stand-alone applications or multimedia communication.
- In stand-alone applications, the customized avatar can act as a general 3D graphic interface. The avatar can be displayed in a graphic window, e.g. OpenGL window. For example, it can read out a text file. A text-to-speech (TTS) system (e.g. Microsoft Speech SDK) can convert the unconstrained text to a string of phonemes, which will be spoken out from a microphone. At the same time of speech processing, visemes can be determined by TTS. Visemes are visual mouth shapes that occur during speech. Thus, visemes can be transformed to the movement of muscles (e.g. the zygomaticus major muscle). Since curve modification intuitively simulates muscle movement (Huang*), then visemes can thus be simulated by modifying the curves. By modifying the curves according to the visemes, the avatar can generate facial movement that matches the speech.
FIG. 11 illustrates a high-level abstraction of the implementation of the stand-alone applications.Visemes 86 are fed to a functional module that transforms visemes tomuscle movement 88. Parameters representing muscle movement are then fed to a functional module that transforms muscle movement tocurve modifications 90. Thenavatar animation 92 is outputted.FIG. 11 focuses on the visual aspect. The applications should also have other functions of file opening, phoneme processing, etc. - In multimedia communication, the avatar can be selectively published, i.e. uploaded to the server maintained by a service provider. The application areas of multimedia communication include but not limit to Internet, email and wireless. In an online application (e.g. email or chat), the avatar can be sent to other users who are connected to the server. Thus, the avatar can represent its creator. The avatar can express/speak in a way that is genuinely determined by its creator. For example, in an online chat session, a user can input a line of text. When the text is sent to a remote site, it will be spoken out by the customized avatar. The techniques of stand-alone applications can be used in the remote site.
-
FIG. 12 illustrates an embodiment. Auser X 94 uploads a customizedavatar 100 to aservice provider 96. Theservice provider 96 can provide Internet services, email or wireless services.User Y 98 can also connect to theservice provider 96 and download the customizedavatar 100. Afterwards, the customizedavatar 100 can act as a graphic agent foruser X 94. Ifuser X 94 sends email touser Y 98, the email message can be spoken out by theavatar 100. If users X 94 andY 98 are in the same online chat session, the avatar can also speak out user X's message in user Y's local computer. If users X 94 andY 98 have frequent communication,user Y 98 can save the avatar in his/her local computer. The avatar can be saved as a set of vertices and related texture images. Thus, the avatar can be uploaded and downloaded only whenuser X 94 modifies it. - In wireless applications, the avatar can be animated while speak out messages in wireless devices (mobile phones). Users may prefer to look at (customized) speaking avatars, thus moving wireless devices away from their heads. As a result, it may help to decrease the potential risk of radiation from high frequencies. Therefore, the present invention offers a benefit of risk reduction in wireless communication.
- Since the avatar is affected by both visemes and emotions. Their effect can be blended together. The following formula shows one embodiment of the blending:
V=aV v +bV e
where V is the movement of a vertex on the face model. Vv is the movement contributed by a present viseme and Ve is the movement contributed by an emotion. They have scalar coefficients a and b respectively. We can have a+b=1 and a>0, b>0. V, Vv and Ve are vectors. Vv and Ve both approximate muscle movement and can be obtained from the above description. In addition, the vectors can be affected by personality, culture, etc. In other words, the movement of a polygonal vertex can be a sum of vectors, each of which individually represent elementary movement from either speech or emotion. As a result, an ordinary user can intuitively determine how an avatar expresses and speaks. - In multimedia communication, the avatar can be interactively and remotely controlled by its creator. After the interaction with avatars, only information representing the modification needs to be sent through a communication channel. For example, in the modification in
FIG. 9 , only parameters that represent update of a single control point will be sent, if the user only remotely modifies one muscle.FIG. 13 further illustrates the control hierarchy used in the present invention. As shown inFIG. 13 , control points 102 affect points 104 on rational curves, which in turn affectvertices 106 of an avatar (or model). - The technology is especially suitable for using in multimedia communication. Because of the hierarchy, a decoder generally needs to know only high-level parameters (i.e. control points). Therefore, the technology can significantly improve coding efficiency and can be very economic in terms of communication bandwidth. This advantage is crucially important in communications where bandwidth is a precious resource, e.g. wireless.
-
FIG. 14 illustrates an overview of another aspect of the present invention.Client 108 andclient 114 both connect to aservice provider 110, who may provide online services (e.g. chat sessions). Supposeclient 108uploads messages 118 to theservice provider 110, then themessages 118 are downloaded toclient 114. Anintelligent system 112 or filter analyzes themessages 118 in this process. Theintelligent system 112 may reside in a server of theservice provider 110, or any of the clients. Theintelligent system 112 can be implemented using software, hardware. It can have any level of machine intelligence and machine learning capabilities. If theintelligent system 112 finds potentially damaging info in themessages 118,special signals 116 will be sent to the clients. For example, alert signals will be sent toclient 114 and discouraging signals will be sent toclient 108. The details of the implementation will be given as follows. -
FIG. 15 illustrates the work flow of the intelligent system inFIG. 14 .Messages 118 sent between clients are analyzed by theintelligent system 112.Messages 118 can be a number of formats, including texts input by a client, recognized speech from a client, etc. Theintelligent system 112 contains a number ofrules 120 that are used to monitor potentially damaging information. The following are some examples that therules 120 may be monitoring: -
- (a) What is your phone number?
- (b) Where do you live?
- (c) How about a date?
- (d) Meet you at . . .
- The
rules 120 can be set by aservice provider 110 or parents of young users.Rules 120 can be pre-determined or dynamically set, or learnt using any intelligent method. - In
FIG. 15 , themessages 118 are analyzed against therules 120. For example, themessages 118 can be scanned to see if they contain any of the monitored requests (e.g. (a) to (d)), or their variations. If potentially damaging requests are detected, special instructions (122 inFIG. 16 ) are triggered by the intelligent system and sent to clients. For example, alert signals are sent toclient Y 114 and discouraging signals are sent toclient X 108. - Since visual information is crucially important to human beings,
FIG. 16 illustrates a preferred embodiment in which theinstructions 122 generategraphic outputs 126.Instructions 122 can first act on agraphic database 124, which may contain two-dimensional (2D) bitmaps or three-dimensional (3D) models. The bitmaps and models can be customized by clients. Customizing 3D models is disclosed in the previous part of this document. - If potentially damaging requests (e.g. asking for phone number) are detected by the
intelligent system 112, theinstructions 122 can trigger alert or discouraging graphic outputs from thegraphic database 124. -
FIG. 17 shows a simple example of a discouraging avatar, which is face image or model. A discouraging avatar can have an unattractive expression, such as an evil expression. An alert avatar can have a surprising or a fear expression. Since the face is very expressive and facial expressions can be universally understood, facial images or models are preferred in the present invention. In this patent document, an avatar means a virtual character. Since the face is preferred, this document focuses on the virtual face. Thus, an avatar and a virtual face are interchangeable in this document. -
FIG. 18 shows an embodiment ofgraphic interface 128 in the present invention. The up-right part 132 of theinterface 128 is an avatar representing a remote client. The up-leftpart 130 of theinterface 128 is an avatar representing a local client. For example, toclient Y 114 inFIG. 14 , an avatar at the up-right part 132 representsclient X 108 and another avatar at up-leftpart 130 representclient Y 114 her/himself. Atext input area 134 below the two avatars can allow users to input messages. - Under normal circumstance (i.e. no potentially damaging requests detected), the avatars can have pleasant and relaxing expressions. The avatars can also speak out the messages. For example, the English language has 14 distinctive visemes, which are visual mouth shapes of phonemes. The graphic database (in
FIG. 16 ) can store information of the 14 visemes. While messages are scanned, the visemes can be retrieved from text-to-speech (TTS) system, each viseme will lead to a relevant graphic output. - When a potentially damaging requests are detected, special graphic outputs (e.g. the avatar in
FIG. 17 ) will replace the normal avatar. For example, when the messages send fromclient X 108 toclient Y 114 are detected as containing potentially damaging requests,instructions 122 will be triggered. Inclient Y 114's computer, a discouraging avatar can be displayed as theremote model 132, and an alert avatar can be displayed as thelocal model 130. Therefore, intuitive visual information will instantly given toclient Y 114. A substantial benefit is that the system can instantly makeclient X 108 less attractive toclient Y 114, and makeclient Y 114 instantly be aware of potential damage. Since discouraging and alert avatars can also be instantly displayed inclient X 108's computer,client X 108 is instantly discouraged or penalized for his behavior. A penalty scheme can be applied. Penalty points can be added toclient X 108's account each time he sends out a potentially damaging request. The penalty points can be fed to theinstructions 122 inFIG. 16 . In other words, the more penalty points, the more unattractive the predator will be. In a chat session, cumulative penalty points can lead to a client expelled from the chat session, and unable to join again for some time. - The visual information can be enhanced by audio signals. For example, at the same time an avatar indicates bad intentions, the avatar's voice can also become less attractive and more obviously threatening. An avatar's voice can be modified by changing frequency components, pitch, rate, emphasis, etc.
- If 3D avatars are used to present clients in chat sessions, high-level controls can be used to control the avatars.
FIG. 19 shows a preferred embodiment. An effective method in 3D modeling and animation was proposed by Huang*. This patent document takes the method as a preferable implementation that offers high-level controls for 3D avatars. Please refer to documents at the end of this specification for technical details. Huang built a direct connection between muscle movement and modification of parametric curves. Therefore, control points of the curves offer high-level abstraction of muscle movements/expressions. For example, in generating happiness expression, a muscle near the ear pulls the mouth outwards and upwards. To simulate this effect, control points near the ear and simulating the muscle are shifted outward and upward, or their weights are increased. In generating sadness expression, a muscle located at the lower-outer sides of the mouth contracts and pulls the mouth corners downwards. To simulate this effect, control points located at the lower-outer sides of the mouth and simulating the muscle are moved outward from the mouth, or their weights are increased (Huang*). Since each expression is a direct result of certain muscle movement, the muscle movement can be simulated by modifying the high-level controls (i.e. control points of the curves). - In
FIG. 19 , expression requests 136 (can be sent from instructions 122) are fed into afunctional module 138 that offers mapping information about high-level controls. The mapping information can include a mapping between expressions and relevant modification of high-level controls (Huang*). The mapping then generates high-level parameters 142 (e.g. modification of control points), which modifies3D avatars 140. By using high-level controls, the amount of information sent between clients and service providers is significant low, thus requesting less bandwidth. - The present invention has a number of significant advantages and benefits.
-
- User operations are simple and intuitive, since they only interact with the virtual muscles or higher level abstractions. The underlying mathematical operation is hidden from users.
- The connection between the user interaction and the underlying operation is intuitive and straight forward.
- The simulation mechanism is anatomy-based and thus the result will be realistic.
- The present invention can offer customized human computer interface.
- Avatars can be controlled by high-level parameters and coding efficiency can be improved.
- Potential damaging information is graphically indicated, which is very intuitive to users.
- Graphic indication can preferably use facial avatars, which can be universally understood.
- Users are protected in real-time.
- Potential predators are discouraged in real time.
- Parenting guidance that is substantially needed in the prior art is significantly decreased or diminished.
- Decrease the pressure of law enforcement personnel.
- In the prior art, user customization of avatars is very limited. Since the avatars are basically predefined by animators. The present invention allows ordinary computer users to genuinely customize avatars. Users not only can adjust static models, but also can decide dynamic behavior of avatars (e.g. simulated muscles). An ordinary user can intuitively determine how an avatar expresses and speaks.
- Since users can very intuitively customize avatars, we can have individualized animation. The individualization can be extremely important, because no a single user may want his/her avatar to be the same as any other people's. In the prior art, animation technologies make individualization/customization of avatars extremely difficult if not entirely impossible.
- Users may enjoy the process of animation (or interaction). Furthermore, users may reveal personal flavors or traits in the process. A user can present an avatar or virtual character, just like he/she can present a creation in the real world. It may be to a user's own interest to build an attractive avatar. Users with different background (e.g. ages) may build avatars with distinctive differences. Therefore, the present invention can have a number of additional benefits, e.g. online safety.
- The method outlined in the patent document can be used in a wide range of multimedia application. For example, besides online communication, it can be used in education (e.g. facial anatomy).
- At another aspect of the present invention, the core inventive concept is that messages are analyzed against rules and potential damaging information is graphically indicated instantly. Therefore, protection and prevention are offered in real time.
- The foregoing describes only some embodiments of the present inventions, and modifications obvious to those skilled in the art can be made thereto without departing from the scope of the present invention.
- *Huang, “Modeling object interactions and facial expressions”, PCT/AU10/01539.
- *Huang, “Parameterization of deformation and simulation of interaction”, U.S. patent application Ser. No. 10/416,459.
- *Huang, et al. “NURBS curve controlled modeling for facial animation”, Computers & Graphics, vol. 27, no. 3, pp. 373-385, June 2003.
Claims (19)
1. A method for multimedia operation and communication, comprising providing a means for a user to customize a graphic avatar, whereby the user reveals personal flavors and personality traits through the avatar.
2. The method of claim 1 wherein said means comprising the step of providing the graphic avatar.
3. The method of claim 1 wherein said means comprising the step of animating the said avatar.
4. The method of claim 1 wherein said avatar comprising a plurality of virtual faces.
5. The method of claim 4 wherein said faces are controlled by virtual muscles.
6. The method of claim 5 wherein said muscles are controlled by rational curves.
7. The method of claim 6 further comprising embedding control points of said curves in said faces.
8. The method of claim 4 further comprising providing a means for a user to change the static shape of said avatar.
9. The method of claim 5 further comprising providing a means for a user to operate on said muscles.
10. The method of claim 9 further comprising providing a default setting of said muscles.
11. The method of claim 9 further comprising any combination of strengthening and weakening said muscles.
12. A method for multimedia operation and communication, comprising the steps of:
(a) transforming visemes to muscle movement,
(b) transforming said muscle movement to curve modification.
13. The method of claim 12 further comprising controlling animation of avatars using said curve modification.
14. A method for analyzing and indicating information in multimedia operation and communication, comprising the steps of:
(a) analyzing said information against rules,
(b) said rules triggering instructions when said information satisfies said rules,
(c) said instructions generating perceivable outputs.
15. The method in claim 14 wherein said outputs are graphically presented.
16. The method in claim 15 wherein said outputs are virtual faces.
17. The method in claim 15 wherein said outputs comprising any one of alert and discouraging messages.
18. The method in claim 14 wherein said rules are dynamically learnt using any intelligent method.
19. The method in claim 14 further comprising providing a penalty scheme, said penalty scheme discourages inappropriate behaviors.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/862,396 US8555164B2 (en) | 2001-11-27 | 2004-06-08 | Method for customizing avatars and heightening online safety |
US14/029,522 US20140019374A1 (en) | 2001-11-27 | 2013-09-17 | Method for customizing avatars and heightening online safety |
Applications Claiming Priority (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/AU2001/001539 WO2002043006A1 (en) | 2000-11-27 | 2001-11-27 | Modeling object interactions and facial expressions |
AU2003902845A AU2003902845A0 (en) | 2003-06-06 | 2003-06-06 | User controlled animation in multimedia communication |
AU2003902845 | 2003-06-06 | ||
AU2003904864A AU2003904864A0 (en) | 2003-09-08 | Method for customizing avatars | |
AU2003904864 | 2003-09-08 | ||
US41645903A | 2003-10-06 | 2003-10-06 | |
AU2003905525A AU2003905525A0 (en) | 2003-10-10 | Method for using intelligent system to heighten online safety | |
AU2003905525 | 2003-10-10 | ||
US10/862,396 US8555164B2 (en) | 2001-11-27 | 2004-06-08 | Method for customizing avatars and heightening online safety |
Related Parent Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/416,459 Continuation-In-Part US8988419B2 (en) | 2000-11-27 | 2001-11-27 | Parameterization of deformation and simulation of interaction |
PCT/AU2001/001539 Continuation-In-Part WO2002043006A1 (en) | 2000-11-27 | 2001-11-27 | Modeling object interactions and facial expressions |
US41645903A Continuation-In-Part | 2001-11-27 | 2003-10-06 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/029,522 Division US20140019374A1 (en) | 2001-11-27 | 2013-09-17 | Method for customizing avatars and heightening online safety |
Publications (3)
Publication Number | Publication Date |
---|---|
US20040250210A1 US20040250210A1 (en) | 2004-12-09 |
US20120216116A9 true US20120216116A9 (en) | 2012-08-23 |
US8555164B2 US8555164B2 (en) | 2013-10-08 |
Family
ID=33493691
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/862,396 Expired - Lifetime US8555164B2 (en) | 2001-11-27 | 2004-06-08 | Method for customizing avatars and heightening online safety |
US14/029,522 Abandoned US20140019374A1 (en) | 2001-11-27 | 2013-09-17 | Method for customizing avatars and heightening online safety |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/029,522 Abandoned US20140019374A1 (en) | 2001-11-27 | 2013-09-17 | Method for customizing avatars and heightening online safety |
Country Status (1)
Country | Link |
---|---|
US (2) | US8555164B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110087541A1 (en) * | 2007-06-08 | 2011-04-14 | Gopal Krishnan | Web Pages and Methods for Providing Rewards for Liking Particular On-Line Advertisements in a Social Networking Media Space |
US20120026174A1 (en) * | 2009-04-27 | 2012-02-02 | Sonoma Data Solution, Llc | Method and Apparatus for Character Animation |
US20180260994A1 (en) * | 2016-03-10 | 2018-09-13 | Tencent Technology (Shenzhen) Company Limited | Expression animation generation method and apparatus for human face model |
Families Citing this family (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060041848A1 (en) * | 2004-08-23 | 2006-02-23 | Luigi Lira | Overlaid display of messages in the user interface of instant messaging and other digital communication services |
US20060085758A1 (en) * | 2004-10-18 | 2006-04-20 | Dan Backus | Desktop alert management |
DE102005014772A1 (en) * | 2005-03-31 | 2006-10-05 | Siemens Ag | Display method for showing the image of communication participant in communication terminal, involves using face animation algorithm to process determined facial coordinates of image to form animated image of calling subscriber |
JP2006330958A (en) * | 2005-05-25 | 2006-12-07 | Oki Electric Ind Co Ltd | Image composition device, communication terminal using the same, and image communication system and chat server in the system |
WO2007016596A2 (en) * | 2005-07-29 | 2007-02-08 | Pamela Barber | Digital imaging method and apparatus |
US20070061189A1 (en) * | 2005-09-12 | 2007-03-15 | Sbc Knowledge Ventures Lp | Method for motivating competitors in an enterprise setting |
US20070074114A1 (en) * | 2005-09-29 | 2007-03-29 | Conopco, Inc., D/B/A Unilever | Automated dialogue interface |
CN1991982A (en) * | 2005-12-29 | 2007-07-04 | 摩托罗拉公司 | Method of activating image by using voice data |
EP1984898A4 (en) * | 2006-02-09 | 2010-05-05 | Nms Comm Corp | Smooth morphing between personal video calling avatars |
US7607962B2 (en) | 2006-05-04 | 2009-10-27 | Mattel, Inc. | Electronic toy with alterable features |
US20070282791A1 (en) * | 2006-06-01 | 2007-12-06 | Benny Amzalag | User group identification |
GB2454384A (en) * | 2006-08-04 | 2009-05-06 | Auckland Uniservices Ltd | Biophysical virtual model database and applications |
US20080214168A1 (en) * | 2006-12-21 | 2008-09-04 | Ubiquity Holdings | Cell phone with Personalization of avatar |
CN101595486A (en) * | 2007-02-02 | 2009-12-02 | 皇家飞利浦电子股份有限公司 | Interactive patient forums |
CN101601043B (en) * | 2007-02-02 | 2013-02-27 | 皇家飞利浦电子股份有限公司 | Medical video communication systems and methods |
CN101669090A (en) * | 2007-04-26 | 2010-03-10 | 福特全球技术公司 | Emotive advisory system and method |
WO2008151420A1 (en) * | 2007-06-11 | 2008-12-18 | Darwin Dimensions Inc. | Automatic feature mapping in inheritance based avatar generation |
WO2008151422A1 (en) * | 2007-06-11 | 2008-12-18 | Darwin Dimensions Inc. | Dynamic user interface for inheritance based avatar generation |
WO2008151419A1 (en) * | 2007-06-11 | 2008-12-18 | Darwin Dimensions Inc. | Sex selection in inheritance based avatar generation |
WO2008151424A1 (en) * | 2007-06-11 | 2008-12-18 | Darwin Dimensions Inc. | Metadata for avatar generation in virtual environments |
WO2008151421A1 (en) * | 2007-06-11 | 2008-12-18 | Darwin Dimensions Inc. | User defined characteristics for inheritance based avatar generation |
US8600779B2 (en) * | 2007-10-09 | 2013-12-03 | Microsoft Corporation | Advertising with an influential participant in a virtual world |
US8606634B2 (en) * | 2007-10-09 | 2013-12-10 | Microsoft Corporation | Providing advertising in a virtual world |
US20090132361A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Consumable advertising in a virtual world |
US8527334B2 (en) * | 2007-12-27 | 2013-09-03 | Microsoft Corporation | Advertising revenue sharing |
US9137318B2 (en) * | 2008-01-16 | 2015-09-15 | Avaya Inc. | Method and apparatus for detecting events indicative of inappropriate activity in an online community |
US8719077B2 (en) * | 2008-01-29 | 2014-05-06 | Microsoft Corporation | Real world and virtual world cross-promotion |
US20090210301A1 (en) * | 2008-02-14 | 2009-08-20 | Microsoft Corporation | Generating customized content based on context data |
US20090251484A1 (en) * | 2008-04-03 | 2009-10-08 | Motorola, Inc. | Avatar for a portable device |
US20090254832A1 (en) * | 2008-04-03 | 2009-10-08 | Motorola, Inc. | Method and Apparatus for Collaborative Design of an Avatar or Other Graphical Structure |
US11571623B2 (en) | 2008-06-02 | 2023-02-07 | Nike, Inc. | System and method for creating an avatar |
EP2293855A1 (en) | 2008-06-02 | 2011-03-16 | Nike International Ltd. | System and method for creating an avatar |
US8446414B2 (en) * | 2008-07-14 | 2013-05-21 | Microsoft Corporation | Programming APIS for an extensible avatar system |
US20120246585A9 (en) * | 2008-07-14 | 2012-09-27 | Microsoft Corporation | System for editing an avatar |
US9901829B2 (en) * | 2008-07-15 | 2018-02-27 | Pamela Barber | Digital imaging method and apparatus |
US8384719B2 (en) * | 2008-08-01 | 2013-02-26 | Microsoft Corporation | Avatar items and animations |
US20100035692A1 (en) * | 2008-08-08 | 2010-02-11 | Microsoft Corporation | Avatar closet/ game awarded avatar |
CA2739582A1 (en) | 2008-10-14 | 2010-04-22 | Brand Affinity Technologies, Inc. | Apparatus, system and method for a brand affinity engine using positive and negative mentions and indexing |
US9412126B2 (en) * | 2008-11-06 | 2016-08-09 | At&T Intellectual Property I, Lp | System and method for commercializing avatars |
US8898565B2 (en) * | 2008-11-06 | 2014-11-25 | At&T Intellectual Property I, Lp | System and method for sharing avatars |
US8806337B2 (en) | 2009-04-28 | 2014-08-12 | International Business Machines Corporation | System and method for representation of avatars via personal and group perception, and conditional manifestation of attributes |
US9264649B2 (en) | 2009-07-30 | 2016-02-16 | Koninklijke Philips N.V. | Medical video communication systems and methods |
US9930310B2 (en) | 2009-09-09 | 2018-03-27 | Apple Inc. | Audio alteration techniques |
KR20110107428A (en) * | 2010-03-25 | 2011-10-04 | 삼성전자주식회사 | Digital apparatus and method for providing user interface for making contents and recording medium recorded program for executing thereof method |
US20120069028A1 (en) * | 2010-09-20 | 2012-03-22 | Yahoo! Inc. | Real-time animations of emoticons using facial recognition during a video chat |
JP5632693B2 (en) * | 2010-09-28 | 2014-11-26 | 任天堂株式会社 | Information processing program, information processing apparatus, information processing method, and information processing system |
US10456209B2 (en) | 2010-10-13 | 2019-10-29 | Gholam A. Peyman | Remote laser treatment system with dynamic imaging |
US9931171B1 (en) * | 2010-10-13 | 2018-04-03 | Gholam A. Peyman | Laser treatment of an eye structure or a body surface from a remote location |
US11309081B2 (en) | 2010-10-13 | 2022-04-19 | Gholam A. Peyman | Telemedicine system with dynamic imaging |
CN110634175B (en) | 2013-08-02 | 2023-05-16 | 索美智能有限公司 | Neural behavior animation system |
JP6311372B2 (en) * | 2014-03-13 | 2018-04-18 | オムロン株式会社 | Image processing apparatus and image processing method |
WO2015145219A1 (en) * | 2014-03-28 | 2015-10-01 | Navaratnam Ratnakumar | Systems for remote service of customers using virtual and physical mannequins |
US20150238879A1 (en) * | 2014-05-23 | 2015-08-27 | Bluniz Creative Technology Corporation | Remote interactive media |
US9987749B2 (en) | 2014-08-15 | 2018-06-05 | University Of Central Florida Research Foundation, Inc. | Control interface for robotic humanoid avatar system and related methods |
KR20160084151A (en) * | 2015-01-05 | 2016-07-13 | 주식회사 모르페우스 | Method, system and non-transitory computer-readable recording medium for providing face-based service |
US10607386B2 (en) | 2016-06-12 | 2020-03-31 | Apple Inc. | Customized avatars and associated framework |
CN106951882B (en) * | 2017-03-31 | 2021-03-23 | 广州帕克西软件开发有限公司 | Face shape recognition and tracking method and device |
US11054272B2 (en) * | 2017-05-11 | 2021-07-06 | Disney Enterprises, Inc. | Physical navigation guided via story-based augmented and/or mixed reality experiences |
DK179867B1 (en) * | 2017-05-16 | 2019-08-06 | Apple Inc. | RECORDING AND SENDING EMOJI |
US10861210B2 (en) | 2017-05-16 | 2020-12-08 | Apple Inc. | Techniques for providing audio and video effects |
US11232617B2 (en) * | 2018-01-11 | 2022-01-25 | Pamela L. Barber | Digital imaging method and apparatus |
KR102661019B1 (en) * | 2018-02-23 | 2024-04-26 | 삼성전자주식회사 | Electronic device providing image including 3d avatar in which motion of face is reflected by using 3d avatar corresponding to face and method for operating thefeof |
CN110531860B (en) | 2019-09-02 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Animation image driving method and device based on artificial intelligence |
US11403801B2 (en) * | 2020-09-18 | 2022-08-02 | Unity Technologies Sf | Systems and methods for building a pseudo-muscle topology of a live actor in computer animation |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5818452A (en) * | 1995-08-07 | 1998-10-06 | Silicon Graphics Incorporated | System and method for deforming objects using delta free-form deformation |
US5880731A (en) * | 1995-12-14 | 1999-03-09 | Microsoft Corporation | Use of avatars with automatic gesturing and bounded interaction in on-line chat session |
US6064390A (en) * | 1996-07-26 | 2000-05-16 | Lifef/X Networks, Inc. | Apparatus and method for representation of expression in a tissue-like system |
US5892691A (en) * | 1996-10-28 | 1999-04-06 | Reel/Frame 8218/0138 Pacific Data Images, Inc. | Method, apparatus, and software product for generating weighted deformations for geometric models |
JPH10188028A (en) * | 1996-10-31 | 1998-07-21 | Konami Co Ltd | Animation image generating device by skeleton, method for generating the animation image and medium storing program for generating the animation image |
US6031539A (en) * | 1997-03-10 | 2000-02-29 | Digital Equipment Corporation | Facial image method and apparatus for semi-automatically mapping a face on to a wireframe topology |
US6400368B1 (en) * | 1997-03-20 | 2002-06-04 | Avid Technology, Inc. | System and method for constructing and using generalized skeletons for animation models |
US6147692A (en) * | 1997-06-25 | 2000-11-14 | Haptek, Inc. | Method and apparatus for controlling transformation of two and three-dimensional images |
US6714661B2 (en) * | 1998-11-06 | 2004-03-30 | Nevengineering, Inc. | Method and system for customizing facial feature tracking using precise landmark finding on a neutral face image |
US6535215B1 (en) * | 1999-08-06 | 2003-03-18 | Vcom3D, Incorporated | Method for animating 3-D computer generated characters |
US6781608B1 (en) * | 2000-06-30 | 2004-08-24 | America Online, Inc. | Gradual image display |
US6486882B1 (en) * | 2000-07-21 | 2002-11-26 | Sony Corporation | System and method for designing computer generated imagery of a two dimensional array of objects advancing in a third dimension |
US6731287B1 (en) * | 2000-10-12 | 2004-05-04 | Momentum Bilgisayar, Yazilim, Danismanlik, Ticaret A.S. | Method for animating a 3-D model of a face |
US7640305B1 (en) * | 2001-06-14 | 2009-12-29 | Apple Inc. | Filtering of data |
US7636755B2 (en) * | 2002-11-21 | 2009-12-22 | Aol Llc | Multiple avatar personalities |
-
2004
- 2004-06-08 US US10/862,396 patent/US8555164B2/en not_active Expired - Lifetime
-
2013
- 2013-09-17 US US14/029,522 patent/US20140019374A1/en not_active Abandoned
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110087541A1 (en) * | 2007-06-08 | 2011-04-14 | Gopal Krishnan | Web Pages and Methods for Providing Rewards for Liking Particular On-Line Advertisements in a Social Networking Media Space |
US20120026174A1 (en) * | 2009-04-27 | 2012-02-02 | Sonoma Data Solution, Llc | Method and Apparatus for Character Animation |
US20180260994A1 (en) * | 2016-03-10 | 2018-09-13 | Tencent Technology (Shenzhen) Company Limited | Expression animation generation method and apparatus for human face model |
Also Published As
Publication number | Publication date |
---|---|
US20040250210A1 (en) | 2004-12-09 |
US8555164B2 (en) | 2013-10-08 |
US20140019374A1 (en) | 2014-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8555164B2 (en) | Method for customizing avatars and heightening online safety | |
US9667574B2 (en) | Animated delivery of electronic messages | |
US8319779B2 (en) | System and method for controlling animation by tagging objects within a game environment | |
US20020007276A1 (en) | Virtual representatives for use as communications tools | |
KR20130080442A (en) | Real-time animation of facial expressions | |
US11005796B2 (en) | Animated delivery of electronic messages | |
CN111724457A (en) | Realistic virtual human multi-modal interaction implementation method based on UE4 | |
CN106471444A (en) | A kind of exchange method of virtual 3D robot, system and robot | |
WO2020129959A1 (en) | Computer program, server device, terminal device, and display method | |
Morishima | Real-time talking head driven by voice and its application to communication and entertainment | |
Čereković et al. | Multimodal behavior realization for embodied conversational agents | |
US20040179043A1 (en) | Method and system for animating a figure in three dimensions | |
Molano et al. | Parametric facial animation for affective interaction workflow for avatar retargeting | |
KR20190074558A (en) | Method and system for artificial intelligence coversation using object personification and object context | |
Chandrasiri et al. | Internet communication using real-time facial expression analysis and synthesis | |
Morishima et al. | Face-to-face communicative avatar driven by voice | |
Luerssen et al. | Head x: Customizable audiovisual synthesis for a multi-purpose virtual head | |
Godenschweger et al. | Modeling and generating sign language as animated line drawings | |
Chan et al. | Augmented Spaces: If walls could talk | |
Kunc et al. | ECAF: Authoring language for embodied conversational agents | |
Barakonyi et al. | A 3D agent with synthetic face and semiautonomous behavior for multimodal presentations | |
JP5529299B2 (en) | Computer-implemented method and apparatus for animating facial mouth | |
Mendelowitz | The Emergence Engine: A behavior based agent development environment for artists | |
Trpkoski et al. | Simulation and animation of a 3D avatar from a realistic human face model | |
Casas et al. | MoodFlow: Orchestrating Conversations with Emotionally Intelligent Avatars in Mixed Reality |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, MICRO ENTITY (ORIGINAL EVENT CODE: M3552); ENTITY STATUS OF PATENT OWNER: MICROENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO MICRO (ORIGINAL EVENT CODE: MICR); ENTITY STATUS OF PATENT OWNER: MICROENTITY |