US20150126276A1 - Avatar protection within a virtual universe - Google Patents
Avatar protection within a virtual universe Download PDFInfo
- Publication number
- US20150126276A1 US20150126276A1 US14/480,040 US201414480040A US2015126276A1 US 20150126276 A1 US20150126276 A1 US 20150126276A1 US 201414480040 A US201414480040 A US 201414480040A US 2015126276 A1 US2015126276 A1 US 2015126276A1
- Authority
- US
- United States
- Prior art keywords
- avatar
- protected
- virtual universe
- activity
- processing unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/75—Enforcing rules, e.g. detecting foul play or generating lists of cheating players
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/73—Authorising game programs or game devices, e.g. checking authenticity
-
- A63F13/12—
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
- A63F13/35—Details of game servers
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/79—Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/131—Protocols for games, networked simulations or virtual reality
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/53—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing
- A63F2300/535—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing for monitoring, e.g. of user parameters, terminal parameters, application parameters, network parameters
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/55—Details of game data or player data management
- A63F2300/5546—Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history
- A63F2300/5553—Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history user representation in the game field, e.g. avatar
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/55—Details of game data or player data management
- A63F2300/5546—Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history
- A63F2300/558—Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history by assessing the players' skills or ranking
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/55—Details of game data or player data management
- A63F2300/5586—Details of game data or player data management for enforcing rights or rules, e.g. to prevent foul play
Definitions
- the present invention generally relates to protecting a virtual universe (VU) user represented by an avatar from the actions of one or more other user's avatars. Notification and other responsive actions taken with respect to other user's avatars are also discussed.
- VU virtual universe
- VU Virtual Universe
- VU is a computer-based simulated world or environment; other terms for VU's include metaverses, “3-D Internet” and Virtual World, and VU will be understood to represent any of these environments.
- a user creates an agent which functions as the user's account, and upon which the user builds an avatar tied to an inventory of assets the user owns in the VU and associated with the agent.
- Second Life® SECOND LIFE is a trademark of Linden Research, Inc. in the United States and/or other countries
- Entropia UniverseTM ENTROPIA UNIVERSE is a registered trademark of MindArk PE AB in the United States, other countries, or both
- the Sims OnlineTM TEE SIMS ONLINE is a trademark of Electronic Arts, Inc. in the United States, other countries, or both
- ThereTM THERE is a trademark of Makena Technologies, Inc. in the United States, other countries, or both
- VU's are also commonly defined with respect to VU regions, virtual areas of land within the VU typically residing on a single server, with each region amenable to provision and management by a one or more participating providers.
- the size and complexity and variety of resources found in a VU are related to the number of providers participating and hosting regions through server hosting. And the success of a VU may depend upon attracting users and keeping them engaged and participating in the VU environment, thereby adding value to the providers who bear the cost in providing VU region content and services (and correspondingly expect an appropriate level of multiple-user engagement as a return on their investment), as well as for other users who wish to engage many others in a large virtual community.
- an informational or service-related region managed by a non-profit organization may desire or expect a given level of VU user engagement and participation, and commercial region providers may desire to engage in a given level of commercial transactions (e.g. sales) or achieve a level of marketing exposure among VU users.
- VU avatars may exhibit inappropriate and threatening behaviors relative to other users or the VU environment itself.
- prior art protection mechanisms are limited in their efficacy, and in particular with respect to offering proactive protection from hostile actions intentionally directed against a specific avatar by another user's avatar.
- a user with personal knowledge of another user may use an avatar to deliberately harass or stalk the avatar of the other user.
- some harassing behavior personally offensive or threatening to a target avatar may in fact be perceived as ambiguous or not objectionable to other users or to VU provider supervisory entities, and thus some harassing activities may actually be permitted by VU provider or supervisory entities, thereby rendering general protection mechanisms provided by some VU providers ineffective or even useless in protecting the targeted avatar.
- VU users whose avatars are subject to objectionable behavior are forced to take actions on their own behalf, actions which may be burdensome and difficult for the user, or may even be proscribed by VU operating agreements or other normative rules (for example, directly responding with harassment, insults, violence in kind, etc.)
- Methods are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar.
- a protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
- Methods also provide protective services to a virtual universe resident, with a service provider offering protective services for a virtual universe client resident.
- service providers implement protection for a virtual universe client resident from a second resident, the protection implementing including preventing the second resident from engaging in a proscribed activity as a function of an association of the proscribed activity with the client resident.
- Service providers monitor activity of client residents and second residents within the virtual universe for indicia of the proscribed activity, and execute a protective action against the client resident or the second resident in response detecting the indicia.
- Methods also protect a protected avatar from actions of a second avatar within a virtual universe by producing computer executable program code, storing the code on a computer readable medium, and providing the program code to be deployed and executed on a computer system engaging a virtual universe.
- the program code causes a computer system to distinguish an activity of the second avatar within the virtual universe as a function of a relation of the distinguished activity to the protected avatar and define a protective action associated with the distinguished activity and executable against the protected avatar or the second avatar.
- the program code also causes a computer system to monitor activity of the protected avatar or the second avatar within the virtual universe for the distinguished activity, and to execute the protective action against the protected avatar or the second avatar in response to detecting the distinguished activity.
- Programmable devices are also provided, the devices having processing means; memory in communication with the processing means; and a network interface in communication with the processing means and the memory.
- the processing means are configured to detect an avatar activity hostile to a protected avatar within a virtual universe and prevent a second avatar from engaging in the hostile activity within the virtual universe as a function of a relation of the hostile activity to the protected avatar.
- the processing means are further configured to monitor activity of the protected avatar or the second avatar within the virtual universe for the hostile activity and cause a virtual universe computer application to take a protective action against the protected avatar or the second avatar in response to detecting the hostile activity.
- FIG. 1 is a flow chart illustrating a process and system for protecting a first avatar from actions of another avatar within a virtual universe.
- FIG. 2 is a block diagram illustration of protecting a protected avatar from actions of another avatar according to the present invention.
- FIG. 3 is a block diagram illustration of a virtual universe programmable device configured to protect a first avatar from actions of another avatar within a virtual universe.
- FIG. 4 is a tabular representation of a policy table for use in protecting an avatar from actions of another avatar within a virtual universe.
- FIG. 5 is a block diagram illustrating an exemplary computerized implementation of a system and method for protecting a first avatar from actions of another avatar within a virtual universe.
- VU providers may set policies for providing protections to user avatars that incorporate or codify community standards which specify prohibited certain behaviors, and may condition participation in the VU upon agreeing to specific terms and conditions.
- Such standards are generally useful in addressing readily-identifiable and generic behaviors defined with respect to all users or the environment itself, such as intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace.
- Exposure to objectionable behavior may also be limited by designating regions of a virtual universe as “safe” or “unsafe” or by rating them (e.g. “mature,” “PG”, etc.), in some examples with corresponding restrictions on a minimum age needed to enter regions designated as “unsafe” or “mature,” and sometimes also requiring users to agree to hold the VU harmless for offensive conduct and contacts experienced in designated unsafe or mature regions, the user accepting the risk upon entering such a region.
- VU's may also take steps to ensure that wrong-doers do not hide behind other or multiple avatars, for example requiring identification of the primary user of alternate accounts in the case of a user utilizing additional avatars.
- Notification mechanisms to enable reporting of violations of community standards and minimum age restrictions may include abuse reporter tools, some of which keep the identity of the reporter confidential. Immediate assistance can also be provided by in-world avatars representing the virtual universe provider.
- Virtual universe providers may also maintain a public list of abuse incidents including the date, location in the virtual universe, policy violated, nature of the abuse and action taken, some of which do not identify the offending avatar or owner of the user account.
- Tracked and recognized abuse incidents may include objectionable-object littering, indecency in public areas, assault with scripted objects in designated safe areas, disturbing the peace with repetitive sound spam, verbal abuse by an alternate account avatar and indecencies or obscene images in the publicly accessible avatar profile.
- Actions taken by virtual universe providers in response to abuse incidents typically involve warnings, suspensions, permanent banning from a virtual universe, and even possible legal action (for example, possible criminal law actions with respect to activities deemed illegal in an appropriate jurisdiction).
- Virtual universe providers are also limited in effectively reacting to problem incidents after they occur, and relying generally on threats of banishment to enforce community standards for future actions. Users whose avatars are subject to objectionable behavior and seek to avoid it are also generally required to possess a virtual universe skill set to take protective actions on their own behalf, for example an ability to quickly teleport to a safe location, or block the receipt of text messages from offending avatars. Residents new to a virtual universe may not possess the technical skills needed to minimize offensive behavior before the threat of suspension or banishment is implemented by a virtual universe provider with respect to an offending party. residents may also be uncomfortable using abuse reporter tools, particularly when they are experiencing the stress associated with harassment.
- VU and third party service providers may also offer a variety of services to enhance the experience of a VU user client, including providing travel, recreational or educational services in virtual universes. It would be advantageous for such travel companies to be able to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them in each region served within a VU. Without the ability to offer a safe experience to their clients in a given region such companies may avoid the region or even an entire virtual universe domain in fear of legal exposure from inappropriate behaviors by residents, thereby directly resulting in a loss of revenue opportunities for a virtual universe region, domain or environment provider.
- a method and process for protecting a first avatar from actions of another avatar within a virtual universe (VU) is provided.
- a protection protocol is provided or defined for the first avatar with respect to a second avatar or a person, entity or user represented by the second avatar.
- the protection protocol is implemented within the context and framework of the virtual universe domain, the implementing comprising defining at least one rule or proscribed activity with respect to activity of another avatar within the virtual universe domain, and a protective action executable with respect to one or both avatars within the virtual universe domain.
- a supervisory entity or application operating within the virtual universe monitors activity of the first avatar and/or the second avatar within the virtual universe domain as provided by or as a function of the protocol implementation.
- the monitoring results in a triggering of an application of the implemented protocol in response to or as a function of detecting the first avatar or the second avatar violating the protocol rule, and at 110 the protocol protective action as implemented at 104 is initiated and taken with respect to at least one of the first avatar and the second avatar.
- the protective protocol may be an agreement, which may be understood to comprehend any document, contract, court order, decree, governmental rule or regulation or any other framework of duties and responsibilities defining an aspect of a relation of a protected avatar to another avatar or to a VU environment in general.
- an agreement may be understood to comprehend any document, contract, court order, decree, governmental rule or regulation or any other framework of duties and responsibilities defining an aspect of a relation of a protected avatar to another avatar or to a VU environment in general.
- protective protocol agreements may exist or be defined to protect Avatar 1 in anticipation of further conflicts.
- situations in real life can spill over into a virtual universe frequented by the same individuals as users through their avatars, and histories including abuse incidents and acrimonious divorce proceedings may present special challenges to virtual universe providers from a business and legal perspective; for example, taking a firm action such as banishing a resident who offends another resident known to him or her results in a direct loss of revenue from the banished resident.
- False or mistaken reports of virtual universe abuse for example by a friend or family member of a reputedly harassed VU resident, may also result in unfair banishment of an accused resident from a VU, or regions thereof such as clubs, cultural or recreational regions where the falsely accused resident has developed valuable social or business relationships.
- VU providers and supervisory entities may undertake investigations to verify accusations, such investigations require the expenditure of resources, and sometimes of significant and expensive resources.
- real-life agreements such as for example divorce decrees and restraining orders issued by a courts having jurisdiction over avatar users and/or VU or VU services provider may define and impose duties with respect to actions that the respective users may take within a VU through their avatars.
- advantages are obtained by implementing such agreements into the VU environment, in one aspect helping VU and VU service providers to identify and avoid potential liabilities, and, in another aspect, to serve in custom configuring a VU environment to meet the unique needs of a given protected avatar (thereby enabling some protected avatar users to participate within a VU without fear, etc., who may otherwise decline to participate).
- protective protocol agreements may directly proscribe, or be interpreted to directly proscribe, certain avatar activities hostile to an interest of the protected avatar. They may also impose duties on VU providers to report transgressions or any preventive measures instituted.
- Virtual universe providers are thus enabled to provide “virtual restraining order” proactive services, in one aspect enabling the development of additional business opportunities associated with providing regions safe for protected parties as defined by such real-world restraining orders.
- a user may desire to purchase consistent restraint/protective services which will span their residence in multiple virtual universes, and hence may be implemented through differing embodiments depending on each particular virtual universe visited.
- a virtual universe provider or a supervisory entity to provide consistent protection services by configuring appropriate protective mechanisms for each specific visited VU, in some examples including negotiating arrangements with other virtual universe providers to configure and extend such protection to each divergent VU.
- this provides a sustainable competitive advantage over other VU providers and VU service providers in attracting new residents with a variety of concerns relative to inappropriate behavior in virtual universes.
- a protection protocol agreement may be a real-world restraining order issued by an appropriate governmental entity having a legal jurisdiction over the user of a protected avatar, or over other party/avatar user(s), wherein implementing the restraining order comprises deriving and creating a “virtual restraining order” for implementation within the context of the virtual universe in order to protect the first protected avatar from virtual universe activities of one or more other second avatars in the virtual universe domain of implementation.
- FIG. 2 provides an illustration of an implemented avatar protection according to the present invention within a virtual universe domain 118 .
- a protection protocol implemented within the context and framework of the virtual universe 118 results in an exclusion zone 122 projected about a protected avatar 120 .
- a second potentially-harmful avatar 130 identified by the implemented protection protocol as hostile to the protected avatar 120 , is prevented from approaching or otherwise locating spatially close to the protected avatar 120 within the virtual universe 118 within the exclusion zone 122 .
- the protected avatar 120 seeking protection from the second avatar 130 may also directly initiate or engage the services of a VU provider or another third party services provider, who may offer a protection service that protects the protected avatar 120 from the second avatar 130 in exchange for compensation.
- the protection service or the VU provider may restrict the second avatar 130 from interacting with the protected avatar 120 , and the protected avatar 120 may also be (optionally) restricted from interacting with the second avatar 130 .
- a relationship of the protected avatar 120 relative to the second avatar 130 may be used to define the respective avatars and their obligations; for example, the user of the protected avatar 120 may be a child and the user of the second avatar 130 may be an adult who has a history or other behavioral attribute indicating that he or she may pose a threat to children in general.
- the users of the protected avatar 120 and the second avatar 130 may also be previously known to each other, either in real life or one or more virtual universes, and thus their relative identities as the protected avatar 120 and the second avatar 130 and their respective obligations and restraints with respect to each other defined as a function of their history relative to each other.
- An implemented protocol may also include a plurality of different triggers and actions, and, in one aspect, these triggers may be configured to recognize and protect an avatar in situations and contexts that, although not violating any general or normative rule within the VU, are nevertheless inappropriate as defined by the protective protocol or its implementation.
- these triggers may be configured to recognize and protect an avatar in situations and contexts that, although not violating any general or normative rule within the VU, are nevertheless inappropriate as defined by the protective protocol or its implementation.
- a parent of a child using the protected avatar 120 concerned with certain inappropriate behavior may desire that the protected avatar 120 be protected from said certain inappropriate behavior by any resident, including preventing such an avatar from coming close to the protected avatar 120 .
- the second avatar 130 is evidencing said certain inappropriate behavior, he or she is either not exceeding some objective community standard threshold, or the protected avatar 120 and the second avatar 130 may be presently located in a VU region with a higher permissive threshold than another VU region, and thus a common protective action (e.g. preventing the second avatar 130 from coming close to the protected avatar 120 ) may not be triggered as it may not be available or indicated by the given facts and general VU region settings.
- the protective protocol may thus be configured to take alternative actions in response to the inappropriate behavior generally neutral to or not directed against the putatively offending second avatar 130 , for example alerting the protected avatar 120 or the parent or other party of the situation with a graphical text message 142 .
- Alternative measures include removing the protected avatar 120 from the region, in some cases by default, or in some cases temporarily and further giving the parent or the protected avatar 120 an opportunity to acknowledge and agree to the protective action or override the removal.
- action triggers may include behaviors defined by real-life restraining orders.
- behaviors by a third avatar 140 may also trigger a rule violation or protective action as function of determining that the third avatar 140 is actually acting as a surrogate for the second avatar 130 subject to a restraining order.
- the third avatar 140 may be hired, coached or controlled by the second avatar 130 to make contacts with the protected avatar 120 forbidden to the second avatar 130 , and thus determining an association of the third avatar 140 with the second avatar 130 results in triggering of the protective protocol exclusion zone 122 with respect to the otherwise innocuous third avatar 140 .
- a user may be offered an opportunity to purchase enhanced monitoring services, which may be offered to both protected avatars for protection and other avatars to ensure that they are not violating a protective protocol with respect to a protected avatar.
- a human or automated enhanced avatar monitoring service may be provided by a virtual universe provider or other service provider as an alternative to suspension and banishment of the second avatar 130 , in some examples required according to a legal liability or obligation of the virtual universe service provider resulting from a court order.
- an automated enhanced avatar monitoring service may assign an automated avatar to shadow the second avatar 130 and record all conversations and actions relative to the protected avatar 120 .
- Triggering application of protective measures of a VU-implemented protocol may comprise a variety of trigger mechanisms, illustratively including a proximity threshold violation, for example an unauthorized adult second avatar 130 is detected within a threshold permissible radius of a child protected avatar 120 ; detecting presence or possession of a specific banned inventory item 126 or class of item 126 , for example, the second avatar 130 has a weapon, malicious software, etc.
- a proximity threshold violation for example an unauthorized adult second avatar 130 is detected within a threshold permissible radius of a child protected avatar 120 ; detecting presence or possession of a specific banned inventory item 126 or class of item 126 , for example, the second avatar 130 has a weapon, malicious software, etc.
- parsing may refer to analyzing input in a specific computer language against the formal grammar of the language, often to validate the input or create an internal representation for use in subsequent processing, as well as to analyzing and describing grammatical structures of a sentence in comprehending the meaning of a sentence or term therein: thus parsing may be understood generally as analyzing text items within text communication for recognizing the presence of trigger terms, phrases, activities and behavioral attributives in order to implement protections according to the present invention.
- Illustrative but not exhaustive protocol protective actions or restrictions for example an action taken at 110 of FIG. 1 as described above, include: transporting the protected avatar to a safe region or environment, for example transporting a child protected avatar 120 to a location within the VU beside or within a safe penumbra of a parent's avatar; providing a graphical indication 142 to the protected avatar 120 to illustrate and convey that the second avatar 130 is within a certain proximate distance or radius value; notifying a third party (e.g. a parent) of an implemented protocol rule violation or other trigger; preventing either of the protected avatar 120 or the second avatar 130 from being with a specified distance or radius defined by the exclusion zone 122 of the other of the protected avatar 120 and the second avatar 130 .
- a third party e.g. a parent
- Permission for the second avatar 130 to be in a specified proximity/exclusion zone 122 of the protected avatar 120 may also be conditional upon regional VU designations, for example permitting proximity only in one or more designated places where the second avatar 130 had previously socialized but prohibiting the second avatar 130 from following the protected avatar 120 into a new region, in one aspect presuming that such action would be indicative of stalking the protected avatar 120 .
- Determining an implemented protocol rule violation or other trigger or taking a protocol protective action may also be dependent upon occupation of either the protected avatar 120 or the second avatar 130 within certain defined or rated regions within the VU; for example, location of a child protected avatar 120 within a VU region designated as “child-friendly” may initiate or enable enforcement of one or more rules, triggers or actions defined as a function of the child-friendly region, in some examples resulting in preventing the physical location of an unauthorized adult second avatar 130 near the child protected avatar 120 while the protected avatar 120 is occupying the child-friendly region. It will also be appreciated that methods, systems and processes described above and otherwise herein may also be applicable to avatars representing or being operated by artificial entities, for example including robot servants and automated pets, as well as human user-operated avatars.
- Protective actions and restrictions may include warning the second avatar 130 that a real-life restraining order from a court is known and recognized by the virtual universe provider, and informing the second avatar 130 through a graphic warning 144 that the VU provider is thereby required by law to report any inappropriate behavior by the second avatar 130 towards the protected avatar 120 to an appropriate authority.
- Implemented protocol administration may also be a function of time. For example, in one embodiment if a restricted second avatar's 130 behavior is determined to fall within appropriate or permitted guidelines for a specified elapsed period of time relative to the protected avatar 120 , then certain restrictions on the second avatar 130 under the protocol may be relaxed, for example enabling the second avatar 130 to teleport to new regions occupied by the protected avatar 120 without presuming said teleporting constituted an indication of stalking behavior, or even allowing the second avatar 130 to approach within the exclusion zone 122 .
- Some embodiments may be configured to serve VU travel companies which provide travel, recreational or educational services in virtual universes and wish to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them.
- a VU travel or protection services provider may negotiate with one or more virtual universe providers, domains or regions to agree upon the identification of certain objectionable behaviors that are to be proactively prevented or minimized from occurring when clients of the travel or protection services provider visit.
- the negotiated behaviors or a subset thereof may also be designated to apply to clients of the travel or protection services provider during their VU participation.
- some clients may develop friendships and other interpersonal relationships and histories with other avatars (including other clients) during their VU visits, and thus it may be in the interest of the provider to monitor their clients for inappropriate behavior as well.
- specific examples and/or levels of proscribed behaviors may be provided, for example further defining levels of behaviors associated with intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace.
- harassment may be defined as provocative text chat of a sexual or violent nature
- assault may be defined as repeatedly bumping another avatar, or targeting another avatar with a scripted object
- violating the privacy of conversations may be defined as monitoring private text chats through a “private eye” or surrogate avatar or other method
- indecency may include bringing a sexually suggestive object out of inventory in public or in view of another avatar
- disturbing the peace may include repeatedly generating a sound, for example a sound spam or a repetitive sound having a certain minimum decibel level.
- Protective actions may include immediately teleporting one or more avatars against which objectionable behavior is directed (for example, an entire tour group) to a safe area, in some embodiments if the objectionable behavior cannot be proactively prevented.
- An abuse report may also be filed with a virtual universe or region provider, in some embodiments on behalf of a VU travel or protective services company.
- An offended avatar may also be offered an opportunity to be shadowed by an enhanced monitoring avatar, in some examples at the expense of the VU travel or protective services company already providing protection services to the offended avatar.
- a VU travel or protective services company may offer to negotiate protective services on behalf of a user, wherein the protections negotiated may be incorporated directly into an agreement between the individual user or resident seeking protection and the virtual universe provider.
- Virtual universe providers are also enabled to attract and serve users from populations at risk (for example, children, the elderly, persons who have been the victims of abuse, etc.) who need a higher standard of care than the general client or customer population. Virtual universe providers may also attract business from other companies providing travel, recreational and educational services and who are concerned about possible inappropriate behavior by residents of regions visited, which may be directed towards the tour groups, in one aspect reducing exposures to legal liability or risk of business loss associated with client harassment.
- Avatar tracking data may be monitored at different levels of granularity. For example, positional information may be generated every minute or every time a user teleports, flies, or moves a specified threshold distance value. Information may also be generated every time an item is put into an avatar's inventory. In one implementation, a daemon process may regularly poll a monitored/supervised avatar for current location information and store this information for subsequent transmittal to a supervisory entity or third party.
- a VU provider or protection service may maintain one or more databases comprising identifiers for user avatars, a desired nature of protection, and the desired alerts to trigger such protection.
- a first database record with respect to the protected avatar 120 associates a generally circular exclusion zone 122 defined by a 30 foot proximity radius with respect to the second avatar 130 , wherein violation of the 30-foot radius by the second avatar 130 triggers a protective action of teleporting the protected avatar 120 to a safe room or to a parent; and a second database record with respect to the protected avatar 120 associates an inventory item 128 restriction with respect to the third avatar 140 , wherein violation of inventory item restriction by the third avatar 140 triggers a protective action of physically preventing the third avatar 140 from getting close to the protected avatar 120 .
- Protective measures may be implemented in a variety of ways. For example, if the second avatar 130 attempts to approach the protected avatar 120 within a minimum specified threshold distance value, VU client motion controls of the user of the second avatar 130 may be prevented from achieving movement of the second avatar 130 in a direction that would violate the minimum specified threshold distance value or exclusion zone 122 .
- virtual universe providers are also enabled to provide a greater variety of user-appropriate and safe regions through a greater granularity of control over resident behaviors, for example enabling multiple definitions of “PG” and “adult” regions as functions of divergent user needs and objectives, as well as offering flexibility in constraining undesirable behavior through offering a plurality of different enhanced monitoring services in lieu of banishment. This may not only avoid loss of subscription fees by a banished user or resident, but offer an opportunity to receive additional service charges in exchange for enhancing monitoring of a trouble-maker avatar.
- FIG. 3 illustrates a logic machine 200 configured to implement protection methods and mechanisms to protect a VU avatar from the actions of other avatars within a virtual universe domain.
- the logic machine 200 comprises a Protective Protocol (P.P.) implementer component 202 configured to convert, translate or otherwise define protocol aspects into rules, procedures and/or actions in a form implementable within the operating environment of the virtual universe.
- An activity monitoring component 204 is configured to observe the activity of one or more avatars identified by or otherwise relevant to the protocol as implemented to detect any activity by the other avatars that may trigger a protective action for the benefit of the protected first avatar.
- An action component 206 is configured to implement a protective action, including a protective action defined and implemented with respect to the protective protocol.
- FIG. 4 illustrates a policy table implementation example for use in triggering and effecting one or more protective actions as a function of VU region ratings and offending avatar behavior characteristics, in one embodiment implemented with respect to protecting members of a protective services entity client group. Triggering determinations are made as function of the region rating, and one or more protective actions suitable to the regional rating and optionally a history of the protected avatar/group or the offending avatar are selected from a plurality of options provided by the policy table.
- an avatar exhibiting an objectionable adult-oriented behavior in a “G” rated region triggers protective actions suitable for a group for which G-rated region protection protocols are implemented.
- a first offense for an offending avatar with no other indications of inappropriate behavior may warrant only a warning to the offending avatar;
- a second offense or other history indicating prior actions inappropriate to a G-rated region may result in a notice and teleportation of the offending avatar out of the G-rated region to a non-G rated region;
- a third offense or a significant history of prior actions inappropriate to other region ratings as well may result in a suspension or regional access rights (e.g.
- An offending object may also be confiscated, with the determination a function of a nature or identity of the item (e.g. not confiscate an adult-oriented object, but confiscate a contraband item) as well as the history of the avatar (warn the first time, confiscate for repeated offenses).
- the entire protected group may also be teleported to another G-rated region, in one aspect to minimize the risk of additional offending behavior incidents potentially arising through proximity to a plurality of avatars with a prior history of offending behavior.
- Protective actions may also include fee-generating options for the protective services or VU provider. This may include offering the protected group or the offending avatar fee-based enhanced monitoring services, in one aspect to enhance the protections offered to the protected group or to give notice to the offending avatar when his future actions may have the potential of incurring additional fees for monitoring services or negative history data. Fees for enhanced monitoring services required for further engagement in a given region or region category may be variable, including with services and fee rates determined as function of the region rating: thus PG-rated region permission may require enhanced monitoring of one or more behaviors different from those monitored for adult-rated regions, but may be included within a larger set of behaviors monitored for G-rated region permissions.
- virtual universe providers may include in their agreement terms and conditions that previous cited behaviors in certain designated categories will result in specified actions (for example, an automatic temporary restriction on mobility, a restriction in the use of text chat, a restriction in the ability to display items from inventory, etc.) unless fee-based enhanced monitoring services are engaged for the offending avatar.
- specified actions for example, an automatic temporary restriction on mobility, a restriction in the use of text chat, a restriction in the ability to display items from inventory, etc.
- Triggers may vary by region. For example, proximity to a plurality of VU residents who have previously been cited in abuse reports for violent or offensive remarks or behaviors may result in an automatic teleport of an entire protected group to another safe region of comparable rating (for example, a G-rated region for a group rated for a G-rated region, or a G or PG rated region for a group rated for a PG-rated region).
- region, incident and avatar-specific triggers and protective action selection are also provided by tabular illustration of FIG. 4 .
- FIG. 4 is only illustrative of one embodiment, and policy tables according to the present invention are not limited to the example provided by FIG. 4 .
- an exemplary computerized implementation includes a computer system 304 deployed within a computer infrastructure 308 such as a computer or a programmable device such as a personal digital assistant (PDA) or cellular phone.
- a computer infrastructure 308 such as a computer or a programmable device such as a personal digital assistant (PDA) or cellular phone.
- PDA personal digital assistant
- a network environment 340 e.g., the Internet, a wide area network (WAN), a local area network (LAN), a virtual private network (VPN), etc.
- communication throughout the network 340 can occur via any combination of various types of communication links.
- the communication links can comprise addressable connections that may utilize any combination of wired and/or wireless transmission methods.
- connectivity could be provided by conventional TCP/IP sockets-based protocol, and an Internet service provider could be used to establish connectivity to the Internet.
- the computer system 304 includes a central processing unit (CPU) 312 , a memory 316 , a bus 320 , and input/output (I/O) interfaces 324 . Further, the computer system 304 is shown in communication with external I/O devices/resources 328 and storage system 332 .
- the processing unit 312 executes computer program code, such as the code to implement various components of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, including the Protective Protocol implementer 202 , the activity monitoring component 204 and the action engine 206 , which are stored in memory 316 and/or storage system 332 . It is to be appreciated that two or more, including all, of the components may be implemented as a single component.
- the processing unit 312 can read and/or write data to/from the memory 316 , the storage system 332 , and/or the I/O interfaces 324 .
- the bus 320 provides a communication link between each of the components in computer system 304 .
- the external devices 328 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact with computer system 304 and/or any devices (e.g., network card, modem, etc.) that enable computer system 304 to communicate with one or more other computing devices.
- the computer infrastructure 308 is only illustrative of various types of computer infrastructures for implementing the invention.
- computer infrastructure 308 comprises two or more computing devices (e.g., a server cluster) that communicate over a network to perform the various process steps of the invention.
- computer system 304 is only representative of various possible computer systems that can include numerous combinations of hardware.
- the computer system 304 can comprise any specific purpose-computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general-purpose hardware/software, or the like.
- the program code and hardware can be created using standard programming and engineering techniques, respectively.
- processing unit 312 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server.
- the memory 316 and/or the storage system 332 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations.
- I/O interfaces 324 can comprise any system for exchanging information with one or more of the external device 328 . Still further, it is understood that one or more additional components (e.g., system software, math co-processing unit, etc.) not shown in FIG. 5 can be included in computer system 304 . Moreover, if computer system 304 comprises a handheld device or the like, it is understood that one or more of the external devices 328 (e.g., a display) and/or the storage system 332 could be contained within computer system 304 , not externally as shown.
- the external devices 328 e.g., a display
- the storage system 332 could be contained within computer system 304 , not externally as shown.
- the storage system 332 can be any type of system (e.g., a database) capable of providing storage for information under the present invention.
- the storage system 332 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive.
- the storage system 332 includes data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown).
- LAN local area network
- WAN wide area network
- SAN storage area network
- additional components such as cache memory, communication systems, system software, etc., may be incorporated into computer system 304 .
- the invention provides a computer-readable/useable medium that includes computer program code to enable a computer infrastructure to practice the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein.
- the computer-readable/useable medium includes program code that implements each of the various process steps of the invention.
- the terms “computer-readable medium” or “computer-useable medium” comprise one or more of any type of physical embodiment of the program code.
- the computer-readable/useable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as the memory 316 and/or the storage system 332 (e.g., a fixed disk, a read-only memory, a random access memory, a cache memory, etc.).
- computer infrastructure 308 is intended to demonstrate that some or all of the components of implementation could be deployed, managed, serviced, etc. by a service provider who offers to implement, deploy, and/or perform the functions of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, for example by licensing methods and browser or application server technology according to the present invention to an internet service providers (ISP) or cellular telephone provider.
- ISP internet service providers
- the invention may comprise a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis.
- a service provider can create, maintain, support, etc., a computer infrastructure, such as the computer infrastructure 308 that performs the process steps of the invention, and in return the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
- program code and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions intended to cause a computing device having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.
- program code can be embodied as one or more of: an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 13/540,748, filed Jul. 3, 2012, which is a continuation of U.S. patent application Ser. No. 12/238,541, now U.S. Pat. No. 8,241,131, filed Sep. 26, 2008, the contents of which are hereby incorporated by reference in their entirety.
- The present invention generally relates to protecting a virtual universe (VU) user represented by an avatar from the actions of one or more other user's avatars. Notification and other responsive actions taken with respect to other user's avatars are also discussed.
- A Virtual Universe (VU) is a computer-based simulated world or environment; other terms for VU's include metaverses, “3-D Internet” and Virtual World, and VU will be understood to represent any of these environments. Users inhabit and traverse a VU, and interact with other VU users through the use of an avatar, a graphical representation of the user often taking the form of a cartoon-like human though any two or three dimensional graphic image or rendering may be utilized. In order to participate within or inhabit a VU, a user creates an agent which functions as the user's account, and upon which the user builds an avatar tied to an inventory of assets the user owns in the VU and associated with the agent.
- Large robust VU's and massively multiplayer online games, such as for example Second Life® (SECOND LIFE is a trademark of Linden Research, Inc. in the United States and/or other countries), Entropia Universe™ (ENTROPIA UNIVERSE is a registered trademark of MindArk PE AB in the United States, other countries, or both), The Sims Online™ (THE SIMS ONLINE is a trademark of Electronic Arts, Inc. in the United States, other countries, or both), and There™ (THERE is a trademark of Makena Technologies, Inc. in the United States, other countries, or both) render and display detailed, large and complex graphic environments within which users may travel and participate as if a character in an expressionistic or fantastical fictional world or within a realistic or representational approximation of real life.
- VU's are also commonly defined with respect to VU regions, virtual areas of land within the VU typically residing on a single server, with each region amenable to provision and management by a one or more participating providers. The size and complexity and variety of resources found in a VU are related to the number of providers participating and hosting regions through server hosting. And the success of a VU may depend upon attracting users and keeping them engaged and participating in the VU environment, thereby adding value to the providers who bear the cost in providing VU region content and services (and correspondingly expect an appropriate level of multiple-user engagement as a return on their investment), as well as for other users who wish to engage many others in a large virtual community. For example, an informational or service-related region managed by a non-profit organization may desire or expect a given level of VU user engagement and participation, and commercial region providers may desire to engage in a given level of commercial transactions (e.g. sales) or achieve a level of marketing exposure among VU users.
- VU avatars may exhibit inappropriate and threatening behaviors relative to other users or the VU environment itself. However, prior art protection mechanisms are limited in their efficacy, and in particular with respect to offering proactive protection from hostile actions intentionally directed against a specific avatar by another user's avatar. For example, a user with personal knowledge of another user may use an avatar to deliberately harass or stalk the avatar of the other user. Furthermore, some harassing behavior personally offensive or threatening to a target avatar may in fact be perceived as ambiguous or not objectionable to other users or to VU provider supervisory entities, and thus some harassing activities may actually be permitted by VU provider or supervisory entities, thereby rendering general protection mechanisms provided by some VU providers ineffective or even useless in protecting the targeted avatar. Without effective VU provider protection, VU users whose avatars are subject to objectionable behavior are forced to take actions on their own behalf, actions which may be burdensome and difficult for the user, or may even be proscribed by VU operating agreements or other normative rules (for example, directly responding with harassment, insults, violence in kind, etc.)
- Methods are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
- Methods also provide protective services to a virtual universe resident, with a service provider offering protective services for a virtual universe client resident. In response to an acceptance of offered services, service providers implement protection for a virtual universe client resident from a second resident, the protection implementing including preventing the second resident from engaging in a proscribed activity as a function of an association of the proscribed activity with the client resident. Service providers monitor activity of client residents and second residents within the virtual universe for indicia of the proscribed activity, and execute a protective action against the client resident or the second resident in response detecting the indicia.
- Methods also protect a protected avatar from actions of a second avatar within a virtual universe by producing computer executable program code, storing the code on a computer readable medium, and providing the program code to be deployed and executed on a computer system engaging a virtual universe. The program code causes a computer system to distinguish an activity of the second avatar within the virtual universe as a function of a relation of the distinguished activity to the protected avatar and define a protective action associated with the distinguished activity and executable against the protected avatar or the second avatar. The program code also causes a computer system to monitor activity of the protected avatar or the second avatar within the virtual universe for the distinguished activity, and to execute the protective action against the protected avatar or the second avatar in response to detecting the distinguished activity.
- Programmable devices are also provided, the devices having processing means; memory in communication with the processing means; and a network interface in communication with the processing means and the memory. The processing means are configured to detect an avatar activity hostile to a protected avatar within a virtual universe and prevent a second avatar from engaging in the hostile activity within the virtual universe as a function of a relation of the hostile activity to the protected avatar. The processing means are further configured to monitor activity of the protected avatar or the second avatar within the virtual universe for the hostile activity and cause a virtual universe computer application to take a protective action against the protected avatar or the second avatar in response to detecting the hostile activity.
- These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
-
FIG. 1 is a flow chart illustrating a process and system for protecting a first avatar from actions of another avatar within a virtual universe. -
FIG. 2 is a block diagram illustration of protecting a protected avatar from actions of another avatar according to the present invention. -
FIG. 3 is a block diagram illustration of a virtual universe programmable device configured to protect a first avatar from actions of another avatar within a virtual universe. -
FIG. 4 is a tabular representation of a policy table for use in protecting an avatar from actions of another avatar within a virtual universe. -
FIG. 5 is a block diagram illustrating an exemplary computerized implementation of a system and method for protecting a first avatar from actions of another avatar within a virtual universe. - The drawings are not necessarily to scale. The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
- For convenience purposes, the Detailed Description of the Invention has the following sections:
- I. General Description; and
- II. Computerized Implementation.
- Mischief making, spamming, and other threatening behaviors directed toward VU users and their avatars are known, and in some respects becoming more common. VU providers may set policies for providing protections to user avatars that incorporate or codify community standards which specify prohibited certain behaviors, and may condition participation in the VU upon agreeing to specific terms and conditions. Such standards are generally useful in addressing readily-identifiable and generic behaviors defined with respect to all users or the environment itself, such as intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace.
- Exposure to objectionable behavior may also be limited by designating regions of a virtual universe as “safe” or “unsafe” or by rating them (e.g. “mature,” “PG”, etc.), in some examples with corresponding restrictions on a minimum age needed to enter regions designated as “unsafe” or “mature,” and sometimes also requiring users to agree to hold the VU harmless for offensive conduct and contacts experienced in designated unsafe or mature regions, the user accepting the risk upon entering such a region. VU's may also take steps to ensure that wrong-doers do not hide behind other or multiple avatars, for example requiring identification of the primary user of alternate accounts in the case of a user utilizing additional avatars. Notification mechanisms to enable reporting of violations of community standards and minimum age restrictions may include abuse reporter tools, some of which keep the identity of the reporter confidential. Immediate assistance can also be provided by in-world avatars representing the virtual universe provider.
- Virtual universe providers may also maintain a public list of abuse incidents including the date, location in the virtual universe, policy violated, nature of the abuse and action taken, some of which do not identify the offending avatar or owner of the user account. Tracked and recognized abuse incidents may include objectionable-object littering, indecency in public areas, assault with scripted objects in designated safe areas, disturbing the peace with repetitive sound spam, verbal abuse by an alternate account avatar and indecencies or obscene images in the publicly accessible avatar profile. Actions taken by virtual universe providers in response to abuse incidents typically involve warnings, suspensions, permanent banning from a virtual universe, and even possible legal action (for example, possible criminal law actions with respect to activities deemed illegal in an appropriate jurisdiction).
- However, while virtual universe providers generally retain the right to resolve disputes between residents, they generally do not make use of publicly available real-world records related to real-world disputes between two virtual universe users, focusing instead on actions and behavior within the VU. More particularly, prior art policies and mechanisms for restricting the behavior of avatars relative to one another in a virtual universe are not generally responsive to situations arising from or dependent upon prior histories or facts outside the VU environment, such as where users know each other in real life or prior virtual universe participation and may be deliberately harassing or stalking each other, or wherein a casual, unplanned encounter may be problematic due to prior histories, real world facts, etc.
- Virtual universe providers are also limited in effectively reacting to problem incidents after they occur, and relying generally on threats of banishment to enforce community standards for future actions. Users whose avatars are subject to objectionable behavior and seek to avoid it are also generally required to possess a virtual universe skill set to take protective actions on their own behalf, for example an ability to quickly teleport to a safe location, or block the receipt of text messages from offending avatars. Residents new to a virtual universe may not possess the technical skills needed to minimize offensive behavior before the threat of suspension or banishment is implemented by a virtual universe provider with respect to an offending party. Residents may also be uncomfortable using abuse reporter tools, particularly when they are experiencing the stress associated with harassment. Thus, placing responsibility on a resident to anticipate that an offensive incident is about to take place, to take evasive action, and to report the abuse when under stress, places too much of a burden on the harassed user, discouraging user participation, and particularly by users with low computer skills or those otherwise unfamiliar with the quick pace of immersive environments. Such policies may also discourage parents from enrolling their children as residents because of concerns that designated “safe”/“PG” regions are not really safe. Though some of these problems may be ameliorated by providing immediate assistance by human-operated in-world avatars representing the virtual universe provider, such services are expensive to provide for a VU provider.
- VU and third party service providers may also offer a variety of services to enhance the experience of a VU user client, including providing travel, recreational or educational services in virtual universes. It would be advantageous for such travel companies to be able to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them in each region served within a VU. Without the ability to offer a safe experience to their clients in a given region such companies may avoid the region or even an entire virtual universe domain in fear of legal exposure from inappropriate behaviors by residents, thereby directly resulting in a loss of revenue opportunities for a virtual universe region, domain or environment provider.
- Referring now to
FIG. 1 , a method and process for protecting a first avatar from actions of another avatar within a virtual universe (VU) according to the present invention is provided. At 102 a protection protocol is provided or defined for the first avatar with respect to a second avatar or a person, entity or user represented by the second avatar. At 104 the protection protocol is implemented within the context and framework of the virtual universe domain, the implementing comprising defining at least one rule or proscribed activity with respect to activity of another avatar within the virtual universe domain, and a protective action executable with respect to one or both avatars within the virtual universe domain. At 106 a supervisory entity or application operating within the virtual universe monitors activity of the first avatar and/or the second avatar within the virtual universe domain as provided by or as a function of the protocol implementation. At 108 the monitoring results in a triggering of an application of the implemented protocol in response to or as a function of detecting the first avatar or the second avatar violating the protocol rule, and at 110 the protocol protective action as implemented at 104 is initiated and taken with respect to at least one of the first avatar and the second avatar. - In one aspect, the protective protocol may be an agreement, which may be understood to comprehend any document, contract, court order, decree, governmental rule or regulation or any other framework of duties and responsibilities defining an aspect of a relation of a protected avatar to another avatar or to a VU environment in general. Thus, where a protected “Avatar 1” and another avatar of concern, “Avatar 2,” are known to each other and have historically been in conflict, either in real life or within one or more virtual universe domains, protective protocol agreements may exist or be defined to protect Avatar 1 in anticipation of further conflicts.
- More particularly, situations in real life can spill over into a virtual universe frequented by the same individuals as users through their avatars, and histories including abuse incidents and acrimonious divorce proceedings may present special challenges to virtual universe providers from a business and legal perspective; for example, taking a firm action such as banishing a resident who offends another resident known to him or her results in a direct loss of revenue from the banished resident. False or mistaken reports of virtual universe abuse, for example by a friend or family member of a reputedly harassed VU resident, may also result in unfair banishment of an accused resident from a VU, or regions thereof such as clubs, cultural or recreational regions where the falsely accused resident has developed valuable social or business relationships. Though VU providers and supervisory entities may undertake investigations to verify accusations, such investigations require the expenditure of resources, and sometimes of significant and expensive resources.
- Accordingly, real-life agreements, such as for example divorce decrees and restraining orders issued by a courts having jurisdiction over avatar users and/or VU or VU services provider may define and impose duties with respect to actions that the respective users may take within a VU through their avatars. According to the present invention, advantages are obtained by implementing such agreements into the VU environment, in one aspect helping VU and VU service providers to identify and avoid potential liabilities, and, in another aspect, to serve in custom configuring a VU environment to meet the unique needs of a given protected avatar (thereby enabling some protected avatar users to participate within a VU without fear, etc., who may otherwise decline to participate).
- Thus, protective protocol agreements may directly proscribe, or be interpreted to directly proscribe, certain avatar activities hostile to an interest of the protected avatar. They may also impose duties on VU providers to report transgressions or any preventive measures instituted. Virtual universe providers are thus enabled to provide “virtual restraining order” proactive services, in one aspect enabling the development of additional business opportunities associated with providing regions safe for protected parties as defined by such real-world restraining orders. A user may desire to purchase consistent restraint/protective services which will span their residence in multiple virtual universes, and hence may be implemented through differing embodiments depending on each particular virtual universe visited. Thus, it is advantageous to a virtual universe provider or a supervisory entity to provide consistent protection services by configuring appropriate protective mechanisms for each specific visited VU, in some examples including negotiating arrangements with other virtual universe providers to configure and extend such protection to each divergent VU. In one aspect, this provides a sustainable competitive advantage over other VU providers and VU service providers in attracting new residents with a variety of concerns relative to inappropriate behavior in virtual universes.
- Thus, in some embodiments, a protection protocol agreement may be a real-world restraining order issued by an appropriate governmental entity having a legal jurisdiction over the user of a protected avatar, or over other party/avatar user(s), wherein implementing the restraining order comprises deriving and creating a “virtual restraining order” for implementation within the context of the virtual universe in order to protect the first protected avatar from virtual universe activities of one or more other second avatars in the virtual universe domain of implementation.
FIG. 2 provides an illustration of an implemented avatar protection according to the present invention within avirtual universe domain 118. A protection protocol implemented within the context and framework of thevirtual universe 118 results in anexclusion zone 122 projected about a protectedavatar 120. More particularly, a second potentially-harmful avatar 130, identified by the implemented protection protocol as hostile to the protectedavatar 120, is prevented from approaching or otherwise locating spatially close to the protectedavatar 120 within thevirtual universe 118 within theexclusion zone 122. - In some embodiments, the protected
avatar 120 seeking protection from thesecond avatar 130 may also directly initiate or engage the services of a VU provider or another third party services provider, who may offer a protection service that protects the protectedavatar 120 from thesecond avatar 130 in exchange for compensation. In some examples, the protection service or the VU provider may restrict thesecond avatar 130 from interacting with the protectedavatar 120, and the protectedavatar 120 may also be (optionally) restricted from interacting with thesecond avatar 130. - A relationship of the protected
avatar 120 relative to thesecond avatar 130 may be used to define the respective avatars and their obligations; for example, the user of the protectedavatar 120 may be a child and the user of thesecond avatar 130 may be an adult who has a history or other behavioral attribute indicating that he or she may pose a threat to children in general. The users of the protectedavatar 120 and thesecond avatar 130 may also be previously known to each other, either in real life or one or more virtual universes, and thus their relative identities as the protectedavatar 120 and thesecond avatar 130 and their respective obligations and restraints with respect to each other defined as a function of their history relative to each other. - An implemented protocol may also include a plurality of different triggers and actions, and, in one aspect, these triggers may be configured to recognize and protect an avatar in situations and contexts that, although not violating any general or normative rule within the VU, are nevertheless inappropriate as defined by the protective protocol or its implementation. For example, a parent of a child using the protected
avatar 120 concerned with certain inappropriate behavior may desire that the protectedavatar 120 be protected from said certain inappropriate behavior by any resident, including preventing such an avatar from coming close to the protectedavatar 120. However, it may occur that although thesecond avatar 130 is evidencing said certain inappropriate behavior, he or she is either not exceeding some objective community standard threshold, or the protectedavatar 120 and thesecond avatar 130 may be presently located in a VU region with a higher permissive threshold than another VU region, and thus a common protective action (e.g. preventing thesecond avatar 130 from coming close to the protected avatar 120) may not be triggered as it may not be available or indicated by the given facts and general VU region settings. The protective protocol may thus be configured to take alternative actions in response to the inappropriate behavior generally neutral to or not directed against the putatively offendingsecond avatar 130, for example alerting the protectedavatar 120 or the parent or other party of the situation with agraphical text message 142. Alternative measures include removing the protectedavatar 120 from the region, in some cases by default, or in some cases temporarily and further giving the parent or the protectedavatar 120 an opportunity to acknowledge and agree to the protective action or override the removal. - Configuring a user's VU environment responsive to both real-life and virtual life conflict provides advantages in enhancing the user's VU experience. In one aspect, a user may not distinguish real-world and virtual universe conflicts, and accordingly, in some embodiments, action triggers may include behaviors defined by real-life restraining orders. Referring again to
FIG. 2 , in another aspect, behaviors by a third avatar 140 (sometimes otherwise acceptable by a VU normative rule) may also trigger a rule violation or protective action as function of determining that thethird avatar 140 is actually acting as a surrogate for thesecond avatar 130 subject to a restraining order. For example, thethird avatar 140 may be hired, coached or controlled by thesecond avatar 130 to make contacts with the protectedavatar 120 forbidden to thesecond avatar 130, and thus determining an association of thethird avatar 140 with thesecond avatar 130 results in triggering of the protectiveprotocol exclusion zone 122 with respect to the otherwise innocuousthird avatar 140. - In another aspect of the present invention, a user may be offered an opportunity to purchase enhanced monitoring services, which may be offered to both protected avatars for protection and other avatars to ensure that they are not violating a protective protocol with respect to a protected avatar. For example, a human or automated enhanced avatar monitoring service may be provided by a virtual universe provider or other service provider as an alternative to suspension and banishment of the
second avatar 130, in some examples required according to a legal liability or obligation of the virtual universe service provider resulting from a court order. Thus, in some examples, an automated enhanced avatar monitoring service may assign an automated avatar to shadow thesecond avatar 130 and record all conversations and actions relative to the protectedavatar 120. - Triggering application of protective measures of a VU-implemented protocol, for example in response to detecting a rule violation at 108 of
FIG. 1 as described above, may comprise a variety of trigger mechanisms, illustratively including a proximity threshold violation, for example an unauthorized adultsecond avatar 130 is detected within a threshold permissible radius of a child protectedavatar 120; detecting presence or possession of a specific bannedinventory item 126 or class ofitem 126, for example, thesecond avatar 130 has a weapon, malicious software, etc.item 126; and detecting a past history of undesirable chats or other text messages, for example parsing asecond avatar 130text communication 132 to determine that Avatar 2 uses offensive language orterms 134 and hence should be proscribed from contact with a child protectedavatar 120, or that previous chats between the protectedavatar 120 and thesecond avatar 130 comprise offensive or threatening words or phrases. It will be appreciated that parsing may refer to analyzing input in a specific computer language against the formal grammar of the language, often to validate the input or create an internal representation for use in subsequent processing, as well as to analyzing and describing grammatical structures of a sentence in comprehending the meaning of a sentence or term therein: thus parsing may be understood generally as analyzing text items within text communication for recognizing the presence of trigger terms, phrases, activities and behavioral attributives in order to implement protections according to the present invention. - Illustrative but not exhaustive protocol protective actions or restrictions, for example an action taken at 110 of
FIG. 1 as described above, include: transporting the protected avatar to a safe region or environment, for example transporting a child protectedavatar 120 to a location within the VU beside or within a safe penumbra of a parent's avatar; providing agraphical indication 142 to the protectedavatar 120 to illustrate and convey that thesecond avatar 130 is within a certain proximate distance or radius value; notifying a third party (e.g. a parent) of an implemented protocol rule violation or other trigger; preventing either of the protectedavatar 120 or thesecond avatar 130 from being with a specified distance or radius defined by theexclusion zone 122 of the other of the protectedavatar 120 and thesecond avatar 130. - Permission for the
second avatar 130 to be in a specified proximity/exclusion zone 122 of the protectedavatar 120 may also be conditional upon regional VU designations, for example permitting proximity only in one or more designated places where thesecond avatar 130 had previously socialized but prohibiting thesecond avatar 130 from following the protectedavatar 120 into a new region, in one aspect presuming that such action would be indicative of stalking the protectedavatar 120. Determining an implemented protocol rule violation or other trigger or taking a protocol protective action may also be dependent upon occupation of either the protectedavatar 120 or thesecond avatar 130 within certain defined or rated regions within the VU; for example, location of a child protectedavatar 120 within a VU region designated as “child-friendly” may initiate or enable enforcement of one or more rules, triggers or actions defined as a function of the child-friendly region, in some examples resulting in preventing the physical location of an unauthorized adultsecond avatar 130 near the child protectedavatar 120 while the protectedavatar 120 is occupying the child-friendly region. It will also be appreciated that methods, systems and processes described above and otherwise herein may also be applicable to avatars representing or being operated by artificial entities, for example including robot servants and automated pets, as well as human user-operated avatars. - Protective actions and restrictions may include warning the
second avatar 130 that a real-life restraining order from a court is known and recognized by the virtual universe provider, and informing thesecond avatar 130 through agraphic warning 144 that the VU provider is thereby required by law to report any inappropriate behavior by thesecond avatar 130 towards the protectedavatar 120 to an appropriate authority. - Implemented protocol administration may also be a function of time. For example, in one embodiment if a restricted second avatar's 130 behavior is determined to fall within appropriate or permitted guidelines for a specified elapsed period of time relative to the protected
avatar 120, then certain restrictions on thesecond avatar 130 under the protocol may be relaxed, for example enabling thesecond avatar 130 to teleport to new regions occupied by the protectedavatar 120 without presuming said teleporting constituted an indication of stalking behavior, or even allowing thesecond avatar 130 to approach within theexclusion zone 122. - Some embodiments may be configured to serve VU travel companies which provide travel, recreational or educational services in virtual universes and wish to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them. In some embodiments, a VU travel or protection services provider may negotiate with one or more virtual universe providers, domains or regions to agree upon the identification of certain objectionable behaviors that are to be proactively prevented or minimized from occurring when clients of the travel or protection services provider visit. The negotiated behaviors or a subset thereof may also be designated to apply to clients of the travel or protection services provider during their VU participation. In one aspect, some clients may develop friendships and other interpersonal relationships and histories with other avatars (including other clients) during their VU visits, and thus it may be in the interest of the provider to monitor their clients for inappropriate behavior as well.
- In some embodiments, specific examples and/or levels of proscribed behaviors may be provided, for example further defining levels of behaviors associated with intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace. Thus, harassment may be defined as provocative text chat of a sexual or violent nature; assault may be defined as repeatedly bumping another avatar, or targeting another avatar with a scripted object; violating the privacy of conversations may be defined as monitoring private text chats through a “private eye” or surrogate avatar or other method; indecency may include bringing a sexually suggestive object out of inventory in public or in view of another avatar; disturbing the peace may include repeatedly generating a sound, for example a sound spam or a repetitive sound having a certain minimum decibel level.
- Protective actions may include immediately teleporting one or more avatars against which objectionable behavior is directed (for example, an entire tour group) to a safe area, in some embodiments if the objectionable behavior cannot be proactively prevented. An abuse report may also be filed with a virtual universe or region provider, in some embodiments on behalf of a VU travel or protective services company. An offended avatar may also be offered an opportunity to be shadowed by an enhanced monitoring avatar, in some examples at the expense of the VU travel or protective services company already providing protection services to the offended avatar. Moreover, in some embodiments, a VU travel or protective services company may offer to negotiate protective services on behalf of a user, wherein the protections negotiated may be incorporated directly into an agreement between the individual user or resident seeking protection and the virtual universe provider.
- Advantages are provided by creating additional revenue generating opportunities and options for virtual universe providers and VU region providers, wherein said providers may offer additional enhanced resident behavior managing services for increased consideration. Virtual universe providers are also enabled to attract and serve users from populations at risk (for example, children, the elderly, persons who have been the victims of abuse, etc.) who need a higher standard of care than the general client or customer population. Virtual universe providers may also attract business from other companies providing travel, recreational and educational services and who are concerned about possible inappropriate behavior by residents of regions visited, which may be directed towards the tour groups, in one aspect reducing exposures to legal liability or risk of business loss associated with client harassment.
- Avatar tracking data may be monitored at different levels of granularity. For example, positional information may be generated every minute or every time a user teleports, flies, or moves a specified threshold distance value. Information may also be generated every time an item is put into an avatar's inventory. In one implementation, a daemon process may regularly poll a monitored/supervised avatar for current location information and store this information for subsequent transmittal to a supervisory entity or third party.
- In some embodiments, a VU provider or protection service may maintain one or more databases comprising identifiers for user avatars, a desired nature of protection, and the desired alerts to trigger such protection. Thus, referring again to
FIG. 2 , in one example a first database record with respect to the protectedavatar 120 associates a generallycircular exclusion zone 122 defined by a 30 foot proximity radius with respect to thesecond avatar 130, wherein violation of the 30-foot radius by thesecond avatar 130 triggers a protective action of teleporting the protectedavatar 120 to a safe room or to a parent; and a second database record with respect to the protectedavatar 120 associates aninventory item 128 restriction with respect to thethird avatar 140, wherein violation of inventory item restriction by thethird avatar 140 triggers a protective action of physically preventing thethird avatar 140 from getting close to the protectedavatar 120. - Protective measures may be implemented in a variety of ways. For example, if the
second avatar 130 attempts to approach the protectedavatar 120 within a minimum specified threshold distance value, VU client motion controls of the user of thesecond avatar 130 may be prevented from achieving movement of thesecond avatar 130 in a direction that would violate the minimum specified threshold distance value orexclusion zone 122. Moreover, according to the present invention virtual universe providers are also enabled to provide a greater variety of user-appropriate and safe regions through a greater granularity of control over resident behaviors, for example enabling multiple definitions of “PG” and “adult” regions as functions of divergent user needs and objectives, as well as offering flexibility in constraining undesirable behavior through offering a plurality of different enhanced monitoring services in lieu of banishment. This may not only avoid loss of subscription fees by a banished user or resident, but offer an opportunity to receive additional service charges in exchange for enhancing monitoring of a trouble-maker avatar. -
FIG. 3 illustrates alogic machine 200 configured to implement protection methods and mechanisms to protect a VU avatar from the actions of other avatars within a virtual universe domain. Thelogic machine 200 comprises a Protective Protocol (P.P.)implementer component 202 configured to convert, translate or otherwise define protocol aspects into rules, procedures and/or actions in a form implementable within the operating environment of the virtual universe. Anactivity monitoring component 204 is configured to observe the activity of one or more avatars identified by or otherwise relevant to the protocol as implemented to detect any activity by the other avatars that may trigger a protective action for the benefit of the protected first avatar. Anaction component 206 is configured to implement a protective action, including a protective action defined and implemented with respect to the protective protocol. -
FIG. 4 illustrates a policy table implementation example for use in triggering and effecting one or more protective actions as a function of VU region ratings and offending avatar behavior characteristics, in one embodiment implemented with respect to protecting members of a protective services entity client group. Triggering determinations are made as function of the region rating, and one or more protective actions suitable to the regional rating and optionally a history of the protected avatar/group or the offending avatar are selected from a plurality of options provided by the policy table. - In the present example illustrated in
FIG. 4 , an avatar exhibiting an objectionable adult-oriented behavior in a “G” rated region (one suitable for all ages of users) triggers protective actions suitable for a group for which G-rated region protection protocols are implemented. A first offense for an offending avatar with no other indications of inappropriate behavior may warrant only a warning to the offending avatar; a second offense or other history indicating prior actions inappropriate to a G-rated region may result in a notice and teleportation of the offending avatar out of the G-rated region to a non-G rated region; and a third offense or a significant history of prior actions inappropriate to other region ratings as well (such as PG or adult rated) may result in a suspension or regional access rights (e.g. of G-rated region access) teleportation to a purgatory or other restricted-rights region, or banishment of the offending avatar from all G-rated areas or other regions or the entire VU. An offending object may also be confiscated, with the determination a function of a nature or identity of the item (e.g. not confiscate an adult-oriented object, but confiscate a contraband item) as well as the history of the avatar (warn the first time, confiscate for repeated offenses). Moreover, if a plurality of offending avatars is located proximate to a protected group, then the entire protected group may also be teleported to another G-rated region, in one aspect to minimize the risk of additional offending behavior incidents potentially arising through proximity to a plurality of avatars with a prior history of offending behavior. - Protective actions may also include fee-generating options for the protective services or VU provider. This may include offering the protected group or the offending avatar fee-based enhanced monitoring services, in one aspect to enhance the protections offered to the protected group or to give notice to the offending avatar when his future actions may have the potential of incurring additional fees for monitoring services or negative history data. Fees for enhanced monitoring services required for further engagement in a given region or region category may be variable, including with services and fee rates determined as function of the region rating: thus PG-rated region permission may require enhanced monitoring of one or more behaviors different from those monitored for adult-rated regions, but may be included within a larger set of behaviors monitored for G-rated region permissions. In some examples, virtual universe providers may include in their agreement terms and conditions that previous cited behaviors in certain designated categories will result in specified actions (for example, an automatic temporary restriction on mobility, a restriction in the use of text chat, a restriction in the ability to display items from inventory, etc.) unless fee-based enhanced monitoring services are engaged for the offending avatar.
- Triggers may vary by region. For example, proximity to a plurality of VU residents who have previously been cited in abuse reports for violent or offensive remarks or behaviors may result in an automatic teleport of an entire protected group to another safe region of comparable rating (for example, a G-rated region for a group rated for a G-rated region, or a G or PG rated region for a group rated for a PG-rated region). Other examples of region, incident and avatar-specific triggers and protective action selection are also provided by tabular illustration of
FIG. 4 . One skilled in the art will recognize that further parameters and selection criteria may be implemented, as wells as through other policy table configurations;FIG. 4 is only illustrative of one embodiment, and policy tables according to the present invention are not limited to the example provided byFIG. 4 . - The present invention may be implemented using conventional software tools and methods applicable to virtual universes, for example within a stand-alone VU application, or as a plug-in to an existing VU application. The system and mechanisms described could be implemented in a hosting system or grid for a virtual universe or in client software for the virtual universe installed on a user's personal computer or other programmable device. Referring now to
FIG. 5 , an exemplary computerized implementation includes acomputer system 304 deployed within acomputer infrastructure 308 such as a computer or a programmable device such as a personal digital assistant (PDA) or cellular phone. This is intended to demonstrate, among other things, that the present invention could be implemented within a network environment 340 (e.g., the Internet, a wide area network (WAN), a local area network (LAN), a virtual private network (VPN), etc.) in communication with one or moreadditional computers 336, or on a stand-alone computer infrastructure 308. In the case of the former, communication throughout thenetwork 340 can occur via any combination of various types of communication links. For example, the communication links can comprise addressable connections that may utilize any combination of wired and/or wireless transmission methods. Where communications occur via the Internet, connectivity could be provided by conventional TCP/IP sockets-based protocol, and an Internet service provider could be used to establish connectivity to the Internet. - As shown, the
computer system 304 includes a central processing unit (CPU) 312, amemory 316, abus 320, and input/output (I/O) interfaces 324. Further, thecomputer system 304 is shown in communication with external I/O devices/resources 328 andstorage system 332. In general, theprocessing unit 312 executes computer program code, such as the code to implement various components of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, including theProtective Protocol implementer 202, theactivity monitoring component 204 and theaction engine 206, which are stored inmemory 316 and/orstorage system 332. It is to be appreciated that two or more, including all, of the components may be implemented as a single component. - While executing computer program code, the
processing unit 312 can read and/or write data to/from thememory 316, thestorage system 332, and/or the I/O interfaces 324. Thebus 320 provides a communication link between each of the components incomputer system 304. Theexternal devices 328 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact withcomputer system 304 and/or any devices (e.g., network card, modem, etc.) that enablecomputer system 304 to communicate with one or more other computing devices. - The
computer infrastructure 308 is only illustrative of various types of computer infrastructures for implementing the invention. For example, in one embodiment,computer infrastructure 308 comprises two or more computing devices (e.g., a server cluster) that communicate over a network to perform the various process steps of the invention. Moreover,computer system 304 is only representative of various possible computer systems that can include numerous combinations of hardware. To this extent, in other embodiments, thecomputer system 304 can comprise any specific purpose-computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general-purpose hardware/software, or the like. In each case, the program code and hardware can be created using standard programming and engineering techniques, respectively. Moreover, theprocessing unit 312 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server. Similarly, thememory 316 and/or thestorage system 332 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations. - Further, I/O interfaces 324 can comprise any system for exchanging information with one or more of the
external device 328. Still further, it is understood that one or more additional components (e.g., system software, math co-processing unit, etc.) not shown inFIG. 5 can be included incomputer system 304. Moreover, ifcomputer system 304 comprises a handheld device or the like, it is understood that one or more of the external devices 328 (e.g., a display) and/or thestorage system 332 could be contained withincomputer system 304, not externally as shown. - The
storage system 332 can be any type of system (e.g., a database) capable of providing storage for information under the present invention. To this extent, thestorage system 332 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive. In another embodiment, thestorage system 332 includes data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown). In addition, although not shown, additional components, such as cache memory, communication systems, system software, etc., may be incorporated intocomputer system 304. - While shown and described herein as a method and a system, it is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a computer-readable/useable medium that includes computer program code to enable a computer infrastructure to practice the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein. To this extent, the computer-readable/useable medium includes program code that implements each of the various process steps of the invention.
- It is understood that the terms “computer-readable medium” or “computer-useable medium” comprise one or more of any type of physical embodiment of the program code. In particular, the computer-readable/useable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as the
memory 316 and/or the storage system 332 (e.g., a fixed disk, a read-only memory, a random access memory, a cache memory, etc.). - Still yet,
computer infrastructure 308 is intended to demonstrate that some or all of the components of implementation could be deployed, managed, serviced, etc. by a service provider who offers to implement, deploy, and/or perform the functions of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, for example by licensing methods and browser or application server technology according to the present invention to an internet service providers (ISP) or cellular telephone provider. In one embodiment, the invention may comprise a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis. Thus, a service provider can create, maintain, support, etc., a computer infrastructure, such as thecomputer infrastructure 308 that performs the process steps of the invention, and in return the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties. - As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions intended to cause a computing device having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form. To this extent, program code can be embodied as one or more of: an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.
- The foregoing description of various aspects of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible. Such modifications and variations that may be apparent to a person skilled in the art are intended to be included within the scope of the invention as defined by the accompanying claims.
Claims (22)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/480,040 US20150126276A1 (en) | 2008-09-26 | 2014-09-08 | Avatar protection within a virtual universe |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/238,541 US8241131B2 (en) | 2008-09-26 | 2008-09-26 | Avatar protection within a virtual universe |
US13/540,748 US8827816B2 (en) | 2008-09-26 | 2012-07-03 | Avatar protection within a virtual universe |
US14/480,040 US20150126276A1 (en) | 2008-09-26 | 2014-09-08 | Avatar protection within a virtual universe |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/540,748 Continuation US8827816B2 (en) | 2008-09-26 | 2012-07-03 | Avatar protection within a virtual universe |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150126276A1 true US20150126276A1 (en) | 2015-05-07 |
Family
ID=42058052
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/238,541 Expired - Fee Related US8241131B2 (en) | 2008-09-26 | 2008-09-26 | Avatar protection within a virtual universe |
US13/540,748 Active 2029-03-29 US8827816B2 (en) | 2008-09-26 | 2012-07-03 | Avatar protection within a virtual universe |
US14/480,040 Abandoned US20150126276A1 (en) | 2008-09-26 | 2014-09-08 | Avatar protection within a virtual universe |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/238,541 Expired - Fee Related US8241131B2 (en) | 2008-09-26 | 2008-09-26 | Avatar protection within a virtual universe |
US13/540,748 Active 2029-03-29 US8827816B2 (en) | 2008-09-26 | 2012-07-03 | Avatar protection within a virtual universe |
Country Status (1)
Country | Link |
---|---|
US (3) | US8241131B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130296045A1 (en) * | 2012-05-04 | 2013-11-07 | Alec Dun | Cross-realm zones for interactive gameplay |
US20220212101A1 (en) * | 2020-03-13 | 2022-07-07 | Google Llc | Peer-to-peer multiplayer cloud gaming architecture |
Families Citing this family (94)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5181180B2 (en) * | 2007-11-22 | 2013-04-10 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Transaction method, program and server system in three-dimensional virtual space |
US8127235B2 (en) | 2007-11-30 | 2012-02-28 | International Business Machines Corporation | Automatic increasing of capacity of a virtual space in a virtual world |
US20090164919A1 (en) | 2007-12-24 | 2009-06-25 | Cary Lee Bates | Generating data for managing encounters in a virtual world environment |
JP5159375B2 (en) | 2008-03-07 | 2013-03-06 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Object authenticity determination system and method in metaverse, and computer program thereof |
US8914854B2 (en) * | 2008-09-11 | 2014-12-16 | International Business Machines Corporation | User credential verification indication in a virtual universe |
US8241131B2 (en) * | 2008-09-26 | 2012-08-14 | International Business Machines Corporation | Avatar protection within a virtual universe |
US9056248B2 (en) | 2008-12-02 | 2015-06-16 | International Business Machines Corporation | System and method for detecting inappropriate content in virtual worlds |
US9300612B2 (en) * | 2009-01-15 | 2016-03-29 | International Business Machines Corporation | Managing interactions in a virtual world environment |
US8245283B2 (en) * | 2009-03-03 | 2012-08-14 | International Business Machines Corporation | Region access authorization in a virtual environment |
US20100295847A1 (en) * | 2009-05-21 | 2010-11-25 | Microsoft Corporation | Differential model analysis within a virtual world |
US8972476B2 (en) * | 2009-06-23 | 2015-03-03 | Microsoft Technology Licensing, Llc | Evidence-based virtual world visualization |
US9393488B2 (en) * | 2009-09-03 | 2016-07-19 | International Business Machines Corporation | Dynamically depicting interactions in a virtual world based on varied user rights |
US8347217B2 (en) * | 2009-12-02 | 2013-01-01 | International Business Machines Corporation | Customized rule application as function of avatar data |
US8484158B2 (en) | 2010-02-01 | 2013-07-09 | International Business Machines Corporation | Managing information about avatars across virtual worlds |
US9205328B2 (en) | 2010-02-18 | 2015-12-08 | Activision Publishing, Inc. | Videogame system and method that enables characters to earn virtual fans by completing secondary objectives |
US9682324B2 (en) | 2010-05-12 | 2017-06-20 | Activision Publishing, Inc. | System and method for enabling players to participate in asynchronous, competitive challenges |
US9245177B2 (en) * | 2010-06-02 | 2016-01-26 | Microsoft Technology Licensing, Llc | Limiting avatar gesture display |
WO2013096489A1 (en) * | 2011-12-20 | 2013-06-27 | Icelero Inc | Method and system for creating a virtual social and gaming experience |
US10137376B2 (en) | 2012-12-31 | 2018-11-27 | Activision Publishing, Inc. | System and method for creating and streaming augmented game sessions |
US9244588B2 (en) * | 2013-03-15 | 2016-01-26 | Disney Enterprises, Inc. | Facilitating group activities in a virtual environment |
US9766773B2 (en) * | 2013-07-31 | 2017-09-19 | Disney Enterprises, Inc. | Dynamic player activity environment response |
US10376792B2 (en) | 2014-07-03 | 2019-08-13 | Activision Publishing, Inc. | Group composition matchmaking system and method for multiplayer video games |
US11351466B2 (en) | 2014-12-05 | 2022-06-07 | Activision Publishing, Ing. | System and method for customizing a replay of one or more game events in a video game |
US10118099B2 (en) | 2014-12-16 | 2018-11-06 | Activision Publishing, Inc. | System and method for transparently styling non-player characters in a multiplayer video game |
US10286314B2 (en) | 2015-05-14 | 2019-05-14 | Activision Publishing, Inc. | System and method for providing continuous gameplay in a multiplayer video game through an unbounded gameplay session |
US10315113B2 (en) | 2015-05-14 | 2019-06-11 | Activision Publishing, Inc. | System and method for simulating gameplay of nonplayer characters distributed across networked end user devices |
US10486068B2 (en) | 2015-05-14 | 2019-11-26 | Activision Publishing, Inc. | System and method for providing dynamically variable maps in a video game |
US10213682B2 (en) | 2015-06-15 | 2019-02-26 | Activision Publishing, Inc. | System and method for uniquely identifying physical trading cards and incorporating trading card game items in a video game |
US10471348B2 (en) | 2015-07-24 | 2019-11-12 | Activision Publishing, Inc. | System and method for creating and sharing customized video game weapon configurations in multiplayer video games via one or more social networks |
US10099140B2 (en) | 2015-10-08 | 2018-10-16 | Activision Publishing, Inc. | System and method for generating personalized messaging campaigns for video game players |
US11185784B2 (en) | 2015-10-08 | 2021-11-30 | Activision Publishing, Inc. | System and method for generating personalized messaging campaigns for video game players |
US10376781B2 (en) | 2015-10-21 | 2019-08-13 | Activision Publishing, Inc. | System and method of generating and distributing video game streams |
US10232272B2 (en) | 2015-10-21 | 2019-03-19 | Activision Publishing, Inc. | System and method for replaying video game streams |
US10245509B2 (en) | 2015-10-21 | 2019-04-02 | Activision Publishing, Inc. | System and method of inferring user interest in different aspects of video game streams |
US10694352B2 (en) | 2015-10-28 | 2020-06-23 | Activision Publishing, Inc. | System and method of using physical objects to control software access |
US10226703B2 (en) | 2016-04-01 | 2019-03-12 | Activision Publishing, Inc. | System and method of generating and providing interactive annotation items based on triggering events in a video game |
US10226701B2 (en) | 2016-04-29 | 2019-03-12 | Activision Publishing, Inc. | System and method for identifying spawn locations in a video game |
US10722800B2 (en) * | 2016-05-16 | 2020-07-28 | Google Llc | Co-presence handling in virtual reality |
US10179289B2 (en) | 2016-06-21 | 2019-01-15 | Activision Publishing, Inc. | System and method for reading graphically-encoded identifiers from physical trading cards through image-based template matching |
US10573065B2 (en) | 2016-07-29 | 2020-02-25 | Activision Publishing, Inc. | Systems and methods for automating the personalization of blendshape rigs based on performance capture data |
CN106569605B (en) * | 2016-11-03 | 2019-06-18 | 腾讯科技(深圳)有限公司 | Control method and device based on virtual reality |
US10463964B2 (en) | 2016-11-17 | 2019-11-05 | Activision Publishing, Inc. | Systems and methods for the real-time generation of in-game, locally accessible heatmaps |
US10709981B2 (en) | 2016-11-17 | 2020-07-14 | Activision Publishing, Inc. | Systems and methods for the real-time generation of in-game, locally accessible barrier-aware heatmaps |
US10500498B2 (en) | 2016-11-29 | 2019-12-10 | Activision Publishing, Inc. | System and method for optimizing virtual games |
US10055880B2 (en) | 2016-12-06 | 2018-08-21 | Activision Publishing, Inc. | Methods and systems to modify a two dimensional facial image to increase dimensional depth and generate a facial image that appears three dimensional |
US10861079B2 (en) | 2017-02-23 | 2020-12-08 | Activision Publishing, Inc. | Flexible online pre-ordering system for media |
GB2572525A (en) * | 2017-06-01 | 2019-10-09 | Spirit Al Ltd | Online user monitoring |
US10818060B2 (en) | 2017-09-05 | 2020-10-27 | Activision Publishing, Inc. | Systems and methods for guiding motion capture actors using a motion reference system |
US10974150B2 (en) | 2017-09-27 | 2021-04-13 | Activision Publishing, Inc. | Methods and systems for improved content customization in multiplayer gaming environments |
US10561945B2 (en) | 2017-09-27 | 2020-02-18 | Activision Publishing, Inc. | Methods and systems for incentivizing team cooperation in multiplayer gaming environments |
US11040286B2 (en) | 2017-09-27 | 2021-06-22 | Activision Publishing, Inc. | Methods and systems for improved content generation in multiplayer gaming environments |
US10537809B2 (en) | 2017-12-06 | 2020-01-21 | Activision Publishing, Inc. | System and method for validating video gaming data |
US10463971B2 (en) | 2017-12-06 | 2019-11-05 | Activision Publishing, Inc. | System and method for validating video gaming data |
US10981051B2 (en) | 2017-12-19 | 2021-04-20 | Activision Publishing, Inc. | Synchronized, fully programmable game controllers |
US10864443B2 (en) | 2017-12-22 | 2020-12-15 | Activision Publishing, Inc. | Video game content aggregation, normalization, and publication systems and methods |
US11278813B2 (en) | 2017-12-22 | 2022-03-22 | Activision Publishing, Inc. | Systems and methods for enabling audience participation in bonus game play sessions |
US10596471B2 (en) | 2017-12-22 | 2020-03-24 | Activision Publishing, Inc. | Systems and methods for enabling audience participation in multi-player video game play sessions |
US10924566B2 (en) | 2018-05-18 | 2021-02-16 | High Fidelity, Inc. | Use of corroboration to generate reputation scores within virtual reality environments |
US20190354189A1 (en) * | 2018-05-18 | 2019-11-21 | High Fidelity, Inc. | Use of gestures to generate reputation scores within virtual reality environments |
CN112955850B (en) * | 2018-09-20 | 2024-07-19 | 苹果公司 | Method and apparatus for attenuating joint user interactions in a Simulated Reality (SR) space |
US11192028B2 (en) | 2018-11-19 | 2021-12-07 | Activision Publishing, Inc. | Systems and methods for the real-time customization of video game content based on player data |
US11263670B2 (en) | 2018-11-19 | 2022-03-01 | Activision Publishing, Inc. | Systems and methods for dynamically modifying video game content based on non-video gaming content being concurrently experienced by a user |
US11115712B2 (en) | 2018-12-15 | 2021-09-07 | Activision Publishing, Inc. | Systems and methods for indexing, searching for, and retrieving digital media |
US11679330B2 (en) | 2018-12-18 | 2023-06-20 | Activision Publishing, Inc. | Systems and methods for generating improved non-player characters |
US11305191B2 (en) | 2018-12-20 | 2022-04-19 | Activision Publishing, Inc. | Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay |
JP7395172B2 (en) * | 2019-06-07 | 2023-12-11 | 株式会社アルファコード | Incentive grant system, incentive grant device, incentive grant method, and incentive management program in virtual reality space |
US11344808B2 (en) | 2019-06-28 | 2022-05-31 | Activision Publishing, Inc. | Systems and methods for dynamically generating and modulating music based on gaming events, player profiles and/or player reactions |
US11097193B2 (en) | 2019-09-11 | 2021-08-24 | Activision Publishing, Inc. | Methods and systems for increasing player engagement in multiplayer gaming environments |
US11423605B2 (en) | 2019-11-01 | 2022-08-23 | Activision Publishing, Inc. | Systems and methods for remastering a game space while maintaining the underlying game simulation |
US11712627B2 (en) | 2019-11-08 | 2023-08-01 | Activision Publishing, Inc. | System and method for providing conditional access to virtual gaming items |
US11537209B2 (en) | 2019-12-17 | 2022-12-27 | Activision Publishing, Inc. | Systems and methods for guiding actors using a motion capture reference system |
US11420122B2 (en) | 2019-12-23 | 2022-08-23 | Activision Publishing, Inc. | Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay |
US11563774B2 (en) | 2019-12-27 | 2023-01-24 | Activision Publishing, Inc. | Systems and methods for tracking and identifying phishing website authors |
JP6840876B1 (en) * | 2020-01-30 | 2021-03-10 | 株式会社ドワンゴ | Avatar display device, avatar display system, avatar display method and avatar display program |
US12014455B2 (en) * | 2020-05-06 | 2024-06-18 | Magic Leap, Inc. | Audiovisual presence transitions in a collaborative reality environment |
US11400378B2 (en) * | 2020-06-30 | 2022-08-02 | Sony Interactive Entertainment LLC | Automatic separation of abusive players from game interactions |
US11524234B2 (en) | 2020-08-18 | 2022-12-13 | Activision Publishing, Inc. | Multiplayer video games with virtual characters having dynamically modified fields of view |
US11351459B2 (en) | 2020-08-18 | 2022-06-07 | Activision Publishing, Inc. | Multiplayer video games with virtual characters having dynamically generated attribute profiles unconstrained by predefined discrete values |
US11833423B2 (en) | 2020-09-29 | 2023-12-05 | Activision Publishing, Inc. | Methods and systems for generating level of detail visual assets in a video game |
US11724188B2 (en) | 2020-09-29 | 2023-08-15 | Activision Publishing, Inc. | Methods and systems for selecting a level of detail visual asset during the execution of a video game |
US11717753B2 (en) | 2020-09-29 | 2023-08-08 | Activision Publishing, Inc. | Methods and systems for generating modified level of detail visual assets in a video game |
US11458404B2 (en) * | 2020-10-09 | 2022-10-04 | Sony Interactive Entertainment LLC | Systems and methods for verifying activity associated with a play of a game |
US11439904B2 (en) | 2020-11-11 | 2022-09-13 | Activision Publishing, Inc. | Systems and methods for imparting dynamic and realistic movement to player-controlled avatars in video games |
US12097438B2 (en) * | 2020-12-11 | 2024-09-24 | Guardiangamer, Inc. | Monitored online experience systems and methods |
US12097430B2 (en) | 2020-12-28 | 2024-09-24 | Activision Publishing, Inc. | Methods and systems for generating and managing active objects in video games |
US11853439B2 (en) | 2020-12-30 | 2023-12-26 | Activision Publishing, Inc. | Distributed data storage system providing enhanced security |
US12064688B2 (en) | 2020-12-30 | 2024-08-20 | Activision Publishing, Inc. | Methods and systems for determining decal projections intersecting spatial units in a frame of a game space |
US11794107B2 (en) | 2020-12-30 | 2023-10-24 | Activision Publishing, Inc. | Systems and methods for improved collision detection in video games |
US11724198B2 (en) * | 2021-08-11 | 2023-08-15 | Sony Interactive Entertainment LLC | Intelligent recommendations for gameplay session adjustment |
US11559746B1 (en) * | 2021-08-13 | 2023-01-24 | Electronic Arts Inc. | Feedback oriented gameplay sessions in video games |
US11724199B2 (en) | 2021-08-16 | 2023-08-15 | Sony Interactive Entertainment LLC | Parental controls of gameplay sessions |
JP7158781B1 (en) * | 2021-11-29 | 2022-10-24 | クラスター株式会社 | Terminal device, server, virtual reality space providing system, program, and virtual reality space providing method |
GB2617836B (en) * | 2022-04-19 | 2024-08-21 | Sony Interactive Entertainment Inc | Image processing apparatus and method |
GB2622251A (en) * | 2022-09-08 | 2024-03-13 | Sony Interactive Entertainment Inc | Systems and methods of protecting personal space in multi-user virtual environment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040077394A1 (en) * | 2002-10-21 | 2004-04-22 | Kabushiki Kaisha Square Enix | Video game that imposes penalty for violation of rule |
US20060178967A1 (en) * | 2005-02-04 | 2006-08-10 | Searete Llc | Disposition of proprietary virtual rights |
US20090177979A1 (en) * | 2008-01-08 | 2009-07-09 | Zachary Adam Garbow | Detecting patterns of abuse in a virtual environment |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7073129B1 (en) * | 1998-12-18 | 2006-07-04 | Tangis Corporation | Automated selection of appropriate information based on a computer user's context |
AU2463001A (en) | 1999-12-30 | 2001-07-16 | Umagic Systems, Inc. | Personal advice system and method |
US7319992B2 (en) * | 2000-09-25 | 2008-01-15 | The Mission Corporation | Method and apparatus for delivering a virtual reality environment |
US20070035549A1 (en) | 2005-08-12 | 2007-02-15 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Variant rating plans for a virtual world environment |
US20070013691A1 (en) | 2005-07-18 | 2007-01-18 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Supervisory authority in virtual world environment |
US8241131B2 (en) * | 2008-09-26 | 2012-08-14 | International Business Machines Corporation | Avatar protection within a virtual universe |
-
2008
- 2008-09-26 US US12/238,541 patent/US8241131B2/en not_active Expired - Fee Related
-
2012
- 2012-07-03 US US13/540,748 patent/US8827816B2/en active Active
-
2014
- 2014-09-08 US US14/480,040 patent/US20150126276A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040077394A1 (en) * | 2002-10-21 | 2004-04-22 | Kabushiki Kaisha Square Enix | Video game that imposes penalty for violation of rule |
US20060178967A1 (en) * | 2005-02-04 | 2006-08-10 | Searete Llc | Disposition of proprietary virtual rights |
US20090177979A1 (en) * | 2008-01-08 | 2009-07-09 | Zachary Adam Garbow | Detecting patterns of abuse in a virtual environment |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130296045A1 (en) * | 2012-05-04 | 2013-11-07 | Alec Dun | Cross-realm zones for interactive gameplay |
US9220982B2 (en) * | 2012-05-04 | 2015-12-29 | Blizzard Entertainment, Inc. | Cross-realm zones for interactive gameplay |
US20160121212A1 (en) * | 2012-05-04 | 2016-05-05 | Blizzard Entertainment, Inc. | Cross-realm zones for interactive gameplay |
US10086279B2 (en) * | 2012-05-04 | 2018-10-02 | Blizzard Entertainment, Inc. | Cross-realm zones for interactive gameplay |
US20220212101A1 (en) * | 2020-03-13 | 2022-07-07 | Google Llc | Peer-to-peer multiplayer cloud gaming architecture |
US11752426B2 (en) * | 2020-03-13 | 2023-09-12 | Google Llc | Peer-to-peer multiplayer cloud gaming architecture |
Also Published As
Publication number | Publication date |
---|---|
US8827816B2 (en) | 2014-09-09 |
US20100081508A1 (en) | 2010-04-01 |
US20120270620A1 (en) | 2012-10-25 |
US8241131B2 (en) | 2012-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8827816B2 (en) | Avatar protection within a virtual universe | |
US9421468B2 (en) | Rendering of artifacts in a virtual universe environment in response to user tags | |
US8682832B2 (en) | Application of normative rules in a virtual universe | |
Balkin et al. | Cybercrime: digital cops in a networked environment | |
Evtimov et al. | Is tricking a robot hacking? | |
Faraz et al. | Child safety and protection in the online gaming ecosystem | |
Perry | Civil liability for cyberbullying | |
Katell et al. | Seeing the whole picture: visualising socio-spatial power through augmented reality | |
Lee et al. | Users’ perspectives on ethical issues related to playing location-based augmented reality games: a case study of Pokémon GO | |
Stavola et al. | Victimization by Deepfake in the Metaverse: Building a Practical Management Framework | |
Stoup | The development and failure of social norms in Second Life | |
Haber | The Criminal Metaverse | |
Shariff et al. | Misogyny in the metaverse: Leveraging policy and education to address technology-facilitated violence | |
Riesmeyer | The Dark Side of Technological Advances: How Technology has Enabled Domestic Violence and the Contributing Role of the First Amendment | |
Barr et al. | Digital threats on campus: Examining the duty of colleges to protect their social networking students | |
Strikwerda | Should virtual cybercrime be regulated by means of criminal law? A philosophical, legal-economic, pragmatic and constitutional dimension | |
Lalasz | Risky behaviors in Yellowstone National Park: The potential role of decision-making and justice on visitors’ behavior | |
Lipton | Cyberbullying and the first amendment | |
Sarch et al. | Punishing artificial intelligence: legal fiction or science fiction | |
Groppe | A Child's Playground or a Predator's Hunting Ground-How to Protect Children on Internet Social Networking Sites | |
Aliyu et al. | On the role and form of personal information disclosure in cyberbullying incidents | |
Miller | Avatars and Social Media: Employment Law Risks and Challenges in the Virtual World. | |
Gold | When Pokemon GO (es) too far: augmented reality and Tort law | |
Riesmeyer | The Dark Side of Technological Advances: How Technology Has Enabled Domestic Violence and the Contributing Role of the First Amendment | |
Wilfore | Security, Misogyny, and Disinformation Undermining Women's Leadership |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ACTIVISION PUBLISHING, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:035125/0625 Effective date: 20121231 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHOGAL, KULVIR S.;HAMILTON, RICK A., II;KELLER, NEAL M.;AND OTHERS;REEL/FRAME:035125/0472 Effective date: 20080916 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |