US20150126276A1 - Avatar protection within a virtual universe - Google Patents

Avatar protection within a virtual universe Download PDF

Info

Publication number
US20150126276A1
US20150126276A1 US14/480,040 US201414480040A US2015126276A1 US 20150126276 A1 US20150126276 A1 US 20150126276A1 US 201414480040 A US201414480040 A US 201414480040A US 2015126276 A1 US2015126276 A1 US 2015126276A1
Authority
US
United States
Prior art keywords
avatar
protected
virtual universe
activity
processing unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/480,040
Inventor
Kulver S. Bhogal
Rick A. Hamilton
Neal M. Keller
Clifford A. Pickover
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Activision Publishing Inc
Original Assignee
Activision Publishing Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Activision Publishing Inc filed Critical Activision Publishing Inc
Priority to US14/480,040 priority Critical patent/US20150126276A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Bhogal, Kulvir S., HAMILTON, RICK A., II, KELLER, NEAL M., PICKOVER, CLIFFORD A.
Assigned to ACTIVISION PUBLISHING, INC. reassignment ACTIVISION PUBLISHING, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Publication of US20150126276A1 publication Critical patent/US20150126276A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/75Enforcing rules, e.g. detecting foul play or generating lists of cheating players
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/73Authorising game programs or game devices, e.g. checking authenticity
    • A63F13/12
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/30Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/30Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
    • A63F13/35Details of game servers
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/53Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing
    • A63F2300/535Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing for monitoring, e.g. of user parameters, terminal parameters, application parameters, network parameters
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/55Details of game data or player data management
    • A63F2300/5546Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history
    • A63F2300/5553Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history user representation in the game field, e.g. avatar
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/55Details of game data or player data management
    • A63F2300/5546Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history
    • A63F2300/558Details of game data or player data management using player registration data, e.g. identification, account, preferences, game history by assessing the players' skills or ranking
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/55Details of game data or player data management
    • A63F2300/5586Details of game data or player data management for enforcing rights or rules, e.g. to prevent foul play

Definitions

  • the present invention generally relates to protecting a virtual universe (VU) user represented by an avatar from the actions of one or more other user's avatars. Notification and other responsive actions taken with respect to other user's avatars are also discussed.
  • VU virtual universe
  • VU Virtual Universe
  • VU is a computer-based simulated world or environment; other terms for VU's include metaverses, “3-D Internet” and Virtual World, and VU will be understood to represent any of these environments.
  • a user creates an agent which functions as the user's account, and upon which the user builds an avatar tied to an inventory of assets the user owns in the VU and associated with the agent.
  • Second Life® SECOND LIFE is a trademark of Linden Research, Inc. in the United States and/or other countries
  • Entropia UniverseTM ENTROPIA UNIVERSE is a registered trademark of MindArk PE AB in the United States, other countries, or both
  • the Sims OnlineTM TEE SIMS ONLINE is a trademark of Electronic Arts, Inc. in the United States, other countries, or both
  • ThereTM THERE is a trademark of Makena Technologies, Inc. in the United States, other countries, or both
  • VU's are also commonly defined with respect to VU regions, virtual areas of land within the VU typically residing on a single server, with each region amenable to provision and management by a one or more participating providers.
  • the size and complexity and variety of resources found in a VU are related to the number of providers participating and hosting regions through server hosting. And the success of a VU may depend upon attracting users and keeping them engaged and participating in the VU environment, thereby adding value to the providers who bear the cost in providing VU region content and services (and correspondingly expect an appropriate level of multiple-user engagement as a return on their investment), as well as for other users who wish to engage many others in a large virtual community.
  • an informational or service-related region managed by a non-profit organization may desire or expect a given level of VU user engagement and participation, and commercial region providers may desire to engage in a given level of commercial transactions (e.g. sales) or achieve a level of marketing exposure among VU users.
  • VU avatars may exhibit inappropriate and threatening behaviors relative to other users or the VU environment itself.
  • prior art protection mechanisms are limited in their efficacy, and in particular with respect to offering proactive protection from hostile actions intentionally directed against a specific avatar by another user's avatar.
  • a user with personal knowledge of another user may use an avatar to deliberately harass or stalk the avatar of the other user.
  • some harassing behavior personally offensive or threatening to a target avatar may in fact be perceived as ambiguous or not objectionable to other users or to VU provider supervisory entities, and thus some harassing activities may actually be permitted by VU provider or supervisory entities, thereby rendering general protection mechanisms provided by some VU providers ineffective or even useless in protecting the targeted avatar.
  • VU users whose avatars are subject to objectionable behavior are forced to take actions on their own behalf, actions which may be burdensome and difficult for the user, or may even be proscribed by VU operating agreements or other normative rules (for example, directly responding with harassment, insults, violence in kind, etc.)
  • Methods are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar.
  • a protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
  • Methods also provide protective services to a virtual universe resident, with a service provider offering protective services for a virtual universe client resident.
  • service providers implement protection for a virtual universe client resident from a second resident, the protection implementing including preventing the second resident from engaging in a proscribed activity as a function of an association of the proscribed activity with the client resident.
  • Service providers monitor activity of client residents and second residents within the virtual universe for indicia of the proscribed activity, and execute a protective action against the client resident or the second resident in response detecting the indicia.
  • Methods also protect a protected avatar from actions of a second avatar within a virtual universe by producing computer executable program code, storing the code on a computer readable medium, and providing the program code to be deployed and executed on a computer system engaging a virtual universe.
  • the program code causes a computer system to distinguish an activity of the second avatar within the virtual universe as a function of a relation of the distinguished activity to the protected avatar and define a protective action associated with the distinguished activity and executable against the protected avatar or the second avatar.
  • the program code also causes a computer system to monitor activity of the protected avatar or the second avatar within the virtual universe for the distinguished activity, and to execute the protective action against the protected avatar or the second avatar in response to detecting the distinguished activity.
  • Programmable devices are also provided, the devices having processing means; memory in communication with the processing means; and a network interface in communication with the processing means and the memory.
  • the processing means are configured to detect an avatar activity hostile to a protected avatar within a virtual universe and prevent a second avatar from engaging in the hostile activity within the virtual universe as a function of a relation of the hostile activity to the protected avatar.
  • the processing means are further configured to monitor activity of the protected avatar or the second avatar within the virtual universe for the hostile activity and cause a virtual universe computer application to take a protective action against the protected avatar or the second avatar in response to detecting the hostile activity.
  • FIG. 1 is a flow chart illustrating a process and system for protecting a first avatar from actions of another avatar within a virtual universe.
  • FIG. 2 is a block diagram illustration of protecting a protected avatar from actions of another avatar according to the present invention.
  • FIG. 3 is a block diagram illustration of a virtual universe programmable device configured to protect a first avatar from actions of another avatar within a virtual universe.
  • FIG. 4 is a tabular representation of a policy table for use in protecting an avatar from actions of another avatar within a virtual universe.
  • FIG. 5 is a block diagram illustrating an exemplary computerized implementation of a system and method for protecting a first avatar from actions of another avatar within a virtual universe.
  • VU providers may set policies for providing protections to user avatars that incorporate or codify community standards which specify prohibited certain behaviors, and may condition participation in the VU upon agreeing to specific terms and conditions.
  • Such standards are generally useful in addressing readily-identifiable and generic behaviors defined with respect to all users or the environment itself, such as intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace.
  • Exposure to objectionable behavior may also be limited by designating regions of a virtual universe as “safe” or “unsafe” or by rating them (e.g. “mature,” “PG”, etc.), in some examples with corresponding restrictions on a minimum age needed to enter regions designated as “unsafe” or “mature,” and sometimes also requiring users to agree to hold the VU harmless for offensive conduct and contacts experienced in designated unsafe or mature regions, the user accepting the risk upon entering such a region.
  • VU's may also take steps to ensure that wrong-doers do not hide behind other or multiple avatars, for example requiring identification of the primary user of alternate accounts in the case of a user utilizing additional avatars.
  • Notification mechanisms to enable reporting of violations of community standards and minimum age restrictions may include abuse reporter tools, some of which keep the identity of the reporter confidential. Immediate assistance can also be provided by in-world avatars representing the virtual universe provider.
  • Virtual universe providers may also maintain a public list of abuse incidents including the date, location in the virtual universe, policy violated, nature of the abuse and action taken, some of which do not identify the offending avatar or owner of the user account.
  • Tracked and recognized abuse incidents may include objectionable-object littering, indecency in public areas, assault with scripted objects in designated safe areas, disturbing the peace with repetitive sound spam, verbal abuse by an alternate account avatar and indecencies or obscene images in the publicly accessible avatar profile.
  • Actions taken by virtual universe providers in response to abuse incidents typically involve warnings, suspensions, permanent banning from a virtual universe, and even possible legal action (for example, possible criminal law actions with respect to activities deemed illegal in an appropriate jurisdiction).
  • Virtual universe providers are also limited in effectively reacting to problem incidents after they occur, and relying generally on threats of banishment to enforce community standards for future actions. Users whose avatars are subject to objectionable behavior and seek to avoid it are also generally required to possess a virtual universe skill set to take protective actions on their own behalf, for example an ability to quickly teleport to a safe location, or block the receipt of text messages from offending avatars. Residents new to a virtual universe may not possess the technical skills needed to minimize offensive behavior before the threat of suspension or banishment is implemented by a virtual universe provider with respect to an offending party. residents may also be uncomfortable using abuse reporter tools, particularly when they are experiencing the stress associated with harassment.
  • VU and third party service providers may also offer a variety of services to enhance the experience of a VU user client, including providing travel, recreational or educational services in virtual universes. It would be advantageous for such travel companies to be able to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them in each region served within a VU. Without the ability to offer a safe experience to their clients in a given region such companies may avoid the region or even an entire virtual universe domain in fear of legal exposure from inappropriate behaviors by residents, thereby directly resulting in a loss of revenue opportunities for a virtual universe region, domain or environment provider.
  • a method and process for protecting a first avatar from actions of another avatar within a virtual universe (VU) is provided.
  • a protection protocol is provided or defined for the first avatar with respect to a second avatar or a person, entity or user represented by the second avatar.
  • the protection protocol is implemented within the context and framework of the virtual universe domain, the implementing comprising defining at least one rule or proscribed activity with respect to activity of another avatar within the virtual universe domain, and a protective action executable with respect to one or both avatars within the virtual universe domain.
  • a supervisory entity or application operating within the virtual universe monitors activity of the first avatar and/or the second avatar within the virtual universe domain as provided by or as a function of the protocol implementation.
  • the monitoring results in a triggering of an application of the implemented protocol in response to or as a function of detecting the first avatar or the second avatar violating the protocol rule, and at 110 the protocol protective action as implemented at 104 is initiated and taken with respect to at least one of the first avatar and the second avatar.
  • the protective protocol may be an agreement, which may be understood to comprehend any document, contract, court order, decree, governmental rule or regulation or any other framework of duties and responsibilities defining an aspect of a relation of a protected avatar to another avatar or to a VU environment in general.
  • an agreement may be understood to comprehend any document, contract, court order, decree, governmental rule or regulation or any other framework of duties and responsibilities defining an aspect of a relation of a protected avatar to another avatar or to a VU environment in general.
  • protective protocol agreements may exist or be defined to protect Avatar 1 in anticipation of further conflicts.
  • situations in real life can spill over into a virtual universe frequented by the same individuals as users through their avatars, and histories including abuse incidents and acrimonious divorce proceedings may present special challenges to virtual universe providers from a business and legal perspective; for example, taking a firm action such as banishing a resident who offends another resident known to him or her results in a direct loss of revenue from the banished resident.
  • False or mistaken reports of virtual universe abuse for example by a friend or family member of a reputedly harassed VU resident, may also result in unfair banishment of an accused resident from a VU, or regions thereof such as clubs, cultural or recreational regions where the falsely accused resident has developed valuable social or business relationships.
  • VU providers and supervisory entities may undertake investigations to verify accusations, such investigations require the expenditure of resources, and sometimes of significant and expensive resources.
  • real-life agreements such as for example divorce decrees and restraining orders issued by a courts having jurisdiction over avatar users and/or VU or VU services provider may define and impose duties with respect to actions that the respective users may take within a VU through their avatars.
  • advantages are obtained by implementing such agreements into the VU environment, in one aspect helping VU and VU service providers to identify and avoid potential liabilities, and, in another aspect, to serve in custom configuring a VU environment to meet the unique needs of a given protected avatar (thereby enabling some protected avatar users to participate within a VU without fear, etc., who may otherwise decline to participate).
  • protective protocol agreements may directly proscribe, or be interpreted to directly proscribe, certain avatar activities hostile to an interest of the protected avatar. They may also impose duties on VU providers to report transgressions or any preventive measures instituted.
  • Virtual universe providers are thus enabled to provide “virtual restraining order” proactive services, in one aspect enabling the development of additional business opportunities associated with providing regions safe for protected parties as defined by such real-world restraining orders.
  • a user may desire to purchase consistent restraint/protective services which will span their residence in multiple virtual universes, and hence may be implemented through differing embodiments depending on each particular virtual universe visited.
  • a virtual universe provider or a supervisory entity to provide consistent protection services by configuring appropriate protective mechanisms for each specific visited VU, in some examples including negotiating arrangements with other virtual universe providers to configure and extend such protection to each divergent VU.
  • this provides a sustainable competitive advantage over other VU providers and VU service providers in attracting new residents with a variety of concerns relative to inappropriate behavior in virtual universes.
  • a protection protocol agreement may be a real-world restraining order issued by an appropriate governmental entity having a legal jurisdiction over the user of a protected avatar, or over other party/avatar user(s), wherein implementing the restraining order comprises deriving and creating a “virtual restraining order” for implementation within the context of the virtual universe in order to protect the first protected avatar from virtual universe activities of one or more other second avatars in the virtual universe domain of implementation.
  • FIG. 2 provides an illustration of an implemented avatar protection according to the present invention within a virtual universe domain 118 .
  • a protection protocol implemented within the context and framework of the virtual universe 118 results in an exclusion zone 122 projected about a protected avatar 120 .
  • a second potentially-harmful avatar 130 identified by the implemented protection protocol as hostile to the protected avatar 120 , is prevented from approaching or otherwise locating spatially close to the protected avatar 120 within the virtual universe 118 within the exclusion zone 122 .
  • the protected avatar 120 seeking protection from the second avatar 130 may also directly initiate or engage the services of a VU provider or another third party services provider, who may offer a protection service that protects the protected avatar 120 from the second avatar 130 in exchange for compensation.
  • the protection service or the VU provider may restrict the second avatar 130 from interacting with the protected avatar 120 , and the protected avatar 120 may also be (optionally) restricted from interacting with the second avatar 130 .
  • a relationship of the protected avatar 120 relative to the second avatar 130 may be used to define the respective avatars and their obligations; for example, the user of the protected avatar 120 may be a child and the user of the second avatar 130 may be an adult who has a history or other behavioral attribute indicating that he or she may pose a threat to children in general.
  • the users of the protected avatar 120 and the second avatar 130 may also be previously known to each other, either in real life or one or more virtual universes, and thus their relative identities as the protected avatar 120 and the second avatar 130 and their respective obligations and restraints with respect to each other defined as a function of their history relative to each other.
  • An implemented protocol may also include a plurality of different triggers and actions, and, in one aspect, these triggers may be configured to recognize and protect an avatar in situations and contexts that, although not violating any general or normative rule within the VU, are nevertheless inappropriate as defined by the protective protocol or its implementation.
  • these triggers may be configured to recognize and protect an avatar in situations and contexts that, although not violating any general or normative rule within the VU, are nevertheless inappropriate as defined by the protective protocol or its implementation.
  • a parent of a child using the protected avatar 120 concerned with certain inappropriate behavior may desire that the protected avatar 120 be protected from said certain inappropriate behavior by any resident, including preventing such an avatar from coming close to the protected avatar 120 .
  • the second avatar 130 is evidencing said certain inappropriate behavior, he or she is either not exceeding some objective community standard threshold, or the protected avatar 120 and the second avatar 130 may be presently located in a VU region with a higher permissive threshold than another VU region, and thus a common protective action (e.g. preventing the second avatar 130 from coming close to the protected avatar 120 ) may not be triggered as it may not be available or indicated by the given facts and general VU region settings.
  • the protective protocol may thus be configured to take alternative actions in response to the inappropriate behavior generally neutral to or not directed against the putatively offending second avatar 130 , for example alerting the protected avatar 120 or the parent or other party of the situation with a graphical text message 142 .
  • Alternative measures include removing the protected avatar 120 from the region, in some cases by default, or in some cases temporarily and further giving the parent or the protected avatar 120 an opportunity to acknowledge and agree to the protective action or override the removal.
  • action triggers may include behaviors defined by real-life restraining orders.
  • behaviors by a third avatar 140 may also trigger a rule violation or protective action as function of determining that the third avatar 140 is actually acting as a surrogate for the second avatar 130 subject to a restraining order.
  • the third avatar 140 may be hired, coached or controlled by the second avatar 130 to make contacts with the protected avatar 120 forbidden to the second avatar 130 , and thus determining an association of the third avatar 140 with the second avatar 130 results in triggering of the protective protocol exclusion zone 122 with respect to the otherwise innocuous third avatar 140 .
  • a user may be offered an opportunity to purchase enhanced monitoring services, which may be offered to both protected avatars for protection and other avatars to ensure that they are not violating a protective protocol with respect to a protected avatar.
  • a human or automated enhanced avatar monitoring service may be provided by a virtual universe provider or other service provider as an alternative to suspension and banishment of the second avatar 130 , in some examples required according to a legal liability or obligation of the virtual universe service provider resulting from a court order.
  • an automated enhanced avatar monitoring service may assign an automated avatar to shadow the second avatar 130 and record all conversations and actions relative to the protected avatar 120 .
  • Triggering application of protective measures of a VU-implemented protocol may comprise a variety of trigger mechanisms, illustratively including a proximity threshold violation, for example an unauthorized adult second avatar 130 is detected within a threshold permissible radius of a child protected avatar 120 ; detecting presence or possession of a specific banned inventory item 126 or class of item 126 , for example, the second avatar 130 has a weapon, malicious software, etc.
  • a proximity threshold violation for example an unauthorized adult second avatar 130 is detected within a threshold permissible radius of a child protected avatar 120 ; detecting presence or possession of a specific banned inventory item 126 or class of item 126 , for example, the second avatar 130 has a weapon, malicious software, etc.
  • parsing may refer to analyzing input in a specific computer language against the formal grammar of the language, often to validate the input or create an internal representation for use in subsequent processing, as well as to analyzing and describing grammatical structures of a sentence in comprehending the meaning of a sentence or term therein: thus parsing may be understood generally as analyzing text items within text communication for recognizing the presence of trigger terms, phrases, activities and behavioral attributives in order to implement protections according to the present invention.
  • Illustrative but not exhaustive protocol protective actions or restrictions for example an action taken at 110 of FIG. 1 as described above, include: transporting the protected avatar to a safe region or environment, for example transporting a child protected avatar 120 to a location within the VU beside or within a safe penumbra of a parent's avatar; providing a graphical indication 142 to the protected avatar 120 to illustrate and convey that the second avatar 130 is within a certain proximate distance or radius value; notifying a third party (e.g. a parent) of an implemented protocol rule violation or other trigger; preventing either of the protected avatar 120 or the second avatar 130 from being with a specified distance or radius defined by the exclusion zone 122 of the other of the protected avatar 120 and the second avatar 130 .
  • a third party e.g. a parent
  • Permission for the second avatar 130 to be in a specified proximity/exclusion zone 122 of the protected avatar 120 may also be conditional upon regional VU designations, for example permitting proximity only in one or more designated places where the second avatar 130 had previously socialized but prohibiting the second avatar 130 from following the protected avatar 120 into a new region, in one aspect presuming that such action would be indicative of stalking the protected avatar 120 .
  • Determining an implemented protocol rule violation or other trigger or taking a protocol protective action may also be dependent upon occupation of either the protected avatar 120 or the second avatar 130 within certain defined or rated regions within the VU; for example, location of a child protected avatar 120 within a VU region designated as “child-friendly” may initiate or enable enforcement of one or more rules, triggers or actions defined as a function of the child-friendly region, in some examples resulting in preventing the physical location of an unauthorized adult second avatar 130 near the child protected avatar 120 while the protected avatar 120 is occupying the child-friendly region. It will also be appreciated that methods, systems and processes described above and otherwise herein may also be applicable to avatars representing or being operated by artificial entities, for example including robot servants and automated pets, as well as human user-operated avatars.
  • Protective actions and restrictions may include warning the second avatar 130 that a real-life restraining order from a court is known and recognized by the virtual universe provider, and informing the second avatar 130 through a graphic warning 144 that the VU provider is thereby required by law to report any inappropriate behavior by the second avatar 130 towards the protected avatar 120 to an appropriate authority.
  • Implemented protocol administration may also be a function of time. For example, in one embodiment if a restricted second avatar's 130 behavior is determined to fall within appropriate or permitted guidelines for a specified elapsed period of time relative to the protected avatar 120 , then certain restrictions on the second avatar 130 under the protocol may be relaxed, for example enabling the second avatar 130 to teleport to new regions occupied by the protected avatar 120 without presuming said teleporting constituted an indication of stalking behavior, or even allowing the second avatar 130 to approach within the exclusion zone 122 .
  • Some embodiments may be configured to serve VU travel companies which provide travel, recreational or educational services in virtual universes and wish to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them.
  • a VU travel or protection services provider may negotiate with one or more virtual universe providers, domains or regions to agree upon the identification of certain objectionable behaviors that are to be proactively prevented or minimized from occurring when clients of the travel or protection services provider visit.
  • the negotiated behaviors or a subset thereof may also be designated to apply to clients of the travel or protection services provider during their VU participation.
  • some clients may develop friendships and other interpersonal relationships and histories with other avatars (including other clients) during their VU visits, and thus it may be in the interest of the provider to monitor their clients for inappropriate behavior as well.
  • specific examples and/or levels of proscribed behaviors may be provided, for example further defining levels of behaviors associated with intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace.
  • harassment may be defined as provocative text chat of a sexual or violent nature
  • assault may be defined as repeatedly bumping another avatar, or targeting another avatar with a scripted object
  • violating the privacy of conversations may be defined as monitoring private text chats through a “private eye” or surrogate avatar or other method
  • indecency may include bringing a sexually suggestive object out of inventory in public or in view of another avatar
  • disturbing the peace may include repeatedly generating a sound, for example a sound spam or a repetitive sound having a certain minimum decibel level.
  • Protective actions may include immediately teleporting one or more avatars against which objectionable behavior is directed (for example, an entire tour group) to a safe area, in some embodiments if the objectionable behavior cannot be proactively prevented.
  • An abuse report may also be filed with a virtual universe or region provider, in some embodiments on behalf of a VU travel or protective services company.
  • An offended avatar may also be offered an opportunity to be shadowed by an enhanced monitoring avatar, in some examples at the expense of the VU travel or protective services company already providing protection services to the offended avatar.
  • a VU travel or protective services company may offer to negotiate protective services on behalf of a user, wherein the protections negotiated may be incorporated directly into an agreement between the individual user or resident seeking protection and the virtual universe provider.
  • Virtual universe providers are also enabled to attract and serve users from populations at risk (for example, children, the elderly, persons who have been the victims of abuse, etc.) who need a higher standard of care than the general client or customer population. Virtual universe providers may also attract business from other companies providing travel, recreational and educational services and who are concerned about possible inappropriate behavior by residents of regions visited, which may be directed towards the tour groups, in one aspect reducing exposures to legal liability or risk of business loss associated with client harassment.
  • Avatar tracking data may be monitored at different levels of granularity. For example, positional information may be generated every minute or every time a user teleports, flies, or moves a specified threshold distance value. Information may also be generated every time an item is put into an avatar's inventory. In one implementation, a daemon process may regularly poll a monitored/supervised avatar for current location information and store this information for subsequent transmittal to a supervisory entity or third party.
  • a VU provider or protection service may maintain one or more databases comprising identifiers for user avatars, a desired nature of protection, and the desired alerts to trigger such protection.
  • a first database record with respect to the protected avatar 120 associates a generally circular exclusion zone 122 defined by a 30 foot proximity radius with respect to the second avatar 130 , wherein violation of the 30-foot radius by the second avatar 130 triggers a protective action of teleporting the protected avatar 120 to a safe room or to a parent; and a second database record with respect to the protected avatar 120 associates an inventory item 128 restriction with respect to the third avatar 140 , wherein violation of inventory item restriction by the third avatar 140 triggers a protective action of physically preventing the third avatar 140 from getting close to the protected avatar 120 .
  • Protective measures may be implemented in a variety of ways. For example, if the second avatar 130 attempts to approach the protected avatar 120 within a minimum specified threshold distance value, VU client motion controls of the user of the second avatar 130 may be prevented from achieving movement of the second avatar 130 in a direction that would violate the minimum specified threshold distance value or exclusion zone 122 .
  • virtual universe providers are also enabled to provide a greater variety of user-appropriate and safe regions through a greater granularity of control over resident behaviors, for example enabling multiple definitions of “PG” and “adult” regions as functions of divergent user needs and objectives, as well as offering flexibility in constraining undesirable behavior through offering a plurality of different enhanced monitoring services in lieu of banishment. This may not only avoid loss of subscription fees by a banished user or resident, but offer an opportunity to receive additional service charges in exchange for enhancing monitoring of a trouble-maker avatar.
  • FIG. 3 illustrates a logic machine 200 configured to implement protection methods and mechanisms to protect a VU avatar from the actions of other avatars within a virtual universe domain.
  • the logic machine 200 comprises a Protective Protocol (P.P.) implementer component 202 configured to convert, translate or otherwise define protocol aspects into rules, procedures and/or actions in a form implementable within the operating environment of the virtual universe.
  • An activity monitoring component 204 is configured to observe the activity of one or more avatars identified by or otherwise relevant to the protocol as implemented to detect any activity by the other avatars that may trigger a protective action for the benefit of the protected first avatar.
  • An action component 206 is configured to implement a protective action, including a protective action defined and implemented with respect to the protective protocol.
  • FIG. 4 illustrates a policy table implementation example for use in triggering and effecting one or more protective actions as a function of VU region ratings and offending avatar behavior characteristics, in one embodiment implemented with respect to protecting members of a protective services entity client group. Triggering determinations are made as function of the region rating, and one or more protective actions suitable to the regional rating and optionally a history of the protected avatar/group or the offending avatar are selected from a plurality of options provided by the policy table.
  • an avatar exhibiting an objectionable adult-oriented behavior in a “G” rated region triggers protective actions suitable for a group for which G-rated region protection protocols are implemented.
  • a first offense for an offending avatar with no other indications of inappropriate behavior may warrant only a warning to the offending avatar;
  • a second offense or other history indicating prior actions inappropriate to a G-rated region may result in a notice and teleportation of the offending avatar out of the G-rated region to a non-G rated region;
  • a third offense or a significant history of prior actions inappropriate to other region ratings as well may result in a suspension or regional access rights (e.g.
  • An offending object may also be confiscated, with the determination a function of a nature or identity of the item (e.g. not confiscate an adult-oriented object, but confiscate a contraband item) as well as the history of the avatar (warn the first time, confiscate for repeated offenses).
  • the entire protected group may also be teleported to another G-rated region, in one aspect to minimize the risk of additional offending behavior incidents potentially arising through proximity to a plurality of avatars with a prior history of offending behavior.
  • Protective actions may also include fee-generating options for the protective services or VU provider. This may include offering the protected group or the offending avatar fee-based enhanced monitoring services, in one aspect to enhance the protections offered to the protected group or to give notice to the offending avatar when his future actions may have the potential of incurring additional fees for monitoring services or negative history data. Fees for enhanced monitoring services required for further engagement in a given region or region category may be variable, including with services and fee rates determined as function of the region rating: thus PG-rated region permission may require enhanced monitoring of one or more behaviors different from those monitored for adult-rated regions, but may be included within a larger set of behaviors monitored for G-rated region permissions.
  • virtual universe providers may include in their agreement terms and conditions that previous cited behaviors in certain designated categories will result in specified actions (for example, an automatic temporary restriction on mobility, a restriction in the use of text chat, a restriction in the ability to display items from inventory, etc.) unless fee-based enhanced monitoring services are engaged for the offending avatar.
  • specified actions for example, an automatic temporary restriction on mobility, a restriction in the use of text chat, a restriction in the ability to display items from inventory, etc.
  • Triggers may vary by region. For example, proximity to a plurality of VU residents who have previously been cited in abuse reports for violent or offensive remarks or behaviors may result in an automatic teleport of an entire protected group to another safe region of comparable rating (for example, a G-rated region for a group rated for a G-rated region, or a G or PG rated region for a group rated for a PG-rated region).
  • region, incident and avatar-specific triggers and protective action selection are also provided by tabular illustration of FIG. 4 .
  • FIG. 4 is only illustrative of one embodiment, and policy tables according to the present invention are not limited to the example provided by FIG. 4 .
  • an exemplary computerized implementation includes a computer system 304 deployed within a computer infrastructure 308 such as a computer or a programmable device such as a personal digital assistant (PDA) or cellular phone.
  • a computer infrastructure 308 such as a computer or a programmable device such as a personal digital assistant (PDA) or cellular phone.
  • PDA personal digital assistant
  • a network environment 340 e.g., the Internet, a wide area network (WAN), a local area network (LAN), a virtual private network (VPN), etc.
  • communication throughout the network 340 can occur via any combination of various types of communication links.
  • the communication links can comprise addressable connections that may utilize any combination of wired and/or wireless transmission methods.
  • connectivity could be provided by conventional TCP/IP sockets-based protocol, and an Internet service provider could be used to establish connectivity to the Internet.
  • the computer system 304 includes a central processing unit (CPU) 312 , a memory 316 , a bus 320 , and input/output (I/O) interfaces 324 . Further, the computer system 304 is shown in communication with external I/O devices/resources 328 and storage system 332 .
  • the processing unit 312 executes computer program code, such as the code to implement various components of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, including the Protective Protocol implementer 202 , the activity monitoring component 204 and the action engine 206 , which are stored in memory 316 and/or storage system 332 . It is to be appreciated that two or more, including all, of the components may be implemented as a single component.
  • the processing unit 312 can read and/or write data to/from the memory 316 , the storage system 332 , and/or the I/O interfaces 324 .
  • the bus 320 provides a communication link between each of the components in computer system 304 .
  • the external devices 328 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact with computer system 304 and/or any devices (e.g., network card, modem, etc.) that enable computer system 304 to communicate with one or more other computing devices.
  • the computer infrastructure 308 is only illustrative of various types of computer infrastructures for implementing the invention.
  • computer infrastructure 308 comprises two or more computing devices (e.g., a server cluster) that communicate over a network to perform the various process steps of the invention.
  • computer system 304 is only representative of various possible computer systems that can include numerous combinations of hardware.
  • the computer system 304 can comprise any specific purpose-computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general-purpose hardware/software, or the like.
  • the program code and hardware can be created using standard programming and engineering techniques, respectively.
  • processing unit 312 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server.
  • the memory 316 and/or the storage system 332 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations.
  • I/O interfaces 324 can comprise any system for exchanging information with one or more of the external device 328 . Still further, it is understood that one or more additional components (e.g., system software, math co-processing unit, etc.) not shown in FIG. 5 can be included in computer system 304 . Moreover, if computer system 304 comprises a handheld device or the like, it is understood that one or more of the external devices 328 (e.g., a display) and/or the storage system 332 could be contained within computer system 304 , not externally as shown.
  • the external devices 328 e.g., a display
  • the storage system 332 could be contained within computer system 304 , not externally as shown.
  • the storage system 332 can be any type of system (e.g., a database) capable of providing storage for information under the present invention.
  • the storage system 332 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive.
  • the storage system 332 includes data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown).
  • LAN local area network
  • WAN wide area network
  • SAN storage area network
  • additional components such as cache memory, communication systems, system software, etc., may be incorporated into computer system 304 .
  • the invention provides a computer-readable/useable medium that includes computer program code to enable a computer infrastructure to practice the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein.
  • the computer-readable/useable medium includes program code that implements each of the various process steps of the invention.
  • the terms “computer-readable medium” or “computer-useable medium” comprise one or more of any type of physical embodiment of the program code.
  • the computer-readable/useable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as the memory 316 and/or the storage system 332 (e.g., a fixed disk, a read-only memory, a random access memory, a cache memory, etc.).
  • computer infrastructure 308 is intended to demonstrate that some or all of the components of implementation could be deployed, managed, serviced, etc. by a service provider who offers to implement, deploy, and/or perform the functions of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, for example by licensing methods and browser or application server technology according to the present invention to an internet service providers (ISP) or cellular telephone provider.
  • ISP internet service providers
  • the invention may comprise a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis.
  • a service provider can create, maintain, support, etc., a computer infrastructure, such as the computer infrastructure 308 that performs the process steps of the invention, and in return the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
  • program code and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions intended to cause a computing device having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.
  • program code can be embodied as one or more of: an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Methods, program products, services and devices are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.

Description

  • This application is a continuation of U.S. patent application Ser. No. 13/540,748, filed Jul. 3, 2012, which is a continuation of U.S. patent application Ser. No. 12/238,541, now U.S. Pat. No. 8,241,131, filed Sep. 26, 2008, the contents of which are hereby incorporated by reference in their entirety.
  • FIELD OF THE INVENTION
  • The present invention generally relates to protecting a virtual universe (VU) user represented by an avatar from the actions of one or more other user's avatars. Notification and other responsive actions taken with respect to other user's avatars are also discussed.
  • BACKGROUND OF THE INVENTION
  • A Virtual Universe (VU) is a computer-based simulated world or environment; other terms for VU's include metaverses, “3-D Internet” and Virtual World, and VU will be understood to represent any of these environments. Users inhabit and traverse a VU, and interact with other VU users through the use of an avatar, a graphical representation of the user often taking the form of a cartoon-like human though any two or three dimensional graphic image or rendering may be utilized. In order to participate within or inhabit a VU, a user creates an agent which functions as the user's account, and upon which the user builds an avatar tied to an inventory of assets the user owns in the VU and associated with the agent.
  • Large robust VU's and massively multiplayer online games, such as for example Second Life® (SECOND LIFE is a trademark of Linden Research, Inc. in the United States and/or other countries), Entropia Universe™ (ENTROPIA UNIVERSE is a registered trademark of MindArk PE AB in the United States, other countries, or both), The Sims Online™ (THE SIMS ONLINE is a trademark of Electronic Arts, Inc. in the United States, other countries, or both), and There™ (THERE is a trademark of Makena Technologies, Inc. in the United States, other countries, or both) render and display detailed, large and complex graphic environments within which users may travel and participate as if a character in an expressionistic or fantastical fictional world or within a realistic or representational approximation of real life.
  • VU's are also commonly defined with respect to VU regions, virtual areas of land within the VU typically residing on a single server, with each region amenable to provision and management by a one or more participating providers. The size and complexity and variety of resources found in a VU are related to the number of providers participating and hosting regions through server hosting. And the success of a VU may depend upon attracting users and keeping them engaged and participating in the VU environment, thereby adding value to the providers who bear the cost in providing VU region content and services (and correspondingly expect an appropriate level of multiple-user engagement as a return on their investment), as well as for other users who wish to engage many others in a large virtual community. For example, an informational or service-related region managed by a non-profit organization may desire or expect a given level of VU user engagement and participation, and commercial region providers may desire to engage in a given level of commercial transactions (e.g. sales) or achieve a level of marketing exposure among VU users.
  • VU avatars may exhibit inappropriate and threatening behaviors relative to other users or the VU environment itself. However, prior art protection mechanisms are limited in their efficacy, and in particular with respect to offering proactive protection from hostile actions intentionally directed against a specific avatar by another user's avatar. For example, a user with personal knowledge of another user may use an avatar to deliberately harass or stalk the avatar of the other user. Furthermore, some harassing behavior personally offensive or threatening to a target avatar may in fact be perceived as ambiguous or not objectionable to other users or to VU provider supervisory entities, and thus some harassing activities may actually be permitted by VU provider or supervisory entities, thereby rendering general protection mechanisms provided by some VU providers ineffective or even useless in protecting the targeted avatar. Without effective VU provider protection, VU users whose avatars are subject to objectionable behavior are forced to take actions on their own behalf, actions which may be burdensome and difficult for the user, or may even be proscribed by VU operating agreements or other normative rules (for example, directly responding with harassment, insults, violence in kind, etc.)
  • SUMMARY OF THE INVENTION
  • Methods are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
  • Methods also provide protective services to a virtual universe resident, with a service provider offering protective services for a virtual universe client resident. In response to an acceptance of offered services, service providers implement protection for a virtual universe client resident from a second resident, the protection implementing including preventing the second resident from engaging in a proscribed activity as a function of an association of the proscribed activity with the client resident. Service providers monitor activity of client residents and second residents within the virtual universe for indicia of the proscribed activity, and execute a protective action against the client resident or the second resident in response detecting the indicia.
  • Methods also protect a protected avatar from actions of a second avatar within a virtual universe by producing computer executable program code, storing the code on a computer readable medium, and providing the program code to be deployed and executed on a computer system engaging a virtual universe. The program code causes a computer system to distinguish an activity of the second avatar within the virtual universe as a function of a relation of the distinguished activity to the protected avatar and define a protective action associated with the distinguished activity and executable against the protected avatar or the second avatar. The program code also causes a computer system to monitor activity of the protected avatar or the second avatar within the virtual universe for the distinguished activity, and to execute the protective action against the protected avatar or the second avatar in response to detecting the distinguished activity.
  • Programmable devices are also provided, the devices having processing means; memory in communication with the processing means; and a network interface in communication with the processing means and the memory. The processing means are configured to detect an avatar activity hostile to a protected avatar within a virtual universe and prevent a second avatar from engaging in the hostile activity within the virtual universe as a function of a relation of the hostile activity to the protected avatar. The processing means are further configured to monitor activity of the protected avatar or the second avatar within the virtual universe for the hostile activity and cause a virtual universe computer application to take a protective action against the protected avatar or the second avatar in response to detecting the hostile activity.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
  • FIG. 1 is a flow chart illustrating a process and system for protecting a first avatar from actions of another avatar within a virtual universe.
  • FIG. 2 is a block diagram illustration of protecting a protected avatar from actions of another avatar according to the present invention.
  • FIG. 3 is a block diagram illustration of a virtual universe programmable device configured to protect a first avatar from actions of another avatar within a virtual universe.
  • FIG. 4 is a tabular representation of a policy table for use in protecting an avatar from actions of another avatar within a virtual universe.
  • FIG. 5 is a block diagram illustrating an exemplary computerized implementation of a system and method for protecting a first avatar from actions of another avatar within a virtual universe.
  • The drawings are not necessarily to scale. The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
  • DETAILED DESCRIPTION OF THE INVENTION
  • For convenience purposes, the Detailed Description of the Invention has the following sections:
  • I. General Description; and
  • II. Computerized Implementation.
  • I. General Description
  • Mischief making, spamming, and other threatening behaviors directed toward VU users and their avatars are known, and in some respects becoming more common. VU providers may set policies for providing protections to user avatars that incorporate or codify community standards which specify prohibited certain behaviors, and may condition participation in the VU upon agreeing to specific terms and conditions. Such standards are generally useful in addressing readily-identifiable and generic behaviors defined with respect to all users or the environment itself, such as intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace.
  • Exposure to objectionable behavior may also be limited by designating regions of a virtual universe as “safe” or “unsafe” or by rating them (e.g. “mature,” “PG”, etc.), in some examples with corresponding restrictions on a minimum age needed to enter regions designated as “unsafe” or “mature,” and sometimes also requiring users to agree to hold the VU harmless for offensive conduct and contacts experienced in designated unsafe or mature regions, the user accepting the risk upon entering such a region. VU's may also take steps to ensure that wrong-doers do not hide behind other or multiple avatars, for example requiring identification of the primary user of alternate accounts in the case of a user utilizing additional avatars. Notification mechanisms to enable reporting of violations of community standards and minimum age restrictions may include abuse reporter tools, some of which keep the identity of the reporter confidential. Immediate assistance can also be provided by in-world avatars representing the virtual universe provider.
  • Virtual universe providers may also maintain a public list of abuse incidents including the date, location in the virtual universe, policy violated, nature of the abuse and action taken, some of which do not identify the offending avatar or owner of the user account. Tracked and recognized abuse incidents may include objectionable-object littering, indecency in public areas, assault with scripted objects in designated safe areas, disturbing the peace with repetitive sound spam, verbal abuse by an alternate account avatar and indecencies or obscene images in the publicly accessible avatar profile. Actions taken by virtual universe providers in response to abuse incidents typically involve warnings, suspensions, permanent banning from a virtual universe, and even possible legal action (for example, possible criminal law actions with respect to activities deemed illegal in an appropriate jurisdiction).
  • However, while virtual universe providers generally retain the right to resolve disputes between residents, they generally do not make use of publicly available real-world records related to real-world disputes between two virtual universe users, focusing instead on actions and behavior within the VU. More particularly, prior art policies and mechanisms for restricting the behavior of avatars relative to one another in a virtual universe are not generally responsive to situations arising from or dependent upon prior histories or facts outside the VU environment, such as where users know each other in real life or prior virtual universe participation and may be deliberately harassing or stalking each other, or wherein a casual, unplanned encounter may be problematic due to prior histories, real world facts, etc.
  • Virtual universe providers are also limited in effectively reacting to problem incidents after they occur, and relying generally on threats of banishment to enforce community standards for future actions. Users whose avatars are subject to objectionable behavior and seek to avoid it are also generally required to possess a virtual universe skill set to take protective actions on their own behalf, for example an ability to quickly teleport to a safe location, or block the receipt of text messages from offending avatars. Residents new to a virtual universe may not possess the technical skills needed to minimize offensive behavior before the threat of suspension or banishment is implemented by a virtual universe provider with respect to an offending party. Residents may also be uncomfortable using abuse reporter tools, particularly when they are experiencing the stress associated with harassment. Thus, placing responsibility on a resident to anticipate that an offensive incident is about to take place, to take evasive action, and to report the abuse when under stress, places too much of a burden on the harassed user, discouraging user participation, and particularly by users with low computer skills or those otherwise unfamiliar with the quick pace of immersive environments. Such policies may also discourage parents from enrolling their children as residents because of concerns that designated “safe”/“PG” regions are not really safe. Though some of these problems may be ameliorated by providing immediate assistance by human-operated in-world avatars representing the virtual universe provider, such services are expensive to provide for a VU provider.
  • VU and third party service providers may also offer a variety of services to enhance the experience of a VU user client, including providing travel, recreational or educational services in virtual universes. It would be advantageous for such travel companies to be able to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them in each region served within a VU. Without the ability to offer a safe experience to their clients in a given region such companies may avoid the region or even an entire virtual universe domain in fear of legal exposure from inappropriate behaviors by residents, thereby directly resulting in a loss of revenue opportunities for a virtual universe region, domain or environment provider.
  • Referring now to FIG. 1, a method and process for protecting a first avatar from actions of another avatar within a virtual universe (VU) according to the present invention is provided. At 102 a protection protocol is provided or defined for the first avatar with respect to a second avatar or a person, entity or user represented by the second avatar. At 104 the protection protocol is implemented within the context and framework of the virtual universe domain, the implementing comprising defining at least one rule or proscribed activity with respect to activity of another avatar within the virtual universe domain, and a protective action executable with respect to one or both avatars within the virtual universe domain. At 106 a supervisory entity or application operating within the virtual universe monitors activity of the first avatar and/or the second avatar within the virtual universe domain as provided by or as a function of the protocol implementation. At 108 the monitoring results in a triggering of an application of the implemented protocol in response to or as a function of detecting the first avatar or the second avatar violating the protocol rule, and at 110 the protocol protective action as implemented at 104 is initiated and taken with respect to at least one of the first avatar and the second avatar.
  • In one aspect, the protective protocol may be an agreement, which may be understood to comprehend any document, contract, court order, decree, governmental rule or regulation or any other framework of duties and responsibilities defining an aspect of a relation of a protected avatar to another avatar or to a VU environment in general. Thus, where a protected “Avatar 1” and another avatar of concern, “Avatar 2,” are known to each other and have historically been in conflict, either in real life or within one or more virtual universe domains, protective protocol agreements may exist or be defined to protect Avatar 1 in anticipation of further conflicts.
  • More particularly, situations in real life can spill over into a virtual universe frequented by the same individuals as users through their avatars, and histories including abuse incidents and acrimonious divorce proceedings may present special challenges to virtual universe providers from a business and legal perspective; for example, taking a firm action such as banishing a resident who offends another resident known to him or her results in a direct loss of revenue from the banished resident. False or mistaken reports of virtual universe abuse, for example by a friend or family member of a reputedly harassed VU resident, may also result in unfair banishment of an accused resident from a VU, or regions thereof such as clubs, cultural or recreational regions where the falsely accused resident has developed valuable social or business relationships. Though VU providers and supervisory entities may undertake investigations to verify accusations, such investigations require the expenditure of resources, and sometimes of significant and expensive resources.
  • Accordingly, real-life agreements, such as for example divorce decrees and restraining orders issued by a courts having jurisdiction over avatar users and/or VU or VU services provider may define and impose duties with respect to actions that the respective users may take within a VU through their avatars. According to the present invention, advantages are obtained by implementing such agreements into the VU environment, in one aspect helping VU and VU service providers to identify and avoid potential liabilities, and, in another aspect, to serve in custom configuring a VU environment to meet the unique needs of a given protected avatar (thereby enabling some protected avatar users to participate within a VU without fear, etc., who may otherwise decline to participate).
  • Thus, protective protocol agreements may directly proscribe, or be interpreted to directly proscribe, certain avatar activities hostile to an interest of the protected avatar. They may also impose duties on VU providers to report transgressions or any preventive measures instituted. Virtual universe providers are thus enabled to provide “virtual restraining order” proactive services, in one aspect enabling the development of additional business opportunities associated with providing regions safe for protected parties as defined by such real-world restraining orders. A user may desire to purchase consistent restraint/protective services which will span their residence in multiple virtual universes, and hence may be implemented through differing embodiments depending on each particular virtual universe visited. Thus, it is advantageous to a virtual universe provider or a supervisory entity to provide consistent protection services by configuring appropriate protective mechanisms for each specific visited VU, in some examples including negotiating arrangements with other virtual universe providers to configure and extend such protection to each divergent VU. In one aspect, this provides a sustainable competitive advantage over other VU providers and VU service providers in attracting new residents with a variety of concerns relative to inappropriate behavior in virtual universes.
  • Thus, in some embodiments, a protection protocol agreement may be a real-world restraining order issued by an appropriate governmental entity having a legal jurisdiction over the user of a protected avatar, or over other party/avatar user(s), wherein implementing the restraining order comprises deriving and creating a “virtual restraining order” for implementation within the context of the virtual universe in order to protect the first protected avatar from virtual universe activities of one or more other second avatars in the virtual universe domain of implementation. FIG. 2 provides an illustration of an implemented avatar protection according to the present invention within a virtual universe domain 118. A protection protocol implemented within the context and framework of the virtual universe 118 results in an exclusion zone 122 projected about a protected avatar 120. More particularly, a second potentially-harmful avatar 130, identified by the implemented protection protocol as hostile to the protected avatar 120, is prevented from approaching or otherwise locating spatially close to the protected avatar 120 within the virtual universe 118 within the exclusion zone 122.
  • In some embodiments, the protected avatar 120 seeking protection from the second avatar 130 may also directly initiate or engage the services of a VU provider or another third party services provider, who may offer a protection service that protects the protected avatar 120 from the second avatar 130 in exchange for compensation. In some examples, the protection service or the VU provider may restrict the second avatar 130 from interacting with the protected avatar 120, and the protected avatar 120 may also be (optionally) restricted from interacting with the second avatar 130.
  • A relationship of the protected avatar 120 relative to the second avatar 130 may be used to define the respective avatars and their obligations; for example, the user of the protected avatar 120 may be a child and the user of the second avatar 130 may be an adult who has a history or other behavioral attribute indicating that he or she may pose a threat to children in general. The users of the protected avatar 120 and the second avatar 130 may also be previously known to each other, either in real life or one or more virtual universes, and thus their relative identities as the protected avatar 120 and the second avatar 130 and their respective obligations and restraints with respect to each other defined as a function of their history relative to each other.
  • An implemented protocol may also include a plurality of different triggers and actions, and, in one aspect, these triggers may be configured to recognize and protect an avatar in situations and contexts that, although not violating any general or normative rule within the VU, are nevertheless inappropriate as defined by the protective protocol or its implementation. For example, a parent of a child using the protected avatar 120 concerned with certain inappropriate behavior may desire that the protected avatar 120 be protected from said certain inappropriate behavior by any resident, including preventing such an avatar from coming close to the protected avatar 120. However, it may occur that although the second avatar 130 is evidencing said certain inappropriate behavior, he or she is either not exceeding some objective community standard threshold, or the protected avatar 120 and the second avatar 130 may be presently located in a VU region with a higher permissive threshold than another VU region, and thus a common protective action (e.g. preventing the second avatar 130 from coming close to the protected avatar 120) may not be triggered as it may not be available or indicated by the given facts and general VU region settings. The protective protocol may thus be configured to take alternative actions in response to the inappropriate behavior generally neutral to or not directed against the putatively offending second avatar 130, for example alerting the protected avatar 120 or the parent or other party of the situation with a graphical text message 142. Alternative measures include removing the protected avatar 120 from the region, in some cases by default, or in some cases temporarily and further giving the parent or the protected avatar 120 an opportunity to acknowledge and agree to the protective action or override the removal.
  • Configuring a user's VU environment responsive to both real-life and virtual life conflict provides advantages in enhancing the user's VU experience. In one aspect, a user may not distinguish real-world and virtual universe conflicts, and accordingly, in some embodiments, action triggers may include behaviors defined by real-life restraining orders. Referring again to FIG. 2, in another aspect, behaviors by a third avatar 140 (sometimes otherwise acceptable by a VU normative rule) may also trigger a rule violation or protective action as function of determining that the third avatar 140 is actually acting as a surrogate for the second avatar 130 subject to a restraining order. For example, the third avatar 140 may be hired, coached or controlled by the second avatar 130 to make contacts with the protected avatar 120 forbidden to the second avatar 130, and thus determining an association of the third avatar 140 with the second avatar 130 results in triggering of the protective protocol exclusion zone 122 with respect to the otherwise innocuous third avatar 140.
  • In another aspect of the present invention, a user may be offered an opportunity to purchase enhanced monitoring services, which may be offered to both protected avatars for protection and other avatars to ensure that they are not violating a protective protocol with respect to a protected avatar. For example, a human or automated enhanced avatar monitoring service may be provided by a virtual universe provider or other service provider as an alternative to suspension and banishment of the second avatar 130, in some examples required according to a legal liability or obligation of the virtual universe service provider resulting from a court order. Thus, in some examples, an automated enhanced avatar monitoring service may assign an automated avatar to shadow the second avatar 130 and record all conversations and actions relative to the protected avatar 120.
  • Triggering application of protective measures of a VU-implemented protocol, for example in response to detecting a rule violation at 108 of FIG. 1 as described above, may comprise a variety of trigger mechanisms, illustratively including a proximity threshold violation, for example an unauthorized adult second avatar 130 is detected within a threshold permissible radius of a child protected avatar 120; detecting presence or possession of a specific banned inventory item 126 or class of item 126, for example, the second avatar 130 has a weapon, malicious software, etc. item 126; and detecting a past history of undesirable chats or other text messages, for example parsing a second avatar 130 text communication 132 to determine that Avatar 2 uses offensive language or terms 134 and hence should be proscribed from contact with a child protected avatar 120, or that previous chats between the protected avatar 120 and the second avatar 130 comprise offensive or threatening words or phrases. It will be appreciated that parsing may refer to analyzing input in a specific computer language against the formal grammar of the language, often to validate the input or create an internal representation for use in subsequent processing, as well as to analyzing and describing grammatical structures of a sentence in comprehending the meaning of a sentence or term therein: thus parsing may be understood generally as analyzing text items within text communication for recognizing the presence of trigger terms, phrases, activities and behavioral attributives in order to implement protections according to the present invention.
  • Illustrative but not exhaustive protocol protective actions or restrictions, for example an action taken at 110 of FIG. 1 as described above, include: transporting the protected avatar to a safe region or environment, for example transporting a child protected avatar 120 to a location within the VU beside or within a safe penumbra of a parent's avatar; providing a graphical indication 142 to the protected avatar 120 to illustrate and convey that the second avatar 130 is within a certain proximate distance or radius value; notifying a third party (e.g. a parent) of an implemented protocol rule violation or other trigger; preventing either of the protected avatar 120 or the second avatar 130 from being with a specified distance or radius defined by the exclusion zone 122 of the other of the protected avatar 120 and the second avatar 130.
  • Permission for the second avatar 130 to be in a specified proximity/exclusion zone 122 of the protected avatar 120 may also be conditional upon regional VU designations, for example permitting proximity only in one or more designated places where the second avatar 130 had previously socialized but prohibiting the second avatar 130 from following the protected avatar 120 into a new region, in one aspect presuming that such action would be indicative of stalking the protected avatar 120. Determining an implemented protocol rule violation or other trigger or taking a protocol protective action may also be dependent upon occupation of either the protected avatar 120 or the second avatar 130 within certain defined or rated regions within the VU; for example, location of a child protected avatar 120 within a VU region designated as “child-friendly” may initiate or enable enforcement of one or more rules, triggers or actions defined as a function of the child-friendly region, in some examples resulting in preventing the physical location of an unauthorized adult second avatar 130 near the child protected avatar 120 while the protected avatar 120 is occupying the child-friendly region. It will also be appreciated that methods, systems and processes described above and otherwise herein may also be applicable to avatars representing or being operated by artificial entities, for example including robot servants and automated pets, as well as human user-operated avatars.
  • Protective actions and restrictions may include warning the second avatar 130 that a real-life restraining order from a court is known and recognized by the virtual universe provider, and informing the second avatar 130 through a graphic warning 144 that the VU provider is thereby required by law to report any inappropriate behavior by the second avatar 130 towards the protected avatar 120 to an appropriate authority.
  • Implemented protocol administration may also be a function of time. For example, in one embodiment if a restricted second avatar's 130 behavior is determined to fall within appropriate or permitted guidelines for a specified elapsed period of time relative to the protected avatar 120, then certain restrictions on the second avatar 130 under the protocol may be relaxed, for example enabling the second avatar 130 to teleport to new regions occupied by the protected avatar 120 without presuming said teleporting constituted an indication of stalking behavior, or even allowing the second avatar 130 to approach within the exclusion zone 122.
  • Some embodiments may be configured to serve VU travel companies which provide travel, recreational or educational services in virtual universes and wish to guarantee that their clients will be free from harassment, indecency or other objectionable behaviors from resident avatars unknown to them. In some embodiments, a VU travel or protection services provider may negotiate with one or more virtual universe providers, domains or regions to agree upon the identification of certain objectionable behaviors that are to be proactively prevented or minimized from occurring when clients of the travel or protection services provider visit. The negotiated behaviors or a subset thereof may also be designated to apply to clients of the travel or protection services provider during their VU participation. In one aspect, some clients may develop friendships and other interpersonal relationships and histories with other avatars (including other clients) during their VU visits, and thus it may be in the interest of the provider to monitor their clients for inappropriate behavior as well.
  • In some embodiments, specific examples and/or levels of proscribed behaviors may be provided, for example further defining levels of behaviors associated with intolerance, harassment, assault, violating the privacy of conversations, indecency and disturbing the peace. Thus, harassment may be defined as provocative text chat of a sexual or violent nature; assault may be defined as repeatedly bumping another avatar, or targeting another avatar with a scripted object; violating the privacy of conversations may be defined as monitoring private text chats through a “private eye” or surrogate avatar or other method; indecency may include bringing a sexually suggestive object out of inventory in public or in view of another avatar; disturbing the peace may include repeatedly generating a sound, for example a sound spam or a repetitive sound having a certain minimum decibel level.
  • Protective actions may include immediately teleporting one or more avatars against which objectionable behavior is directed (for example, an entire tour group) to a safe area, in some embodiments if the objectionable behavior cannot be proactively prevented. An abuse report may also be filed with a virtual universe or region provider, in some embodiments on behalf of a VU travel or protective services company. An offended avatar may also be offered an opportunity to be shadowed by an enhanced monitoring avatar, in some examples at the expense of the VU travel or protective services company already providing protection services to the offended avatar. Moreover, in some embodiments, a VU travel or protective services company may offer to negotiate protective services on behalf of a user, wherein the protections negotiated may be incorporated directly into an agreement between the individual user or resident seeking protection and the virtual universe provider.
  • Advantages are provided by creating additional revenue generating opportunities and options for virtual universe providers and VU region providers, wherein said providers may offer additional enhanced resident behavior managing services for increased consideration. Virtual universe providers are also enabled to attract and serve users from populations at risk (for example, children, the elderly, persons who have been the victims of abuse, etc.) who need a higher standard of care than the general client or customer population. Virtual universe providers may also attract business from other companies providing travel, recreational and educational services and who are concerned about possible inappropriate behavior by residents of regions visited, which may be directed towards the tour groups, in one aspect reducing exposures to legal liability or risk of business loss associated with client harassment.
  • Avatar tracking data may be monitored at different levels of granularity. For example, positional information may be generated every minute or every time a user teleports, flies, or moves a specified threshold distance value. Information may also be generated every time an item is put into an avatar's inventory. In one implementation, a daemon process may regularly poll a monitored/supervised avatar for current location information and store this information for subsequent transmittal to a supervisory entity or third party.
  • In some embodiments, a VU provider or protection service may maintain one or more databases comprising identifiers for user avatars, a desired nature of protection, and the desired alerts to trigger such protection. Thus, referring again to FIG. 2, in one example a first database record with respect to the protected avatar 120 associates a generally circular exclusion zone 122 defined by a 30 foot proximity radius with respect to the second avatar 130, wherein violation of the 30-foot radius by the second avatar 130 triggers a protective action of teleporting the protected avatar 120 to a safe room or to a parent; and a second database record with respect to the protected avatar 120 associates an inventory item 128 restriction with respect to the third avatar 140, wherein violation of inventory item restriction by the third avatar 140 triggers a protective action of physically preventing the third avatar 140 from getting close to the protected avatar 120.
  • Protective measures may be implemented in a variety of ways. For example, if the second avatar 130 attempts to approach the protected avatar 120 within a minimum specified threshold distance value, VU client motion controls of the user of the second avatar 130 may be prevented from achieving movement of the second avatar 130 in a direction that would violate the minimum specified threshold distance value or exclusion zone 122. Moreover, according to the present invention virtual universe providers are also enabled to provide a greater variety of user-appropriate and safe regions through a greater granularity of control over resident behaviors, for example enabling multiple definitions of “PG” and “adult” regions as functions of divergent user needs and objectives, as well as offering flexibility in constraining undesirable behavior through offering a plurality of different enhanced monitoring services in lieu of banishment. This may not only avoid loss of subscription fees by a banished user or resident, but offer an opportunity to receive additional service charges in exchange for enhancing monitoring of a trouble-maker avatar.
  • FIG. 3 illustrates a logic machine 200 configured to implement protection methods and mechanisms to protect a VU avatar from the actions of other avatars within a virtual universe domain. The logic machine 200 comprises a Protective Protocol (P.P.) implementer component 202 configured to convert, translate or otherwise define protocol aspects into rules, procedures and/or actions in a form implementable within the operating environment of the virtual universe. An activity monitoring component 204 is configured to observe the activity of one or more avatars identified by or otherwise relevant to the protocol as implemented to detect any activity by the other avatars that may trigger a protective action for the benefit of the protected first avatar. An action component 206 is configured to implement a protective action, including a protective action defined and implemented with respect to the protective protocol.
  • FIG. 4 illustrates a policy table implementation example for use in triggering and effecting one or more protective actions as a function of VU region ratings and offending avatar behavior characteristics, in one embodiment implemented with respect to protecting members of a protective services entity client group. Triggering determinations are made as function of the region rating, and one or more protective actions suitable to the regional rating and optionally a history of the protected avatar/group or the offending avatar are selected from a plurality of options provided by the policy table.
  • In the present example illustrated in FIG. 4, an avatar exhibiting an objectionable adult-oriented behavior in a “G” rated region (one suitable for all ages of users) triggers protective actions suitable for a group for which G-rated region protection protocols are implemented. A first offense for an offending avatar with no other indications of inappropriate behavior may warrant only a warning to the offending avatar; a second offense or other history indicating prior actions inappropriate to a G-rated region may result in a notice and teleportation of the offending avatar out of the G-rated region to a non-G rated region; and a third offense or a significant history of prior actions inappropriate to other region ratings as well (such as PG or adult rated) may result in a suspension or regional access rights (e.g. of G-rated region access) teleportation to a purgatory or other restricted-rights region, or banishment of the offending avatar from all G-rated areas or other regions or the entire VU. An offending object may also be confiscated, with the determination a function of a nature or identity of the item (e.g. not confiscate an adult-oriented object, but confiscate a contraband item) as well as the history of the avatar (warn the first time, confiscate for repeated offenses). Moreover, if a plurality of offending avatars is located proximate to a protected group, then the entire protected group may also be teleported to another G-rated region, in one aspect to minimize the risk of additional offending behavior incidents potentially arising through proximity to a plurality of avatars with a prior history of offending behavior.
  • Protective actions may also include fee-generating options for the protective services or VU provider. This may include offering the protected group or the offending avatar fee-based enhanced monitoring services, in one aspect to enhance the protections offered to the protected group or to give notice to the offending avatar when his future actions may have the potential of incurring additional fees for monitoring services or negative history data. Fees for enhanced monitoring services required for further engagement in a given region or region category may be variable, including with services and fee rates determined as function of the region rating: thus PG-rated region permission may require enhanced monitoring of one or more behaviors different from those monitored for adult-rated regions, but may be included within a larger set of behaviors monitored for G-rated region permissions. In some examples, virtual universe providers may include in their agreement terms and conditions that previous cited behaviors in certain designated categories will result in specified actions (for example, an automatic temporary restriction on mobility, a restriction in the use of text chat, a restriction in the ability to display items from inventory, etc.) unless fee-based enhanced monitoring services are engaged for the offending avatar.
  • Triggers may vary by region. For example, proximity to a plurality of VU residents who have previously been cited in abuse reports for violent or offensive remarks or behaviors may result in an automatic teleport of an entire protected group to another safe region of comparable rating (for example, a G-rated region for a group rated for a G-rated region, or a G or PG rated region for a group rated for a PG-rated region). Other examples of region, incident and avatar-specific triggers and protective action selection are also provided by tabular illustration of FIG. 4. One skilled in the art will recognize that further parameters and selection criteria may be implemented, as wells as through other policy table configurations; FIG. 4 is only illustrative of one embodiment, and policy tables according to the present invention are not limited to the example provided by FIG. 4.
  • II. Computerized Implementation
  • The present invention may be implemented using conventional software tools and methods applicable to virtual universes, for example within a stand-alone VU application, or as a plug-in to an existing VU application. The system and mechanisms described could be implemented in a hosting system or grid for a virtual universe or in client software for the virtual universe installed on a user's personal computer or other programmable device. Referring now to FIG. 5, an exemplary computerized implementation includes a computer system 304 deployed within a computer infrastructure 308 such as a computer or a programmable device such as a personal digital assistant (PDA) or cellular phone. This is intended to demonstrate, among other things, that the present invention could be implemented within a network environment 340 (e.g., the Internet, a wide area network (WAN), a local area network (LAN), a virtual private network (VPN), etc.) in communication with one or more additional computers 336, or on a stand-alone computer infrastructure 308. In the case of the former, communication throughout the network 340 can occur via any combination of various types of communication links. For example, the communication links can comprise addressable connections that may utilize any combination of wired and/or wireless transmission methods. Where communications occur via the Internet, connectivity could be provided by conventional TCP/IP sockets-based protocol, and an Internet service provider could be used to establish connectivity to the Internet.
  • As shown, the computer system 304 includes a central processing unit (CPU) 312, a memory 316, a bus 320, and input/output (I/O) interfaces 324. Further, the computer system 304 is shown in communication with external I/O devices/resources 328 and storage system 332. In general, the processing unit 312 executes computer program code, such as the code to implement various components of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, including the Protective Protocol implementer 202, the activity monitoring component 204 and the action engine 206, which are stored in memory 316 and/or storage system 332. It is to be appreciated that two or more, including all, of the components may be implemented as a single component.
  • While executing computer program code, the processing unit 312 can read and/or write data to/from the memory 316, the storage system 332, and/or the I/O interfaces 324. The bus 320 provides a communication link between each of the components in computer system 304. The external devices 328 can comprise any devices (e.g., keyboard, pointing device, display, etc.) that enable a user to interact with computer system 304 and/or any devices (e.g., network card, modem, etc.) that enable computer system 304 to communicate with one or more other computing devices.
  • The computer infrastructure 308 is only illustrative of various types of computer infrastructures for implementing the invention. For example, in one embodiment, computer infrastructure 308 comprises two or more computing devices (e.g., a server cluster) that communicate over a network to perform the various process steps of the invention. Moreover, computer system 304 is only representative of various possible computer systems that can include numerous combinations of hardware. To this extent, in other embodiments, the computer system 304 can comprise any specific purpose-computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general-purpose hardware/software, or the like. In each case, the program code and hardware can be created using standard programming and engineering techniques, respectively. Moreover, the processing unit 312 may comprise a single processing unit, or be distributed across one or more processing units in one or more locations, e.g., on a client and server. Similarly, the memory 316 and/or the storage system 332 can comprise any combination of various types of data storage and/or transmission media that reside at one or more physical locations.
  • Further, I/O interfaces 324 can comprise any system for exchanging information with one or more of the external device 328. Still further, it is understood that one or more additional components (e.g., system software, math co-processing unit, etc.) not shown in FIG. 5 can be included in computer system 304. Moreover, if computer system 304 comprises a handheld device or the like, it is understood that one or more of the external devices 328 (e.g., a display) and/or the storage system 332 could be contained within computer system 304, not externally as shown.
  • The storage system 332 can be any type of system (e.g., a database) capable of providing storage for information under the present invention. To this extent, the storage system 332 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive. In another embodiment, the storage system 332 includes data distributed across, for example, a local area network (LAN), wide area network (WAN) or a storage area network (SAN) (not shown). In addition, although not shown, additional components, such as cache memory, communication systems, system software, etc., may be incorporated into computer system 304.
  • While shown and described herein as a method and a system, it is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a computer-readable/useable medium that includes computer program code to enable a computer infrastructure to practice the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein. To this extent, the computer-readable/useable medium includes program code that implements each of the various process steps of the invention.
  • It is understood that the terms “computer-readable medium” or “computer-useable medium” comprise one or more of any type of physical embodiment of the program code. In particular, the computer-readable/useable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as the memory 316 and/or the storage system 332 (e.g., a fixed disk, a read-only memory, a random access memory, a cache memory, etc.).
  • Still yet, computer infrastructure 308 is intended to demonstrate that some or all of the components of implementation could be deployed, managed, serviced, etc. by a service provider who offers to implement, deploy, and/or perform the functions of the present invention, including the methods, processes and devices/systems illustrated in the Figures and described herein, for example by licensing methods and browser or application server technology according to the present invention to an internet service providers (ISP) or cellular telephone provider. In one embodiment, the invention may comprise a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis. Thus, a service provider can create, maintain, support, etc., a computer infrastructure, such as the computer infrastructure 308 that performs the process steps of the invention, and in return the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
  • As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions intended to cause a computing device having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form. To this extent, program code can be embodied as one or more of: an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.
  • The foregoing description of various aspects of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible. Such modifications and variations that may be apparent to a person skilled in the art are intended to be included within the scope of the invention as defined by the accompanying claims.

Claims (22)

What is claimed is:
1. A method for protecting a protected avatar from actions of a second avatar within a virtual universe, comprising:
implementing by a processing unit protection for a protected avatar from a second avatar within a virtual universe;
the implementing protection comprising:
identifying a banned virtual universe item;
identifying by the processing unit an activity of the second avatar, wherein the identified activity comprises:
the second avatar adding the banned virtual universe item to an inventory of the second avatar; or
the second avatar presenting the banned virtual universe item to the protected avatar;
disqualifying by the processing unit the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar;
defining by the processing unit a protective action associated with the identified activity and executable against the protected avatar or the second avatar;
monitoring by the processing unit activity of the protected avatar or the second avatar within the virtual universe for an occurrence of the identified activity; and
executing by the processing unit the protective action against at least one of the protected avatar and the second avatar in response to the monitoring detecting the occurrence of the identified activity.
2. The method of claim 1, wherein the identified activity is otherwise permissible by a virtual universe provider normative rule.
3. The method of claim 2, wherein the detecting the occurrence of the identified activity is a function of a rating of a region occupied by at least one of: the protected avatar and the second avatar.
4. The method of claim 3, wherein the detecting the occurrence of the identified activity is further a function of second avatar historical behavior data.
5. The method of claim 1, further comprising:
providing an agreement defining a duty of a user associated with the second avatar to a user associated with the protected avatar; and
wherein implementing comprises:
identifying the activity of the second avatar as a function of a behavior term of the agreement; and
disqualifying the second avatar from engaging in the identified activity as a function of interpreting the duty.
6. The method of claim 5, wherein:
the agreement is a restraining order issued by a court of law having jurisdiction over the protected avatar user and the second avatar user;
the implementing the restraining order comprising deriving a threshold graphical user interface avatar proximate distance as a function of a separation distance specified by the restraining order; and
the identified activity comprising the protected avatar and the second avatar locating within a graphical user interface display proximate to each other by less than the threshold avatar proximate distance.
7. The method of claim 1, wherein the protected avatar is a protected group of avatars, each of the protected group of avatars having a common indicia determining an application of the defined duty to the each avatar of the protected group.
8. The method of claim 1, further comprising:
integrating computer-readable program code into a computer system comprising the processing unit, a computer readable memory and a computer-readable tangible storage medium, wherein the computer-readable program code is embodied on the computer readable tangible storage medium and comprises instructions that, when executed by the processing unit via the computer readable memory, cause the processing unit to implement the protection for the protected avatar from the second avatar within the virtual universe by the steps of;
identifying the banned virtual universe item;
identifying the activity of the second avatar that comprises the second avatar adding the banned virtual universe item to the second avatar inventory or the second avatar presenting the banned virtual universe item to the protected avatar;
disqualifying the second avatar from engaging in the identified activity within the virtual universe as the function of the relation of the identified activity to the protected avatar;
defining the protective action associated with the identified activity and executable against the protected avatar or the second avatar;
monitoring the activity of the protected avatar or the second avatar within the virtual universe for the occurrence of the identified activity; and
executing the protective action against at least one of the protected avatar and the second avatar in response to the monitoring detecting the occurrence of the identified activity.
9. The method of claim 1, wherein executing the protective action comprises at least one of:
transporting the protected avatar or the second avatar to another region within the virtual universe;
providing a warning to the protected avatar of a location of the second avatar relative to the first avatar within the virtual universe; and
preventing a proximity of the protected avatar to the second avatar within a graphical user interface display less than a protective distance threshold.
10. The method of claim 9, wherein taking the protective action further comprises:
offering the second avatar enrollment in a virtual universe provider enhanced monitoring program; and
suspending participation in the virtual universe by the second avatar if the second avatar fails to enroll in the offered enhanced monitoring program.
11. The method of claim 10, wherein executing the protective action further comprises at least one of:
teleporting the second avatar to a restricted-rights region; and
determining and charging a variable fee amount for enrollment in the offered enhanced monitoring program as a function of second avatar historical behavior data.
12. A method for providing protective services to a virtual universe resident, compromising:
a service provider offering protective services for a virtual universe client resident;
in response to an acceptance of the offered services, the service provider implementing protection for the virtual universe client resident from a second resident within a virtual universe; and
the service provider protection implementing comprising identifying a banned virtual universe item and preventing the second resident from engaging in a proscribed activity as a function of an association of the proscribed activity with the client resident, by:
the service provider monitoring activity of at least one of the client resident and the second resident within the virtual universe for indicia of the proscribed activity; and
the service provider executing a protective action against at least one of the client resident and the second resident in response to the monitoring detecting the indicia; wherein the proscribed activity comprises:
the second avatar adding the banned virtual universe item to an inventory of the second avatar; or
the second avatar presenting the banned virtual universe item to an avatar of the client resident.
13. The method of claim 12, further comprising:
the service provider receiving an agreement defining a duty of the second resident with respect to the client resident; and
the service provider identifying the proscribed activity by parsing the agreement and interpreting the duty.
14. The method of claim 12, wherein the client resident is a group of client residents, and wherein the service provider executing the protective action comprises protecting the group by teleporting the group to a region of the virtual universe unoccupied by the second resident.
15. The method of claim 12, wherein the service provider executing the protective action comprises selecting at least one of:
requiring the second resident to enroll in an enhanced monitoring program; and
restraining activities of the second resident within the virtual universe;
wherein the selecting is a function of a rating of a region occupied by the client resident and second resident historical behavior data.
16. An article of manufacture, comprising:
a computer readable tangible storage device having computer-readable program code embodied therewith, the computer-readable program code comprising instructions that, when executed by a computer processing unit, cause a computer system processing unit to:
identify a banned virtual universe item;
distinguish an activity of the second avatar within the virtual universe as a function of a relation of the distinguished activity to the protected avatar;
define a protective action associated with the distinguished activity and executable against the protected avatar or the second avatar;
monitor activity of at least one of the protected avatar and the second avatar within the virtual universe for the distinguished activity; and
execute the protective action against at least one of the protected avatar and the second avatar in response to the monitoring detecting the distinguished activity;
wherein the distinguished activity comprises:
the second avatar adding the banned virtual universe item to an inventory of the second avatar; or
the second avatar presenting the banned virtual universe item to the protected avatar.
17. The method of claim 16, the program code comprising instructions which, when executed on the computer system, causes the computer system to:
specify a threshold graphical user interface avatar proximate distance; and execute the protective action by preventing the protected avatar and the second avatar from co-locating within a graphical user interface display proximate to each other by less than the threshold avatar proximate distance.
18. The article of manufacture of claim 16, the program code comprising instructions which, when executed on the computer system processing unit, causes the computer system processing unit to execute the protective action as a function of a rating of a region occupied by the protected avatar and second avatar historical behavior data.
19. The article of manufacture of claim 16, the program code comprising instructions which, when executed on the computer system processing unit, causes the computer system processing unit to execute the protective action by:
transporting the protected avatar or the second avatar to another region within the virtual universe; or
providing a warning to the protected avatar of a location of the second avatar relative to the first avatar within the virtual universe.
20. A programmable device comprising:
a processing unit;
a memory in communication with the processing unit;
a tangible computer-readable storage device in communication with the processing unit; and
a network interface in communication with the processing unit;
wherein the processing unit, when executing program instructions stored on the computer-readable storage device via the computer readable memory:
identifies a banned virtual universe item;
detects an avatar activity hostile to a protected avatar within a virtual universe, wherein the hostile activity comprises:
a second avatar adding the banned virtual universe item to an inventory of the second avatar; or
the second avatar presenting the banned virtual universe item to the protected avatar;
prevents the second avatar from engaging in the hostile activity within the virtual universe as a function of a relation of the hostile activity to the protected avatar;
monitors activity of the protected avatar or the second avatar within the virtual universe for the hostile activity; and
cause a virtual universe computer application to take a protective action against at least one of the protected avatar and the second avatar in response to the monitoring detecting the hostile activity.
21. The programmable device of claim 20, wherein the processing means is further configured to cause the virtual universe computer application to prevent the protected avatar and the second avatar from locating within a graphical user interface display proximate to each other by less than a threshold avatar proximate distance.
22. The programmable device of claim 20, wherein the processing unit further causes the virtual universe computer application to take the protective action by:
transporting the protected avatar or the second avatar to another region within the virtual universe; or
providing a warning to the protected avatar of a location of the second avatar relative to the protected avatar within the virtual universe.
US14/480,040 2008-09-26 2014-09-08 Avatar protection within a virtual universe Abandoned US20150126276A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/480,040 US20150126276A1 (en) 2008-09-26 2014-09-08 Avatar protection within a virtual universe

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/238,541 US8241131B2 (en) 2008-09-26 2008-09-26 Avatar protection within a virtual universe
US13/540,748 US8827816B2 (en) 2008-09-26 2012-07-03 Avatar protection within a virtual universe
US14/480,040 US20150126276A1 (en) 2008-09-26 2014-09-08 Avatar protection within a virtual universe

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/540,748 Continuation US8827816B2 (en) 2008-09-26 2012-07-03 Avatar protection within a virtual universe

Publications (1)

Publication Number Publication Date
US20150126276A1 true US20150126276A1 (en) 2015-05-07

Family

ID=42058052

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/238,541 Expired - Fee Related US8241131B2 (en) 2008-09-26 2008-09-26 Avatar protection within a virtual universe
US13/540,748 Active 2029-03-29 US8827816B2 (en) 2008-09-26 2012-07-03 Avatar protection within a virtual universe
US14/480,040 Abandoned US20150126276A1 (en) 2008-09-26 2014-09-08 Avatar protection within a virtual universe

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/238,541 Expired - Fee Related US8241131B2 (en) 2008-09-26 2008-09-26 Avatar protection within a virtual universe
US13/540,748 Active 2029-03-29 US8827816B2 (en) 2008-09-26 2012-07-03 Avatar protection within a virtual universe

Country Status (1)

Country Link
US (3) US8241131B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130296045A1 (en) * 2012-05-04 2013-11-07 Alec Dun Cross-realm zones for interactive gameplay
US20220212101A1 (en) * 2020-03-13 2022-07-07 Google Llc Peer-to-peer multiplayer cloud gaming architecture

Families Citing this family (94)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5181180B2 (en) * 2007-11-22 2013-04-10 インターナショナル・ビジネス・マシーンズ・コーポレーション Transaction method, program and server system in three-dimensional virtual space
US8127235B2 (en) 2007-11-30 2012-02-28 International Business Machines Corporation Automatic increasing of capacity of a virtual space in a virtual world
US20090164919A1 (en) 2007-12-24 2009-06-25 Cary Lee Bates Generating data for managing encounters in a virtual world environment
JP5159375B2 (en) 2008-03-07 2013-03-06 インターナショナル・ビジネス・マシーンズ・コーポレーション Object authenticity determination system and method in metaverse, and computer program thereof
US8914854B2 (en) * 2008-09-11 2014-12-16 International Business Machines Corporation User credential verification indication in a virtual universe
US8241131B2 (en) * 2008-09-26 2012-08-14 International Business Machines Corporation Avatar protection within a virtual universe
US9056248B2 (en) 2008-12-02 2015-06-16 International Business Machines Corporation System and method for detecting inappropriate content in virtual worlds
US9300612B2 (en) * 2009-01-15 2016-03-29 International Business Machines Corporation Managing interactions in a virtual world environment
US8245283B2 (en) * 2009-03-03 2012-08-14 International Business Machines Corporation Region access authorization in a virtual environment
US20100295847A1 (en) * 2009-05-21 2010-11-25 Microsoft Corporation Differential model analysis within a virtual world
US8972476B2 (en) * 2009-06-23 2015-03-03 Microsoft Technology Licensing, Llc Evidence-based virtual world visualization
US9393488B2 (en) * 2009-09-03 2016-07-19 International Business Machines Corporation Dynamically depicting interactions in a virtual world based on varied user rights
US8347217B2 (en) * 2009-12-02 2013-01-01 International Business Machines Corporation Customized rule application as function of avatar data
US8484158B2 (en) 2010-02-01 2013-07-09 International Business Machines Corporation Managing information about avatars across virtual worlds
US9205328B2 (en) 2010-02-18 2015-12-08 Activision Publishing, Inc. Videogame system and method that enables characters to earn virtual fans by completing secondary objectives
US9682324B2 (en) 2010-05-12 2017-06-20 Activision Publishing, Inc. System and method for enabling players to participate in asynchronous, competitive challenges
US9245177B2 (en) * 2010-06-02 2016-01-26 Microsoft Technology Licensing, Llc Limiting avatar gesture display
WO2013096489A1 (en) * 2011-12-20 2013-06-27 Icelero Inc Method and system for creating a virtual social and gaming experience
US10137376B2 (en) 2012-12-31 2018-11-27 Activision Publishing, Inc. System and method for creating and streaming augmented game sessions
US9244588B2 (en) * 2013-03-15 2016-01-26 Disney Enterprises, Inc. Facilitating group activities in a virtual environment
US9766773B2 (en) * 2013-07-31 2017-09-19 Disney Enterprises, Inc. Dynamic player activity environment response
US10376792B2 (en) 2014-07-03 2019-08-13 Activision Publishing, Inc. Group composition matchmaking system and method for multiplayer video games
US11351466B2 (en) 2014-12-05 2022-06-07 Activision Publishing, Ing. System and method for customizing a replay of one or more game events in a video game
US10118099B2 (en) 2014-12-16 2018-11-06 Activision Publishing, Inc. System and method for transparently styling non-player characters in a multiplayer video game
US10286314B2 (en) 2015-05-14 2019-05-14 Activision Publishing, Inc. System and method for providing continuous gameplay in a multiplayer video game through an unbounded gameplay session
US10315113B2 (en) 2015-05-14 2019-06-11 Activision Publishing, Inc. System and method for simulating gameplay of nonplayer characters distributed across networked end user devices
US10486068B2 (en) 2015-05-14 2019-11-26 Activision Publishing, Inc. System and method for providing dynamically variable maps in a video game
US10213682B2 (en) 2015-06-15 2019-02-26 Activision Publishing, Inc. System and method for uniquely identifying physical trading cards and incorporating trading card game items in a video game
US10471348B2 (en) 2015-07-24 2019-11-12 Activision Publishing, Inc. System and method for creating and sharing customized video game weapon configurations in multiplayer video games via one or more social networks
US10099140B2 (en) 2015-10-08 2018-10-16 Activision Publishing, Inc. System and method for generating personalized messaging campaigns for video game players
US11185784B2 (en) 2015-10-08 2021-11-30 Activision Publishing, Inc. System and method for generating personalized messaging campaigns for video game players
US10376781B2 (en) 2015-10-21 2019-08-13 Activision Publishing, Inc. System and method of generating and distributing video game streams
US10232272B2 (en) 2015-10-21 2019-03-19 Activision Publishing, Inc. System and method for replaying video game streams
US10245509B2 (en) 2015-10-21 2019-04-02 Activision Publishing, Inc. System and method of inferring user interest in different aspects of video game streams
US10694352B2 (en) 2015-10-28 2020-06-23 Activision Publishing, Inc. System and method of using physical objects to control software access
US10226703B2 (en) 2016-04-01 2019-03-12 Activision Publishing, Inc. System and method of generating and providing interactive annotation items based on triggering events in a video game
US10226701B2 (en) 2016-04-29 2019-03-12 Activision Publishing, Inc. System and method for identifying spawn locations in a video game
US10722800B2 (en) * 2016-05-16 2020-07-28 Google Llc Co-presence handling in virtual reality
US10179289B2 (en) 2016-06-21 2019-01-15 Activision Publishing, Inc. System and method for reading graphically-encoded identifiers from physical trading cards through image-based template matching
US10573065B2 (en) 2016-07-29 2020-02-25 Activision Publishing, Inc. Systems and methods for automating the personalization of blendshape rigs based on performance capture data
CN106569605B (en) * 2016-11-03 2019-06-18 腾讯科技(深圳)有限公司 Control method and device based on virtual reality
US10463964B2 (en) 2016-11-17 2019-11-05 Activision Publishing, Inc. Systems and methods for the real-time generation of in-game, locally accessible heatmaps
US10709981B2 (en) 2016-11-17 2020-07-14 Activision Publishing, Inc. Systems and methods for the real-time generation of in-game, locally accessible barrier-aware heatmaps
US10500498B2 (en) 2016-11-29 2019-12-10 Activision Publishing, Inc. System and method for optimizing virtual games
US10055880B2 (en) 2016-12-06 2018-08-21 Activision Publishing, Inc. Methods and systems to modify a two dimensional facial image to increase dimensional depth and generate a facial image that appears three dimensional
US10861079B2 (en) 2017-02-23 2020-12-08 Activision Publishing, Inc. Flexible online pre-ordering system for media
GB2572525A (en) * 2017-06-01 2019-10-09 Spirit Al Ltd Online user monitoring
US10818060B2 (en) 2017-09-05 2020-10-27 Activision Publishing, Inc. Systems and methods for guiding motion capture actors using a motion reference system
US10974150B2 (en) 2017-09-27 2021-04-13 Activision Publishing, Inc. Methods and systems for improved content customization in multiplayer gaming environments
US10561945B2 (en) 2017-09-27 2020-02-18 Activision Publishing, Inc. Methods and systems for incentivizing team cooperation in multiplayer gaming environments
US11040286B2 (en) 2017-09-27 2021-06-22 Activision Publishing, Inc. Methods and systems for improved content generation in multiplayer gaming environments
US10537809B2 (en) 2017-12-06 2020-01-21 Activision Publishing, Inc. System and method for validating video gaming data
US10463971B2 (en) 2017-12-06 2019-11-05 Activision Publishing, Inc. System and method for validating video gaming data
US10981051B2 (en) 2017-12-19 2021-04-20 Activision Publishing, Inc. Synchronized, fully programmable game controllers
US10864443B2 (en) 2017-12-22 2020-12-15 Activision Publishing, Inc. Video game content aggregation, normalization, and publication systems and methods
US11278813B2 (en) 2017-12-22 2022-03-22 Activision Publishing, Inc. Systems and methods for enabling audience participation in bonus game play sessions
US10596471B2 (en) 2017-12-22 2020-03-24 Activision Publishing, Inc. Systems and methods for enabling audience participation in multi-player video game play sessions
US10924566B2 (en) 2018-05-18 2021-02-16 High Fidelity, Inc. Use of corroboration to generate reputation scores within virtual reality environments
US20190354189A1 (en) * 2018-05-18 2019-11-21 High Fidelity, Inc. Use of gestures to generate reputation scores within virtual reality environments
CN112955850B (en) * 2018-09-20 2024-07-19 苹果公司 Method and apparatus for attenuating joint user interactions in a Simulated Reality (SR) space
US11192028B2 (en) 2018-11-19 2021-12-07 Activision Publishing, Inc. Systems and methods for the real-time customization of video game content based on player data
US11263670B2 (en) 2018-11-19 2022-03-01 Activision Publishing, Inc. Systems and methods for dynamically modifying video game content based on non-video gaming content being concurrently experienced by a user
US11115712B2 (en) 2018-12-15 2021-09-07 Activision Publishing, Inc. Systems and methods for indexing, searching for, and retrieving digital media
US11679330B2 (en) 2018-12-18 2023-06-20 Activision Publishing, Inc. Systems and methods for generating improved non-player characters
US11305191B2 (en) 2018-12-20 2022-04-19 Activision Publishing, Inc. Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay
JP7395172B2 (en) * 2019-06-07 2023-12-11 株式会社アルファコード Incentive grant system, incentive grant device, incentive grant method, and incentive management program in virtual reality space
US11344808B2 (en) 2019-06-28 2022-05-31 Activision Publishing, Inc. Systems and methods for dynamically generating and modulating music based on gaming events, player profiles and/or player reactions
US11097193B2 (en) 2019-09-11 2021-08-24 Activision Publishing, Inc. Methods and systems for increasing player engagement in multiplayer gaming environments
US11423605B2 (en) 2019-11-01 2022-08-23 Activision Publishing, Inc. Systems and methods for remastering a game space while maintaining the underlying game simulation
US11712627B2 (en) 2019-11-08 2023-08-01 Activision Publishing, Inc. System and method for providing conditional access to virtual gaming items
US11537209B2 (en) 2019-12-17 2022-12-27 Activision Publishing, Inc. Systems and methods for guiding actors using a motion capture reference system
US11420122B2 (en) 2019-12-23 2022-08-23 Activision Publishing, Inc. Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay
US11563774B2 (en) 2019-12-27 2023-01-24 Activision Publishing, Inc. Systems and methods for tracking and identifying phishing website authors
JP6840876B1 (en) * 2020-01-30 2021-03-10 株式会社ドワンゴ Avatar display device, avatar display system, avatar display method and avatar display program
US12014455B2 (en) * 2020-05-06 2024-06-18 Magic Leap, Inc. Audiovisual presence transitions in a collaborative reality environment
US11400378B2 (en) * 2020-06-30 2022-08-02 Sony Interactive Entertainment LLC Automatic separation of abusive players from game interactions
US11524234B2 (en) 2020-08-18 2022-12-13 Activision Publishing, Inc. Multiplayer video games with virtual characters having dynamically modified fields of view
US11351459B2 (en) 2020-08-18 2022-06-07 Activision Publishing, Inc. Multiplayer video games with virtual characters having dynamically generated attribute profiles unconstrained by predefined discrete values
US11833423B2 (en) 2020-09-29 2023-12-05 Activision Publishing, Inc. Methods and systems for generating level of detail visual assets in a video game
US11724188B2 (en) 2020-09-29 2023-08-15 Activision Publishing, Inc. Methods and systems for selecting a level of detail visual asset during the execution of a video game
US11717753B2 (en) 2020-09-29 2023-08-08 Activision Publishing, Inc. Methods and systems for generating modified level of detail visual assets in a video game
US11458404B2 (en) * 2020-10-09 2022-10-04 Sony Interactive Entertainment LLC Systems and methods for verifying activity associated with a play of a game
US11439904B2 (en) 2020-11-11 2022-09-13 Activision Publishing, Inc. Systems and methods for imparting dynamic and realistic movement to player-controlled avatars in video games
US12097438B2 (en) * 2020-12-11 2024-09-24 Guardiangamer, Inc. Monitored online experience systems and methods
US12097430B2 (en) 2020-12-28 2024-09-24 Activision Publishing, Inc. Methods and systems for generating and managing active objects in video games
US11853439B2 (en) 2020-12-30 2023-12-26 Activision Publishing, Inc. Distributed data storage system providing enhanced security
US12064688B2 (en) 2020-12-30 2024-08-20 Activision Publishing, Inc. Methods and systems for determining decal projections intersecting spatial units in a frame of a game space
US11794107B2 (en) 2020-12-30 2023-10-24 Activision Publishing, Inc. Systems and methods for improved collision detection in video games
US11724198B2 (en) * 2021-08-11 2023-08-15 Sony Interactive Entertainment LLC Intelligent recommendations for gameplay session adjustment
US11559746B1 (en) * 2021-08-13 2023-01-24 Electronic Arts Inc. Feedback oriented gameplay sessions in video games
US11724199B2 (en) 2021-08-16 2023-08-15 Sony Interactive Entertainment LLC Parental controls of gameplay sessions
JP7158781B1 (en) * 2021-11-29 2022-10-24 クラスター株式会社 Terminal device, server, virtual reality space providing system, program, and virtual reality space providing method
GB2617836B (en) * 2022-04-19 2024-08-21 Sony Interactive Entertainment Inc Image processing apparatus and method
GB2622251A (en) * 2022-09-08 2024-03-13 Sony Interactive Entertainment Inc Systems and methods of protecting personal space in multi-user virtual environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040077394A1 (en) * 2002-10-21 2004-04-22 Kabushiki Kaisha Square Enix Video game that imposes penalty for violation of rule
US20060178967A1 (en) * 2005-02-04 2006-08-10 Searete Llc Disposition of proprietary virtual rights
US20090177979A1 (en) * 2008-01-08 2009-07-09 Zachary Adam Garbow Detecting patterns of abuse in a virtual environment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7073129B1 (en) * 1998-12-18 2006-07-04 Tangis Corporation Automated selection of appropriate information based on a computer user's context
AU2463001A (en) 1999-12-30 2001-07-16 Umagic Systems, Inc. Personal advice system and method
US7319992B2 (en) * 2000-09-25 2008-01-15 The Mission Corporation Method and apparatus for delivering a virtual reality environment
US20070035549A1 (en) 2005-08-12 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Variant rating plans for a virtual world environment
US20070013691A1 (en) 2005-07-18 2007-01-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supervisory authority in virtual world environment
US8241131B2 (en) * 2008-09-26 2012-08-14 International Business Machines Corporation Avatar protection within a virtual universe

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040077394A1 (en) * 2002-10-21 2004-04-22 Kabushiki Kaisha Square Enix Video game that imposes penalty for violation of rule
US20060178967A1 (en) * 2005-02-04 2006-08-10 Searete Llc Disposition of proprietary virtual rights
US20090177979A1 (en) * 2008-01-08 2009-07-09 Zachary Adam Garbow Detecting patterns of abuse in a virtual environment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130296045A1 (en) * 2012-05-04 2013-11-07 Alec Dun Cross-realm zones for interactive gameplay
US9220982B2 (en) * 2012-05-04 2015-12-29 Blizzard Entertainment, Inc. Cross-realm zones for interactive gameplay
US20160121212A1 (en) * 2012-05-04 2016-05-05 Blizzard Entertainment, Inc. Cross-realm zones for interactive gameplay
US10086279B2 (en) * 2012-05-04 2018-10-02 Blizzard Entertainment, Inc. Cross-realm zones for interactive gameplay
US20220212101A1 (en) * 2020-03-13 2022-07-07 Google Llc Peer-to-peer multiplayer cloud gaming architecture
US11752426B2 (en) * 2020-03-13 2023-09-12 Google Llc Peer-to-peer multiplayer cloud gaming architecture

Also Published As

Publication number Publication date
US8827816B2 (en) 2014-09-09
US20100081508A1 (en) 2010-04-01
US20120270620A1 (en) 2012-10-25
US8241131B2 (en) 2012-08-14

Similar Documents

Publication Publication Date Title
US8827816B2 (en) Avatar protection within a virtual universe
US9421468B2 (en) Rendering of artifacts in a virtual universe environment in response to user tags
US8682832B2 (en) Application of normative rules in a virtual universe
Balkin et al. Cybercrime: digital cops in a networked environment
Evtimov et al. Is tricking a robot hacking?
Faraz et al. Child safety and protection in the online gaming ecosystem
Perry Civil liability for cyberbullying
Katell et al. Seeing the whole picture: visualising socio-spatial power through augmented reality
Lee et al. Users’ perspectives on ethical issues related to playing location-based augmented reality games: a case study of Pokémon GO
Stavola et al. Victimization by Deepfake in the Metaverse: Building a Practical Management Framework
Stoup The development and failure of social norms in Second Life
Haber The Criminal Metaverse
Shariff et al. Misogyny in the metaverse: Leveraging policy and education to address technology-facilitated violence
Riesmeyer The Dark Side of Technological Advances: How Technology has Enabled Domestic Violence and the Contributing Role of the First Amendment
Barr et al. Digital threats on campus: Examining the duty of colleges to protect their social networking students
Strikwerda Should virtual cybercrime be regulated by means of criminal law? A philosophical, legal-economic, pragmatic and constitutional dimension
Lalasz Risky behaviors in Yellowstone National Park: The potential role of decision-making and justice on visitors’ behavior
Lipton Cyberbullying and the first amendment
Sarch et al. Punishing artificial intelligence: legal fiction or science fiction
Groppe A Child's Playground or a Predator's Hunting Ground-How to Protect Children on Internet Social Networking Sites
Aliyu et al. On the role and form of personal information disclosure in cyberbullying incidents
Miller Avatars and Social Media: Employment Law Risks and Challenges in the Virtual World.
Gold When Pokemon GO (es) too far: augmented reality and Tort law
Riesmeyer The Dark Side of Technological Advances: How Technology Has Enabled Domestic Violence and the Contributing Role of the First Amendment
Wilfore Security, Misogyny, and Disinformation Undermining Women's Leadership

Legal Events

Date Code Title Description
AS Assignment

Owner name: ACTIVISION PUBLISHING, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:035125/0625

Effective date: 20121231

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHOGAL, KULVIR S.;HAMILTON, RICK A., II;KELLER, NEAL M.;AND OTHERS;REEL/FRAME:035125/0472

Effective date: 20080916

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION