[go: nahoru, domu]

US20090164919A1 - Generating data for managing encounters in a virtual world environment - Google Patents

Generating data for managing encounters in a virtual world environment Download PDF

Info

Publication number
US20090164919A1
US20090164919A1 US11/963,883 US96388307A US2009164919A1 US 20090164919 A1 US20090164919 A1 US 20090164919A1 US 96388307 A US96388307 A US 96388307A US 2009164919 A1 US2009164919 A1 US 2009164919A1
Authority
US
United States
Prior art keywords
user
users
virtual world
computer
selection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/963,883
Inventor
Cary Lee Bates
Jim Chun-Ta Chen
Zachary Adam Garbow
Gregory Edward Young
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Activision Publishing Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/963,883 priority Critical patent/US20090164919A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YOUNG, GREGORY EDWARD, BATES, CARY LEE, GARBOW, ZACHARY ADAM, CHEN, JIM CHUN-TA
Publication of US20090164919A1 publication Critical patent/US20090164919A1/en
Assigned to ACTIVISION PUBLISHING, INC. reassignment ACTIVISION PUBLISHING, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY AGREEMENT Assignors: ACTIVISION PUBLISHING, INC.
Priority to US14/293,301 priority patent/US10627983B2/en
Assigned to BLIZZARD ENTERTAINMENT, INC., ACTIVISION PUBLISHING, INC., ACTIVISION BLIZZARD INC., ACTIVISION ENTERTAINMENT HOLDINGS, INC. reassignment BLIZZARD ENTERTAINMENT, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04815Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements

Definitions

  • Embodiments of the invention relate to the use of immersive virtual environments. More specifically, embodiments of the invention relate to avoiding specific users of an immersive virtual environment.
  • a virtual world is a simulated environment which users may inhabit and in which the users may interact with virtual objects and locations of the virtual world. Users may also interact with one another via avatars.
  • An avatar generally provides a graphical representation of an individual within the virtual world environment.
  • Avatars are usually presented to other users as two or three-dimensional graphical representations of humanoids.
  • virtual worlds allow for multiple users to enter and interact with one another.
  • Virtual worlds provide an immersive environment as they typically appear similar to the real world, with real world rules such as gravity, topography, locomotion, real-time actions, and communication. Communication may be in the form of text messages sent between avatars, real-time voice communication, gestures displayed by avatars, symbols visible in the virtual world, and the like.
  • Virtual worlds may be persistent.
  • a persistent world provides an immersive environment (e.g., a fantasy setting used as a setting for a role-playing game, or a virtual world complete with land, buildings, towns, and economies) that is generally always available, and world events happen continually, regardless of the presence of a given avatar.
  • the virtual world continues to exist, and plots and events continue to occur as users enter (and exit) the virtual world.
  • One embodiment of the invention includes a computer-implemented method.
  • the method generally includes: receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world; determining a current situational context for the first user within the virtual world; and storing the selection of the second user together with the current situational context in a searchable data structure.
  • Another embodiment of the invention includes a computer-readable storage medium including a program, which when executed on a processor performs an operation.
  • the operation may generally include: receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world; determining a current situational context for the first user within the virtual world; and storing the selection of the second user together with the current situational context in a searchable data structure.
  • Still another embodiment of the invention includes a system having a processor and a memory.
  • the memory may store a program, which when executed by the processor, is configured to perform the steps of: receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world; determining a current situational context for the first user within the virtual world; and storing the selection of the second user together with the current situational context in a searchable data structure.
  • FIG. 1 is a block diagram that illustrates a client server view of computing environment, according to one embodiment of the invention.
  • FIG. 2 illustrates a user display for a user participating in a virtual world, according to one embodiment of the invention.
  • FIG. 3 is a flow diagram illustrating a method for generating a blacklist for use in avoiding specific users of an immersive virtual environment, according to one embodiment of the invention.
  • FIG. 4 is a flow diagram illustrating a method for avoiding specific users of an immersive virtual environment by using blacklists, according to one embodiment of the invention.
  • a virtual world is a simulated environment in which users may be represented by avatars.
  • An avatar may be used to “travel” through locations of the virtual world, such as virtual streets, buildings, rooms, etc. While in a given location, an avatar may also be used to interact with objects or other avatars present therein. For example, an avatar may be able to approach another avatar, and may interact with the other avatar by communicating, performing financial transactions, and the like. Thus, multiple users, although in different physical locations, may be present in the same virtual location, and may interact therein by using their respective avatars.
  • a first user may wish to avoid other users within the virtual world.
  • a professional activity e.g., a virtual business meeting
  • he may wish to avoid casual friends who may behave unprofessionally, and thus cause embarrassment.
  • the first user may have gone through a divorce, and may wish to go on a date in the virtual world without running into the former spouse.
  • Embodiments of the invention provide techniques for providing information for avoiding specific users of an immersive virtual environment.
  • a primary user may specify other users to be avoided in a blacklist.
  • the blacklisted users may be specified to be avoided at all times, or may be specified to be avoided in certain situations.
  • a user may be added to the blacklist during a specific situation, resulting in the characteristics of the situation being automatically stored in the blacklist. Subsequently, the blacklist may be used to determine the locations of the blacklisted users matching the current situation. The primary user may then avoid the locations having the greatest probability of encountering blacklisted users.
  • One embodiment of the invention is implemented as a program product for use with a computer system.
  • the program(s) of the program product defines functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media.
  • Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive and DVDs readable by a DVD player) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive, a hard-disk drive or random-access memory) on which alterable information is stored.
  • non-writable storage media e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive and DVDs readable by a DVD player
  • writable storage media e.g
  • Such computer-readable storage media when carrying computer-readable instructions that direct the functions of the present invention, are embodiments of the present invention.
  • Other media include communications media through which information is conveyed to a computer, such as through a computer or telephone network, including wireless communications networks. The latter embodiment specifically includes transmitting information to/from the Internet and other networks.
  • Such communications media when carrying computer-readable instructions that direct the functions of the present invention, are embodiments of the present invention.
  • computer-readable storage media and communications media may be referred to herein as computer-readable media.
  • routines executed to implement the embodiments of the invention may be part of an operating system or a specific application, component, program, module, object, or sequence of instructions.
  • the computer program of the present invention typically is comprised of a multitude of instructions that will be translated by the native computer into a machine-readable format and hence executable instructions.
  • programs are comprised of variables and data structures that either reside locally to the program or are found in memory or on storage devices.
  • various programs described hereinafter may be identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature that follows is used merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.
  • FIG. 1 is a block diagram that illustrates a client server view of computing environment 100 , according to one embodiment of the invention.
  • computing environment 100 includes client computers 110 , network 115 and server system 120 .
  • the computer systems illustrated in environment 100 may include existing computer systems, e.g., desktop computers, server computers, laptop computers, tablet computers, and the like.
  • the computing environment 100 illustrated in FIG. 1 is merely an example of one computing environment.
  • Embodiments of the present invention may be implemented using other environments, regardless of whether the computer systems are complex multi-user computing systems, such as a cluster of individual computers connected by a high-speed network, single-user workstations, or network appliances lacking non-volatile storage.
  • each client computer 110 includes a central processing unit (CPU) 102 , which obtains instructions and data via a bus 111 from client memory 107 and client storage 104 .
  • CPU 102 is a programmable logic device that performs all the instruction, logic, and mathematical processing in a computer.
  • Client storage 104 stores application programs and data for use by client computer 110 .
  • Client storage 104 includes hard-disk drives, flash memory devices, optical media and the like.
  • Client computer 110 is operably connected to the network 115 .
  • Client memory 107 includes an operating system (OS) 108 and a client application 109 .
  • Operating system 108 is the software used for managing the operation of the client computer 110 . Examples of OS 108 include UNIX, a version of the Microsoft Windows® operating system, and distributions of the Linux® operating system. (Note, Linux is a trademark of Linus Torvalds in the United States and other countries.)
  • the client application 109 provides a software program that allows a user to connect to a virtual world 130 on the server 120 , and once connected, to perform various user actions. Such actions may include exploring virtual locations, interacting with other avatars, and interacting with virtual objects. Further, the client application 109 may be configured to generate and display a visual representation of the user within the immersive environment, generally referred to as an avatar. The avatar of the user is generally visible to other users in the virtual world, and the user may view avatars representing the other users. The client application 109 may also be configured to generate and display the immersive environment to the user and to transmit the user's desired actions to the virtual world 130 . Such a display may include content from the virtual world determined from the user's line of sight at any given time.
  • the display may present a third-person perspective, meaning a view from a location other than that of the user's avatar, and which may include the image of the user's avatar within the virtual world.
  • the display may present a first-person perspective, meaning a view of the virtual world as would be seen through the eyes of the avatar representing the user.
  • FIG. 2 illustrates a user display 200 showing a third-person view presented to a user participating in a virtual world, according to one embodiment of the invention.
  • the primary user i.e., the user viewing the user display 200
  • avatar 270 is represented by avatar 270 , and is present in a virtual town square.
  • the primary user may interact with elements of the virtual world, including objects, locations, and other users.
  • the avatar 270 is interacting with an avatar 260 of a second user, thus enabling the primary user to communicate with the second user.
  • the primary user may wish to avoid contact with a third user, illustrated by avatar 280 .
  • the primary user may be using avatar 270 to conduct a business negotiation with avatar 260 , and may wish to avoid a casual friend represented by avatar 280 .
  • being present in the same virtual location may result in avatar 270 having an unwanted encounter with avatar 280 .
  • an unwanted encounter may occur.
  • the line of sight of a user will depend on the type of view of the virtual world being used by that user. That is, if the user of avatar 280 is viewing a first-person perspective of the virtual world (i.e., seeing through the avatar's eyes), he may be able to see a fourth avatar 250 , since he has an unobstructed line of sight 284 (shown as a dotted line) to the fourth avatar 250 . In contrast, the user of avatar 280 may not be able to see the avatar 270 , since a second line of sight 282 to avatar 270 may be obstructed by the virtual objects 132 .
  • the user of avatar 280 is viewing a third-person view of the virtual world (i.e., similar to user display 200 shown in FIG. 2 ), his perspective may be that of a “camera eye” floating over the scene, and would thus allow him to see the avatar 270 over and/or around the virtual objects 132 .
  • the line of sight of a user may also depend on the distance between the user's avatar and another avatar. That is, the virtual world 130 may include predefined limits on distances at which two avatars may view each other.
  • the user may view the virtual world using a display device 140 , such as an LCD or CRT monitor display, and interact with the client application 109 using input devices 150 . Further, in one embodiment, the user may interact with the client application 109 and the virtual world 130 using a variety of virtual reality interaction devices 160 .
  • the user may don a set of virtual reality goggles that have a screen display for each lens. Further, the goggles could be equipped with motion sensors that cause the view of the virtual world presented to the user to move based on the head movements of the individual. As another example, the user could don a pair of gloves configured to translate motion and movement of the user's hands into avatar movements within the virtual reality environment.
  • embodiments of the invention are not limited to these examples and one of ordinary skill in the art will readily recognize that the invention may be adapted for use with a variety of devices configured to present the virtual world to the user and to translate movement/motion or other actions of the user into actions performed by the avatar representing that user within the virtual world 130 .
  • the server system 120 includes a CPU 122 , which obtains instructions and data via a bus 121 from memory 126 and storage 124 .
  • the processor 122 could be any processor adapted to support the methods of the invention.
  • the memory 126 is any memory sufficiently large to hold the necessary programs and data structures. Memory 126 could be one or a combination of memory devices, including Random Access Memory, nonvolatile or backup memory, (e.g., programmable or Flash memories, read-only memories, etc.).
  • memory 126 and storage 124 may be considered to include memory physically located elsewhere in a server 120 , for example, on another computer coupled to the server 120 via bus 121 .
  • the server system 120 may be operably connected to the network 115 , which generally represents any kind of data communications network. Accordingly, the network 115 may represent both local and wide area networks, including the Internet.
  • storage 123 may include a set of blacklists 124 and a movement history 125 .
  • the movement history 125 may store data describing past locations and movements of avatars within the virtual world 130 .
  • Each blacklist 124 may be a data structure corresponding to a given user (hereafter referred to as the primary user), and may be configured to store characteristics of other users (hereafter referred to as blacklisted users) that the primary user may wish to avoid. That is, the blacklist 124 may describe the primary user's preferences with regards to avoiding contact with the blacklisted users while present in the virtual world. A method for adding a user to the blacklist 124 is described below with reference to FIG. 3 .
  • the blacklist 124 may represent any data structure suited to the current application, such as a database table, XML document, flat file, and the like.
  • the characteristics stored in the blacklist 124 may include an identifier and an avoidance level assigned to each blacklisted user.
  • the avoidance level may indicate a degree to which the primary user wishes to avoid the blacklisted user having the avoidance level. For example, in a situation where the primary user must come into contact with either of two blacklisted users, the primary user will usually choose to come into contact with the user having a lower avoidance level.
  • the blacklist 124 may describe a user as being on an absolute (unconditional) blacklist, meaning that the primary user wishes to avoid any contact with the blacklisted user in all circumstances.
  • the blacklist 124 may describe a user as being on a situational (conditional) blacklist, meaning the primary user wishes to avoid contact with the blacklisted user only in defined situations.
  • a situational blacklist may be defined in terms of characteristics of the primary user's situation, such as a location (e.g., avoid at my office, avoid in public spaces, etc.), companions (e.g., avoid when I am with my boss, avoid when I am with clients, etc.), or time frame (e.g., avoid from 8 AM to 4 PM each day).
  • a situational blacklist may also be defined in terms of the primary user's current profile, meaning a general description of the primary user's intended activity or mode of interacting while in the virtual world. For example, a situational blacklist may specify that a blacklisted user is to be avoided while the primary user is in a “Work” profile (i.e., the primary user is conducting business affairs). Furthermore, a situational blacklist may be defined in terms of the primary user's current activity (e.g., avoid while I am working, avoid while I am talking, etc.).
  • the characteristics stored in the blacklist 124 may be defined in terms of groups of users of the virtual world. That is, the blacklist 124 may include defined groups of users to avoid, either conditionally or unconditionally. For example, the blacklist 124 may specify that the group “Competitors” should always be avoided at all times, and that the group “Friends” should be avoided when the primary user is using a “Work” profile, or is at an office location. Further, the blacklist 124 may specify a group to avoid when the primary user is in the company of another person or group (e.g., avoid the group “Friends” when I am in the company of the group “Business Clients”). Furthermore, the blacklist 124 may specify a user to avoid when that user is in the company of another person or group (e.g., avoid user “John” when he is in the company of user “Jane”).
  • memory 126 includes a virtual world 130 , a visibility engine 127 and a blacklist engine 128 .
  • the virtual world 130 may be a software application that allows a user to explore and interact with an immersive environment. As described, the user may access the virtual world 130 by using the client application 109 , according to one embodiment.
  • the virtual world 130 may include virtual objects 132 , such as buildings, trees, houses, etc.
  • the blacklist engine 128 may be a software application configured to enable a primary user to create and modify a blacklist 124 . Additionally, the blacklist engine 128 may be configured to determine situations in which the primary user may encounter a blacklisted user, and to assist the primary user in avoiding such encounters.
  • the primary user may use the blacklist engine 128 to manually add users to the blacklist 124 .
  • the primary user may interact with a user interface provided by the blacklist engine 128 in order to specify an identifier for the user being blacklisted (e.g., user name, user alias, etc.), the type of blacklist (i.e., absolute or situational), a user group (e.g., “Friends,” “Clients,” etc.), a situational context (e.g., at work, with clients, etc.), and the like.
  • an identifier for the user being blacklisted e.g., user name, user alias, etc.
  • the type of blacklist i.e., absolute or situational
  • a user group e.g., “Friends,” “Clients,” etc.
  • a situational context e.g., at work, with clients, etc.
  • the primary user may use the blacklist engine 128 to select users to be added to the blacklist 124 by tagging them during an encounter within the virtual world.
  • the selection of a user for blacklisting may be accompanied by automatically capturing the current situational context. Accordingly, the selected user may be put on a situational blacklist, without requiring the primary user to manually define the situational context of the blacklist (e.g., location, time frame, user profile, etc.).
  • the primary user may be allowed to review and modify the blacklist specification, according to one embodiment. For example, the primary user may interact with an interface provided by the blacklist engine 128 in order to review and modify the characteristics to be stored in the blacklist 124 .
  • the blacklist engine 128 may be further configured to assist the primary user in avoiding encounters with blacklisted users. More specifically, the blacklist engine 128 may be configured to evaluate the blacklist 124 in order to determine situations (i.e., locations, times, activities, groups, etc.) in which the primary user will be likely to encounter a blacklisted user, and to alert the primary user so as to avoid those situations. In one embodiment, the blacklist engine 128 may be configured to determine the current locations of blacklisted users within the virtual world 130 . Further, the blacklist engine 128 may use the movement history 125 to analyze previous movements of the blacklisted users in order to predict probabilities that they will be present at given locations at given times.
  • situations i.e., locations, times, activities, groups, etc.
  • certain characteristics of a user's past movements may be analyzed using statistical and/or probabilistic analysis to generate predictions of future movements.
  • the predicted probabilities may be analyzed using the primary user's travel plans within the virtual world 130 , in order to determine the likelihood of the primary user encountering blacklisted users.
  • This analysis may include consideration of situational blacklists. That is, whether a potential encounter will take place under any situational characteristics (i.e., location, time, profile, group, etc.) that may be assigned to the blacklisted user in the blacklist 124 .
  • the blacklist engine 128 may interact with the visibility engine 127 in order to consider lines of sight in predicting a probability of encountering a blacklisted user.
  • the visibility engine 127 may be a software application configured to determine lines of sight between two avatars in specific locations of the virtual world 130 .
  • the lines of sight may be determined for the present locations of two avatars, as well as predicted future locations of the avatars (i.e., locations based on predictions of future movements, as described above).
  • the lines of sight may be determined based on a specified maximum viewing distance between two avatars. If two avatars are further apart than the maximum viewing distance, the visibility engine 127 may determine that one avatar may not be visible to another avatar.
  • the lines of sight may also be determined based on any virtual objects 132 that may be located between two avatars.
  • the line of sight 282 may be affected by characteristics of an intervening virtual object 132 , including the object's shape, material, openings, height, and the like.
  • the avatars are considered as not being within a line of sight of each other.
  • the same wall is transparent (and assuming no other objects) then the avatars will be considered to be within respective lines of sight.
  • a line of sight may be determined based on a view perspective being displayed to a user (i.e., a first-person perspective or a third-person perspective).
  • determining whether a first avatar is within a line of sight of a second avatar depends upon a field of vision of the second avatar (i.e., what is visible from the virtual eyes of the second avatar).
  • the field of vision may vary from one virtual world to another according to well-known graphical considerations of depth perception, peripheral view, lighting, etc. Further, field of vision (and/or line of sight) may vary or depend upon characteristics of the avatar itself. For example, the second avatar may require corrective lenses.
  • the field of vision of the second avatar may depend upon whether the second avatar is wearing the appropriate corrective lenses.
  • the rendering of the virtual world to a user of the second avatar may be made to appear fuzzy, thereby providing the user with a simulation of what the second avatar sees.
  • the field of vision of the second avatar is substantially limited, relative to when the second avatar is wearing the appropriate corrective lenses.
  • the blacklist engine 128 may also be configured to present the primary user with a display of likely encounters with blacklisted users. For example, the blacklist engine 128 may generate a text listing of likely encounters, or may generate a graphical representation of a map of the virtual world 130 , with visual indicators (e.g., colors, symbols, labels, etc.) showing the likelihood of encounters within various areas of the map. Furthermore, the blacklist engine 128 may be configured to suggest alternative travel plans (e.g., alternative routes, destinations, times, etc.), so as to reduce the likelihood of encountering blacklisted users. Such alternative travel plans may reflect current and predicted lines of sight determined by the visibility engine 127 .
  • alternative travel plans may reflect current and predicted lines of sight determined by the visibility engine 127 .
  • the blacklist engine 128 may also be configured to consider the avoidance level of each blacklisted user in suggesting alternative travel plans. For example, assuming that the primary user must travel to through one of two areas to reach his destination, and that each area includes equal numbers of blacklisted users, the blacklist engine 128 may recommend that the primary user travel through the area that has a lower cumulative avoidance level (i.e., the cumulative avoidance levels of all blacklisted users in the area). That is, the blacklist engine 128 may recommend that the primary user avoid the area that includes blacklisted users which are to be avoided more strongly.
  • the blacklist engine 128 may recommend that the primary user avoid the area that includes blacklisted users which are to be avoided more strongly.
  • the blacklist engine 128 may be configured to consider a negative avoidance level assigned to other users, meaning that the primary user may wish to maximize the probability of encountering those users. For example, in the situation that the primary user has assigned a negative avoidance score to another user, the blacklist engine 128 may suggest travel plans or locations such that the primary user will have a higher likelihood of being within a line of sight of the other user.
  • the blacklist 124 and the blacklist engine 128 may be included in the client computer 110 .
  • the functionality of the blacklist engine 128 may be incorporated into the client application 109 , or in the virtual world 130 .
  • FIG. 3 is a flow diagram illustrating a method 300 for defining a blacklist for a user of a virtual world, according to one embodiment of the invention.
  • Persons skilled in the art will understand that, even though the method is described in conjunction with the system of FIG. 1 , any system configured to perform the steps of the method 300 , in any order, is within the scope of the present invention.
  • the method 300 begins at step 310 , by receiving a command to add a user to a blacklist.
  • a primary user may enter a command in the client application 109 for manually adding a given user to the primary user's blacklist 124 .
  • the primary user may specify that the blacklisted user is to have an absolute blacklist or a situational blacklist.
  • data describing the current situation may be determined.
  • the blacklist engine 128 may be configured to determine characteristics of the primary user's current situation (e.g., location, profile, activity, companions, etc.), and to store the situational data in the blacklist 124 . Thereafter, as described below with reference to FIG. 4 , such situational data may be used in performing a method for avoiding specific users.
  • an avoidance level for the blacklisted user may be received. That is, the primary user may specify a degree of preference for avoiding the blacklisted user. For example, the user may provide an avoidance level by specifying a quantitative score in the blacklist engine 128 . In some situations, the primary user may wish to encounter a particular user in the virtual world. Accordingly, the primary user may specify the avoidance level as a negative number, meaning a degree of preference for encountering the user.
  • groups that are not compatible with the blacklisted user may be received. That is, the primary user may specify a preference for avoiding the blacklisted user while in the company of certain groups of users.
  • the primary user may interact with the blacklist engine 128 to specify that the blacklisted user is to be avoided in the situation that the primary user is in the company of a “Business Clients” group of users.
  • similar users may be suggested to the primary user be added to the current blacklist. That is, the primary user may be presented with additional users that have similar characteristics to the blacklisted user. The primary user may then decide whether to add any of the additional users to the current blacklist.
  • the current blacklist data (i.e., the user name, avoidance level, blacklist type, situational data, etc.) may be presented to the primary user for review and approval prior to finalizing the blacklist.
  • the blacklist engine 128 may present the primary user with a summary of a situational blacklist, including the blacklisted user's name, a location, a profile, and an incompatible group. The primary user may then modify and/or approve the situational blacklist.
  • the current blacklist data may be stored in a blacklist data structure.
  • the blacklist engine 128 may store the blacklist data in the blacklist 124 .
  • FIG. 4 is a flow diagram illustrating a method 400 for avoiding specific users of an immersive virtual environment by using blacklists, according to one embodiment of the invention.
  • method 400 is described in conjunction with the system of FIG. 1 .
  • persons skilled in the art will understand that any system configured to perform the steps of method 400 , in any order, is within the scope of the present invention.
  • the method 400 begins at step 410 , by receiving the primary user's travel plans within the virtual world.
  • the primary user may provide this information, for example, by entering a list of intended destinations into a user interface provided by the client application 109 , or by uploading an itinerary to the blacklist engine 128 .
  • the blacklist engine 128 may be configured to anticipate the primary user's likely destinations based on stored records of previous travels within the virtual world.
  • the primary user's current situation within the virtual world may be determined.
  • the blacklist engine 128 may be configured to determine the primary user's current profile in the virtual world (e.g., a “Work” profile, a “Gaming” profile, etc.), the primary user's current companions, and the like.
  • blacklisted users that are incompatible with the primary user's current situation may be identified.
  • the blacklist engine 128 may be configured to identify users that are specified in the blacklist 124 as having a situational blacklist that matches the primary user's current situation.
  • the blacklist engine 128 may identify any users that have a situational blacklist that specifies they are to be avoided while using the “Work” profile.
  • users that have an absolute blacklist i.e., users to avoid in all situations
  • the blacklist engine 128 may be configured to identify users that are specified in the blacklist 124 as having an absolute blacklist.
  • the current locations and movements of the identified users may be determined.
  • the blacklist engine 128 may be configured to determine the locations and movements of the blacklisted users identified at steps 430 and 440 . Such location and movement information may be provided, e.g., by the virtual world 130 .
  • the probable locations of the identified users may be determined, based on the current user locations and movements determined at step 450 , as well as stored data describing any past movements of the identified users.
  • the blacklist engine 128 may be configured to determine the probable locations of the identified users based on statistical and/or probabilistic analysis of the movement history 125 , which may store characteristics of the identified users' past movements (e.g., movement patterns, frequencies, times, etc.).
  • avoidance scores for different areas of the virtual world may be determined.
  • the blacklist engine 128 may be configured to determine avoidance scores for areas of the virtual world 130 .
  • avoidance scores are values representing the likelihood of encountering one or more blacklisted users within a given area of a virtual world.
  • the avoidance score for a given area may be based on the number of identified users that are present in (or projected to be in) the area.
  • the avoidance score may also be based on the avoidance level assigned to the blacklisted user, meaning the degree to which the primary user wishes to avoid the blacklisted user. Note that, in one embodiment, an avoidance level may be negative, meaning a user that the primary user wishes to encounter.
  • the avoidance score may also be based on the likelihood that the primary user will be in a line of sight of the blacklisted user.
  • the visibility engine 127 may be used to determine the likelihood that the primary user may pass through a particular area without being in the line of sight of the blacklisted user.
  • the blacklisted user's line of sight may be determined based on distances between avatars, and on characteristics of any intervening objects between the avatars. For example, determining the line of sight 282 may be based on virtual objects 132 , as shown in FIG. 2 .
  • the avoidance score may also be based on the primary user's travel plans, as well as any planned changes in the primary user's situation (e.g., switching to a “Casual” profile, planning to meet with a family group at a given time, etc.).
  • recommendations for changes to the primary user's travel plans may be generated.
  • the blacklist engine 128 may be configured to compare the primary user's travel plans (received at step 410 ) to the avoidance scores for areas of the virtual world (determined at step 470 ). On the basis of this comparison, the blacklist engine 128 may generate recommendations for alternative travel plans (e.g., alternate routes, destinations, times, etc.).

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Embodiments of the invention provide techniques for providing information for avoiding specific users of an immersive virtual environment. Generally, a primary user may specify other users to be avoided in a blacklist. The blacklisted users may be specified to be avoided at all times, or may be specified to be avoided in certain situations. In one embodiment, a user may be added to the blacklist during a specific situation, resulting in the characteristics of the situation being automatically stored in the blacklist. Subsequently, the blacklist may be used to determine the locations of the blacklisted users matching the current situation. The primary user may then avoid the locations having the greatest probability of encountering blacklisted users.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • Embodiments of the invention relate to the use of immersive virtual environments. More specifically, embodiments of the invention relate to avoiding specific users of an immersive virtual environment.
  • 2. Description of the Related Art
  • A virtual world is a simulated environment which users may inhabit and in which the users may interact with virtual objects and locations of the virtual world. Users may also interact with one another via avatars. An avatar generally provides a graphical representation of an individual within the virtual world environment. Avatars are usually presented to other users as two or three-dimensional graphical representations of humanoids. Frequently, virtual worlds allow for multiple users to enter and interact with one another. Virtual worlds provide an immersive environment as they typically appear similar to the real world, with real world rules such as gravity, topography, locomotion, real-time actions, and communication. Communication may be in the form of text messages sent between avatars, real-time voice communication, gestures displayed by avatars, symbols visible in the virtual world, and the like.
  • Virtual worlds may be persistent. A persistent world provides an immersive environment (e.g., a fantasy setting used as a setting for a role-playing game, or a virtual world complete with land, buildings, towns, and economies) that is generally always available, and world events happen continually, regardless of the presence of a given avatar. Thus, unlike more conventional online games or multi-user environments, the virtual world continues to exist, and plots and events continue to occur as users enter (and exit) the virtual world.
  • SUMMARY OF THE INVENTION
  • One embodiment of the invention includes a computer-implemented method. The method generally includes: receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world; determining a current situational context for the first user within the virtual world; and storing the selection of the second user together with the current situational context in a searchable data structure.
  • Another embodiment of the invention includes a computer-readable storage medium including a program, which when executed on a processor performs an operation. The operation may generally include: receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world; determining a current situational context for the first user within the virtual world; and storing the selection of the second user together with the current situational context in a searchable data structure.
  • Still another embodiment of the invention includes a system having a processor and a memory. The memory may store a program, which when executed by the processor, is configured to perform the steps of: receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world; determining a current situational context for the first user within the virtual world; and storing the selection of the second user together with the current situational context in a searchable data structure.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • So that the manner in which the above recited features, advantages and objects of the present invention are attained and can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings.
  • It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
  • FIG. 1 is a block diagram that illustrates a client server view of computing environment, according to one embodiment of the invention.
  • FIG. 2 illustrates a user display for a user participating in a virtual world, according to one embodiment of the invention.
  • FIG. 3 is a flow diagram illustrating a method for generating a blacklist for use in avoiding specific users of an immersive virtual environment, according to one embodiment of the invention.
  • FIG. 4 is a flow diagram illustrating a method for avoiding specific users of an immersive virtual environment by using blacklists, according to one embodiment of the invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • A virtual world is a simulated environment in which users may be represented by avatars. An avatar may be used to “travel” through locations of the virtual world, such as virtual streets, buildings, rooms, etc. While in a given location, an avatar may also be used to interact with objects or other avatars present therein. For example, an avatar may be able to approach another avatar, and may interact with the other avatar by communicating, performing financial transactions, and the like. Thus, multiple users, although in different physical locations, may be present in the same virtual location, and may interact therein by using their respective avatars.
  • However, in some situations, a first user may wish to avoid other users within the virtual world. For example, in a situation where the first user is participating in a professional activity (e.g., a virtual business meeting), he may wish to avoid casual friends who may behave unprofessionally, and thus cause embarrassment. In another example, the first user may have gone through a divorce, and may wish to go on a date in the virtual world without running into the former spouse.
  • Embodiments of the invention provide techniques for providing information for avoiding specific users of an immersive virtual environment. In one embodiment, a primary user may specify other users to be avoided in a blacklist. The blacklisted users may be specified to be avoided at all times, or may be specified to be avoided in certain situations. In one embodiment, a user may be added to the blacklist during a specific situation, resulting in the characteristics of the situation being automatically stored in the blacklist. Subsequently, the blacklist may be used to determine the locations of the blacklisted users matching the current situation. The primary user may then avoid the locations having the greatest probability of encountering blacklisted users.
  • In the following, reference is made to embodiments of the invention. However, it should be understood that the invention is not limited to specific described embodiments. Instead, any combination of the following features and elements, whether related to different embodiments or not, is contemplated to implement and practice the invention. Furthermore, in various embodiments the invention provides numerous advantages over the prior art. However, although embodiments of the invention may achieve advantages over other possible solutions and/or over the prior art, whether or not a particular advantage is achieved by a given embodiment is not limiting of the invention. Thus, the following aspects, features, embodiments and advantages are merely illustrative and are not considered elements or limitations of the appended claims except where explicitly recited in a claim(s). Likewise, reference to “the invention” shall not be construed as a generalization of any inventive subject matter disclosed herein and shall not be considered to be an element or limitation of the appended claims except where explicitly recited in a claim(s).
  • One embodiment of the invention is implemented as a program product for use with a computer system. The program(s) of the program product defines functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive and DVDs readable by a DVD player) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive, a hard-disk drive or random-access memory) on which alterable information is stored. Such computer-readable storage media, when carrying computer-readable instructions that direct the functions of the present invention, are embodiments of the present invention. Other media include communications media through which information is conveyed to a computer, such as through a computer or telephone network, including wireless communications networks. The latter embodiment specifically includes transmitting information to/from the Internet and other networks. Such communications media, when carrying computer-readable instructions that direct the functions of the present invention, are embodiments of the present invention. Broadly, computer-readable storage media and communications media may be referred to herein as computer-readable media.
  • In general, the routines executed to implement the embodiments of the invention, may be part of an operating system or a specific application, component, program, module, object, or sequence of instructions. The computer program of the present invention typically is comprised of a multitude of instructions that will be translated by the native computer into a machine-readable format and hence executable instructions. Also, programs are comprised of variables and data structures that either reside locally to the program or are found in memory or on storage devices. In addition, various programs described hereinafter may be identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature that follows is used merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.
  • FIG. 1 is a block diagram that illustrates a client server view of computing environment 100, according to one embodiment of the invention. As shown, computing environment 100 includes client computers 110, network 115 and server system 120. In one embodiment, the computer systems illustrated in environment 100 may include existing computer systems, e.g., desktop computers, server computers, laptop computers, tablet computers, and the like. The computing environment 100 illustrated in FIG. 1, however, is merely an example of one computing environment. Embodiments of the present invention may be implemented using other environments, regardless of whether the computer systems are complex multi-user computing systems, such as a cluster of individual computers connected by a high-speed network, single-user workstations, or network appliances lacking non-volatile storage. Further, the software applications illustrated in FIG. 1 and described herein may be implemented using computer software applications executing on existing computer systems, e.g., desktop computers, server computers, laptop computers, tablet computers, and the like. However, the software applications described herein are not limited to any currently existing computing environment or programming language, and may be adapted to take advantage of new computing systems as they become available.
  • As shown, each client computer 110 includes a central processing unit (CPU) 102, which obtains instructions and data via a bus 111 from client memory 107 and client storage 104. CPU 102 is a programmable logic device that performs all the instruction, logic, and mathematical processing in a computer. Client storage 104 stores application programs and data for use by client computer 110. Client storage 104 includes hard-disk drives, flash memory devices, optical media and the like. Client computer 110 is operably connected to the network 115. Client memory 107 includes an operating system (OS) 108 and a client application 109. Operating system 108 is the software used for managing the operation of the client computer 110. Examples of OS 108 include UNIX, a version of the Microsoft Windows® operating system, and distributions of the Linux® operating system. (Note, Linux is a trademark of Linus Torvalds in the United States and other countries.)
  • In one embodiment, the client application 109 provides a software program that allows a user to connect to a virtual world 130 on the server 120, and once connected, to perform various user actions. Such actions may include exploring virtual locations, interacting with other avatars, and interacting with virtual objects. Further, the client application 109 may be configured to generate and display a visual representation of the user within the immersive environment, generally referred to as an avatar. The avatar of the user is generally visible to other users in the virtual world, and the user may view avatars representing the other users. The client application 109 may also be configured to generate and display the immersive environment to the user and to transmit the user's desired actions to the virtual world 130. Such a display may include content from the virtual world determined from the user's line of sight at any given time. For the user, the display may present a third-person perspective, meaning a view from a location other than that of the user's avatar, and which may include the image of the user's avatar within the virtual world. Alternatively, the display may present a first-person perspective, meaning a view of the virtual world as would be seen through the eyes of the avatar representing the user.
  • By way of example, FIG. 2 illustrates a user display 200 showing a third-person view presented to a user participating in a virtual world, according to one embodiment of the invention. In this example, the primary user (i.e., the user viewing the user display 200) is represented by avatar 270, and is present in a virtual town square. The primary user may interact with elements of the virtual world, including objects, locations, and other users. For example, as illustrated in FIG. 2, the avatar 270 is interacting with an avatar 260 of a second user, thus enabling the primary user to communicate with the second user.
  • In some situations, the primary user may wish to avoid contact with a third user, illustrated by avatar 280. For example, the primary user may be using avatar 270 to conduct a business negotiation with avatar 260, and may wish to avoid a casual friend represented by avatar 280. However, as in the situation illustrated in FIG. 2, being present in the same virtual location may result in avatar 270 having an unwanted encounter with avatar 280. More specifically, in the event that avatar 270 comes into a line of sight of the user of avatar 280, an unwanted encounter may occur.
  • In one embodiment, the line of sight of a user will depend on the type of view of the virtual world being used by that user. That is, if the user of avatar 280 is viewing a first-person perspective of the virtual world (i.e., seeing through the avatar's eyes), he may be able to see a fourth avatar 250, since he has an unobstructed line of sight 284 (shown as a dotted line) to the fourth avatar 250. In contrast, the user of avatar 280 may not be able to see the avatar 270, since a second line of sight 282 to avatar 270 may be obstructed by the virtual objects 132. Further, in the situation that the user of avatar 280 is viewing a third-person view of the virtual world (i.e., similar to user display 200 shown in FIG. 2), his perspective may be that of a “camera eye” floating over the scene, and would thus allow him to see the avatar 270 over and/or around the virtual objects 132. In one embodiment, the line of sight of a user may also depend on the distance between the user's avatar and another avatar. That is, the virtual world 130 may include predefined limits on distances at which two avatars may view each other.
  • Returning to FIG. 1, the user may view the virtual world using a display device 140, such as an LCD or CRT monitor display, and interact with the client application 109 using input devices 150. Further, in one embodiment, the user may interact with the client application 109 and the virtual world 130 using a variety of virtual reality interaction devices 160. For example, the user may don a set of virtual reality goggles that have a screen display for each lens. Further, the goggles could be equipped with motion sensors that cause the view of the virtual world presented to the user to move based on the head movements of the individual. As another example, the user could don a pair of gloves configured to translate motion and movement of the user's hands into avatar movements within the virtual reality environment. Of course, embodiments of the invention are not limited to these examples and one of ordinary skill in the art will readily recognize that the invention may be adapted for use with a variety of devices configured to present the virtual world to the user and to translate movement/motion or other actions of the user into actions performed by the avatar representing that user within the virtual world 130.
  • As shown, the server system 120 includes a CPU 122, which obtains instructions and data via a bus 121 from memory 126 and storage 124. The processor 122 could be any processor adapted to support the methods of the invention. The memory 126 is any memory sufficiently large to hold the necessary programs and data structures. Memory 126 could be one or a combination of memory devices, including Random Access Memory, nonvolatile or backup memory, (e.g., programmable or Flash memories, read-only memories, etc.). In addition, memory 126 and storage 124 may be considered to include memory physically located elsewhere in a server 120, for example, on another computer coupled to the server 120 via bus 121. The server system 120 may be operably connected to the network 115, which generally represents any kind of data communications network. Accordingly, the network 115 may represent both local and wide area networks, including the Internet.
  • In one embodiment, storage 123 may include a set of blacklists 124 and a movement history 125. The movement history 125 may store data describing past locations and movements of avatars within the virtual world 130. Each blacklist 124 may be a data structure corresponding to a given user (hereafter referred to as the primary user), and may be configured to store characteristics of other users (hereafter referred to as blacklisted users) that the primary user may wish to avoid. That is, the blacklist 124 may describe the primary user's preferences with regards to avoiding contact with the blacklisted users while present in the virtual world. A method for adding a user to the blacklist 124 is described below with reference to FIG. 3. Generally, the blacklist 124 may represent any data structure suited to the current application, such as a database table, XML document, flat file, and the like.
  • In one embodiment, the characteristics stored in the blacklist 124 may include an identifier and an avoidance level assigned to each blacklisted user. The avoidance level may indicate a degree to which the primary user wishes to avoid the blacklisted user having the avoidance level. For example, in a situation where the primary user must come into contact with either of two blacklisted users, the primary user will usually choose to come into contact with the user having a lower avoidance level.
  • In one embodiment, the blacklist 124 may describe a user as being on an absolute (unconditional) blacklist, meaning that the primary user wishes to avoid any contact with the blacklisted user in all circumstances. Alternatively, the blacklist 124 may describe a user as being on a situational (conditional) blacklist, meaning the primary user wishes to avoid contact with the blacklisted user only in defined situations. A situational blacklist may be defined in terms of characteristics of the primary user's situation, such as a location (e.g., avoid at my office, avoid in public spaces, etc.), companions (e.g., avoid when I am with my boss, avoid when I am with clients, etc.), or time frame (e.g., avoid from 8 AM to 4 PM each day). Further, a situational blacklist may also be defined in terms of the primary user's current profile, meaning a general description of the primary user's intended activity or mode of interacting while in the virtual world. For example, a situational blacklist may specify that a blacklisted user is to be avoided while the primary user is in a “Work” profile (i.e., the primary user is conducting business affairs). Furthermore, a situational blacklist may be defined in terms of the primary user's current activity (e.g., avoid while I am working, avoid while I am talking, etc.).
  • In one embodiment, the characteristics stored in the blacklist 124 may be defined in terms of groups of users of the virtual world. That is, the blacklist 124 may include defined groups of users to avoid, either conditionally or unconditionally. For example, the blacklist 124 may specify that the group “Competitors” should always be avoided at all times, and that the group “Friends” should be avoided when the primary user is using a “Work” profile, or is at an office location. Further, the blacklist 124 may specify a group to avoid when the primary user is in the company of another person or group (e.g., avoid the group “Friends” when I am in the company of the group “Business Clients”). Furthermore, the blacklist 124 may specify a user to avoid when that user is in the company of another person or group (e.g., avoid user “John” when he is in the company of user “Jane”).
  • As shown, memory 126 includes a virtual world 130, a visibility engine 127 and a blacklist engine 128. In one embodiment, the virtual world 130 may be a software application that allows a user to explore and interact with an immersive environment. As described, the user may access the virtual world 130 by using the client application 109, according to one embodiment. The virtual world 130 may include virtual objects 132, such as buildings, trees, houses, etc.
  • The blacklist engine 128 may be a software application configured to enable a primary user to create and modify a blacklist 124. Additionally, the blacklist engine 128 may be configured to determine situations in which the primary user may encounter a blacklisted user, and to assist the primary user in avoiding such encounters.
  • In one embodiment, the primary user may use the blacklist engine 128 to manually add users to the blacklist 124. For example, the primary user may interact with a user interface provided by the blacklist engine 128 in order to specify an identifier for the user being blacklisted (e.g., user name, user alias, etc.), the type of blacklist (i.e., absolute or situational), a user group (e.g., “Friends,” “Clients,” etc.), a situational context (e.g., at work, with clients, etc.), and the like.
  • In one embodiment, the primary user may use the blacklist engine 128 to select users to be added to the blacklist 124 by tagging them during an encounter within the virtual world. The selection of a user for blacklisting may be accompanied by automatically capturing the current situational context. Accordingly, the selected user may be put on a situational blacklist, without requiring the primary user to manually define the situational context of the blacklist (e.g., location, time frame, user profile, etc.). Further, prior to adding the selected user to the blacklist 124, the primary user may be allowed to review and modify the blacklist specification, according to one embodiment. For example, the primary user may interact with an interface provided by the blacklist engine 128 in order to review and modify the characteristics to be stored in the blacklist 124.
  • In one embodiment, the blacklist engine 128 may be further configured to assist the primary user in avoiding encounters with blacklisted users. More specifically, the blacklist engine 128 may be configured to evaluate the blacklist 124 in order to determine situations (i.e., locations, times, activities, groups, etc.) in which the primary user will be likely to encounter a blacklisted user, and to alert the primary user so as to avoid those situations. In one embodiment, the blacklist engine 128 may be configured to determine the current locations of blacklisted users within the virtual world 130. Further, the blacklist engine 128 may use the movement history 125 to analyze previous movements of the blacklisted users in order to predict probabilities that they will be present at given locations at given times. That is, certain characteristics of a user's past movements (e.g., movement patterns, frequencies, times, etc.) may be analyzed using statistical and/or probabilistic analysis to generate predictions of future movements. In one embodiment, the predicted probabilities may be analyzed using the primary user's travel plans within the virtual world 130, in order to determine the likelihood of the primary user encountering blacklisted users. This analysis may include consideration of situational blacklists. That is, whether a potential encounter will take place under any situational characteristics (i.e., location, time, profile, group, etc.) that may be assigned to the blacklisted user in the blacklist 124.
  • In one embodiment, the blacklist engine 128 may interact with the visibility engine 127 in order to consider lines of sight in predicting a probability of encountering a blacklisted user. The visibility engine 127 may be a software application configured to determine lines of sight between two avatars in specific locations of the virtual world 130. The lines of sight may be determined for the present locations of two avatars, as well as predicted future locations of the avatars (i.e., locations based on predictions of future movements, as described above). In one embodiment, the lines of sight may be determined based on a specified maximum viewing distance between two avatars. If two avatars are further apart than the maximum viewing distance, the visibility engine 127 may determine that one avatar may not be visible to another avatar. Further, the lines of sight may also be determined based on any virtual objects 132 that may be located between two avatars. For example, the line of sight 282 may be affected by characteristics of an intervening virtual object 132, including the object's shape, material, openings, height, and the like. Thus, where two avatars are on opposite sides of an opaque wall having dimensions sufficient to preclude the avatars from seeing each other, then the avatars are considered as not being within a line of sight of each other. Conversely, if the same wall is transparent (and assuming no other objects) then the avatars will be considered to be within respective lines of sight.
  • In one embodiment, a line of sight may be determined based on a view perspective being displayed to a user (i.e., a first-person perspective or a third-person perspective). In the case of a first-person perspective, determining whether a first avatar is within a line of sight of a second avatar depends upon a field of vision of the second avatar (i.e., what is visible from the virtual eyes of the second avatar). The field of vision may vary from one virtual world to another according to well-known graphical considerations of depth perception, peripheral view, lighting, etc. Further, field of vision (and/or line of sight) may vary or depend upon characteristics of the avatar itself. For example, the second avatar may require corrective lenses. Therefore, the field of vision of the second avatar may depend upon whether the second avatar is wearing the appropriate corrective lenses. In the absence of appropriate corrective lenses, the rendering of the virtual world to a user of the second avatar may be made to appear fuzzy, thereby providing the user with a simulation of what the second avatar sees. In this case, the field of vision of the second avatar is substantially limited, relative to when the second avatar is wearing the appropriate corrective lenses.
  • After determining the probabilities of encountering blacklisted users, the blacklist engine 128 may also be configured to present the primary user with a display of likely encounters with blacklisted users. For example, the blacklist engine 128 may generate a text listing of likely encounters, or may generate a graphical representation of a map of the virtual world 130, with visual indicators (e.g., colors, symbols, labels, etc.) showing the likelihood of encounters within various areas of the map. Furthermore, the blacklist engine 128 may be configured to suggest alternative travel plans (e.g., alternative routes, destinations, times, etc.), so as to reduce the likelihood of encountering blacklisted users. Such alternative travel plans may reflect current and predicted lines of sight determined by the visibility engine 127.
  • In one embodiment, the blacklist engine 128 may also be configured to consider the avoidance level of each blacklisted user in suggesting alternative travel plans. For example, assuming that the primary user must travel to through one of two areas to reach his destination, and that each area includes equal numbers of blacklisted users, the blacklist engine 128 may recommend that the primary user travel through the area that has a lower cumulative avoidance level (i.e., the cumulative avoidance levels of all blacklisted users in the area). That is, the blacklist engine 128 may recommend that the primary user avoid the area that includes blacklisted users which are to be avoided more strongly.
  • In another embodiment, the blacklist engine 128 may be configured to consider a negative avoidance level assigned to other users, meaning that the primary user may wish to maximize the probability of encountering those users. For example, in the situation that the primary user has assigned a negative avoidance score to another user, the blacklist engine 128 may suggest travel plans or locations such that the primary user will have a higher likelihood of being within a line of sight of the other user.
  • Of course, the embodiments described above are intended to be illustrative, and are not limiting of the invention. Other embodiments are broadly contemplated. For example, the blacklist 124 and the blacklist engine 128 may be included in the client computer 110. In another example, the functionality of the blacklist engine 128 may be incorporated into the client application 109, or in the virtual world 130.
  • FIG. 3 is a flow diagram illustrating a method 300 for defining a blacklist for a user of a virtual world, according to one embodiment of the invention. Persons skilled in the art will understand that, even though the method is described in conjunction with the system of FIG. 1, any system configured to perform the steps of the method 300, in any order, is within the scope of the present invention.
  • The method 300 begins at step 310, by receiving a command to add a user to a blacklist. For example, a primary user may enter a command in the client application 109 for manually adding a given user to the primary user's blacklist 124. In one embodiment, the primary user may specify that the blacklisted user is to have an absolute blacklist or a situational blacklist. At step 320, data describing the current situation may be determined. For example, the blacklist engine 128 may be configured to determine characteristics of the primary user's current situation (e.g., location, profile, activity, companions, etc.), and to store the situational data in the blacklist 124. Thereafter, as described below with reference to FIG. 4, such situational data may be used in performing a method for avoiding specific users.
  • At step 330, an avoidance level for the blacklisted user may be received. That is, the primary user may specify a degree of preference for avoiding the blacklisted user. For example, the user may provide an avoidance level by specifying a quantitative score in the blacklist engine 128. In some situations, the primary user may wish to encounter a particular user in the virtual world. Accordingly, the primary user may specify the avoidance level as a negative number, meaning a degree of preference for encountering the user. At step 340, groups that are not compatible with the blacklisted user may be received. That is, the primary user may specify a preference for avoiding the blacklisted user while in the company of certain groups of users. For example, the primary user may interact with the blacklist engine 128 to specify that the blacklisted user is to be avoided in the situation that the primary user is in the company of a “Business Clients” group of users. At step 350, similar users may be suggested to the primary user be added to the current blacklist. That is, the primary user may be presented with additional users that have similar characteristics to the blacklisted user. The primary user may then decide whether to add any of the additional users to the current blacklist.
  • At step 360, the current blacklist data (i.e., the user name, avoidance level, blacklist type, situational data, etc.) may be presented to the primary user for review and approval prior to finalizing the blacklist. For example, the blacklist engine 128 may present the primary user with a summary of a situational blacklist, including the blacklisted user's name, a location, a profile, and an incompatible group. The primary user may then modify and/or approve the situational blacklist. At step 370, the current blacklist data may be stored in a blacklist data structure. For example, the blacklist engine 128 may store the blacklist data in the blacklist 124. After step 370, the method 300 terminates.
  • FIG. 4 is a flow diagram illustrating a method 400 for avoiding specific users of an immersive virtual environment by using blacklists, according to one embodiment of the invention. For the sake of illustration, method 400 is described in conjunction with the system of FIG. 1. However, persons skilled in the art will understand that any system configured to perform the steps of method 400, in any order, is within the scope of the present invention.
  • The method 400 begins at step 410, by receiving the primary user's travel plans within the virtual world. The primary user may provide this information, for example, by entering a list of intended destinations into a user interface provided by the client application 109, or by uploading an itinerary to the blacklist engine 128. Optionally, the blacklist engine 128 may be configured to anticipate the primary user's likely destinations based on stored records of previous travels within the virtual world.
  • At step 420, the primary user's current situation within the virtual world may be determined. For example, the blacklist engine 128 may be configured to determine the primary user's current profile in the virtual world (e.g., a “Work” profile, a “Gaming” profile, etc.), the primary user's current companions, and the like. At step 430, blacklisted users that are incompatible with the primary user's current situation may be identified. For example, the blacklist engine 128 may be configured to identify users that are specified in the blacklist 124 as having a situational blacklist that matches the primary user's current situation. That is, if the primary user is currently using a “Work” profile, then the blacklist engine 128 may identify any users that have a situational blacklist that specifies they are to be avoided while using the “Work” profile. At step 440, users that have an absolute blacklist (i.e., users to avoid in all situations) may be identified. For example, the blacklist engine 128 may be configured to identify users that are specified in the blacklist 124 as having an absolute blacklist.
  • At step 450, the current locations and movements of the identified users may be determined. For example, the blacklist engine 128 may be configured to determine the locations and movements of the blacklisted users identified at steps 430 and 440. Such location and movement information may be provided, e.g., by the virtual world 130. At step 460, the probable locations of the identified users may be determined, based on the current user locations and movements determined at step 450, as well as stored data describing any past movements of the identified users. For example, the blacklist engine 128 may be configured to determine the probable locations of the identified users based on statistical and/or probabilistic analysis of the movement history 125, which may store characteristics of the identified users' past movements (e.g., movement patterns, frequencies, times, etc.).
  • At step 470, avoidance scores for different areas of the virtual world may be determined. For example, the blacklist engine 128 may be configured to determine avoidance scores for areas of the virtual world 130. In one embodiment, avoidance scores are values representing the likelihood of encountering one or more blacklisted users within a given area of a virtual world. The avoidance score for a given area may be based on the number of identified users that are present in (or projected to be in) the area. The avoidance score may also be based on the avoidance level assigned to the blacklisted user, meaning the degree to which the primary user wishes to avoid the blacklisted user. Note that, in one embodiment, an avoidance level may be negative, meaning a user that the primary user wishes to encounter. The avoidance score may also be based on the likelihood that the primary user will be in a line of sight of the blacklisted user. For example, the visibility engine 127 may be used to determine the likelihood that the primary user may pass through a particular area without being in the line of sight of the blacklisted user. The blacklisted user's line of sight may be determined based on distances between avatars, and on characteristics of any intervening objects between the avatars. For example, determining the line of sight 282 may be based on virtual objects 132, as shown in FIG. 2. The avoidance score may also be based on the primary user's travel plans, as well as any planned changes in the primary user's situation (e.g., switching to a “Casual” profile, planning to meet with a family group at a given time, etc.).
  • At step 480, recommendations for changes to the primary user's travel plans may be generated. For example, the blacklist engine 128 may be configured to compare the primary user's travel plans (received at step 410) to the avoidance scores for areas of the virtual world (determined at step 470). On the basis of this comparison, the blacklist engine 128 may generate recommendations for alternative travel plans (e.g., alternate routes, destinations, times, etc.).
  • While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.

Claims (24)

1. A computer implemented method, comprising:
receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world;
determining a current situational context for the first user within the virtual world; and
storing the selection of the second user together with the current situational context in a searchable data structure.
2. The computer-implemented method of claim 1, wherein the selection of the second user comprises a selection by the first user of a graphically represented avatar of the second user within a visual display of the virtual world.
3. The computer-implemented method of claim 1, wherein the current situational context for the first user includes at least one of: (i) a location, (ii) a time frame, (iii) a companion user, (iv) a current activity, (v) a user profile, (vi) an amount of ambient light, and (vii) a membership in a user group.
4. The computer-implemented method of claim 1, further comprising:
determining one or more other users that are similar to the second user;
providing the determined one or more other users to the user; and
receiving, from the first user, a selection of at least one of the determined one or more other users to be stored together with the current situational context in the searchable data structure.
5. The computer-implemented method of claim 1, further comprising:
receiving, from the first user, an indication of a degree of preference towards encountering the second user; and
storing the received indication together with the selection of the second user and the current situational context in the searchable data structure.
6. The computer-implemented method of claim 5, wherein the received indication of the degree of preference indicates a desire to encounter the avatar of the second user in the virtual world.
7. The computer-implemented method of claim 5, wherein the received indication of the degree of preference indicates a desire to avoid encountering the avatar of the second user in the virtual world.
8. The computer-implemented method of claim 1, further comprising:
receiving, from the first user, a specification of one or more other users, the specification indicating a preference of the first user towards encountering the second user while in the presence of the one or more other users.
9. A computer-readable storage medium including a program, which when executed on a processor performs an operation, comprising:
receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world;
determining a current situational context for the first user within the virtual world; and
storing the selection of the second user together with the current situational context in a searchable data structure.
10. The computer-readable storage medium of claim 9, wherein the selection of the second user comprises a selection by the first user of a graphically represented avatar of the second user within a visual display of the virtual world.
11. The computer-readable storage medium of claim 9, wherein the current situational context for the first user includes at least one of: (i) a location, (ii) a time frame, (iii) a companion user, (iv) a current activity, (v) a user profile, (vi) an amount of ambient light, and (vii) a membership in a user group.
12. The computer-readable storage medium of claim 9, further comprising:
determining one or more other users that are similar to the second user;
providing the determined one or more other users to the user; and
receiving, from the first user, a selection of at least one of the determined one or more other users to be stored together with the current situational context in the searchable data structure.
13. The computer-readable storage medium of claim 9, further comprising:
receiving, from the first user, an indication of a degree of preference towards encountering the second user; and
storing the received indication together with the selection of the second user and the current situational context in the searchable data structure.
14. The computer-readable storage medium of claim 13, wherein the received indication of the degree of preference indicates a desire to encounter the avatar of the second user in the virtual world.
15. The computer-readable storage medium of claim 13, wherein the received indication of the degree of preference indicates a desire to avoid encountering the avatar of the second user in the virtual world.
16. The computer-readable storage medium of claim 9, further comprising:
receiving, from the first user, a specification of one or more other users, the specification indicating a preference of the first user towards encountering the second user while in the presence of the one or more other users.
17. A system, comprising:
a processor; and
a memory containing a program, which when executed by the processor is configured to perform the steps of:
receiving, from a first user, a selection indicating a preference of the first user towards encountering the second user while present in a virtual world;
determining a current situational context for the first user within the virtual world; and
storing the selection of the second user together with the current situational context in a searchable data structure.
18. The system of claim 17, wherein the selection of the second user comprises a selection by the first user of a graphically represented avatar of the second user within a visual display of the virtual world.
19. The system of claim 17, wherein the current situational context for the first user includes at least one of: (i) a location, (ii) a time frame, (iii) a companion user, (iv) a current activity, (v) a user profile, (vi) an amount of ambient light, and (vii) a membership in a user group.
20. The system of claim 17, wherein the program further comprises the steps of:
determining one or more other users that are similar to the second user;
providing the determined one or more other users to the user; and
receiving, from the first user, a selection of at least one of the determined one or more other users to be stored together with the current situational context in the searchable data structure.
21. The system of claim 17, wherein the program further comprises the steps of:
receiving, from the first user, an indication of a degree of preference towards encountering the second user; and
storing the received indication together with the selection of the second user and the current situational context in the searchable data structure.
22. The system of claim 21, wherein the received indication of the degree of preference indicates a desire to encounter the avatar of the second user in the virtual world.
23. The system of claim 21, wherein the received indication of the degree of preference indicates a desire to avoid encountering the avatar of the second user in the virtual world.
24. The system of claim 17, wherein the program further comprises the step of:
receiving, from the first user, a specification of one or more other users, the specification indicating a preference of the first user towards encountering the second user while in the presence of the one or more other users.
US11/963,883 2007-12-24 2007-12-24 Generating data for managing encounters in a virtual world environment Abandoned US20090164919A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/963,883 US20090164919A1 (en) 2007-12-24 2007-12-24 Generating data for managing encounters in a virtual world environment
US14/293,301 US10627983B2 (en) 2007-12-24 2014-06-02 Generating data for managing encounters in a virtual world environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/963,883 US20090164919A1 (en) 2007-12-24 2007-12-24 Generating data for managing encounters in a virtual world environment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/293,301 Continuation US10627983B2 (en) 2007-12-24 2014-06-02 Generating data for managing encounters in a virtual world environment

Publications (1)

Publication Number Publication Date
US20090164919A1 true US20090164919A1 (en) 2009-06-25

Family

ID=40790162

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/963,883 Abandoned US20090164919A1 (en) 2007-12-24 2007-12-24 Generating data for managing encounters in a virtual world environment
US14/293,301 Active 2030-09-04 US10627983B2 (en) 2007-12-24 2014-06-02 Generating data for managing encounters in a virtual world environment

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/293,301 Active 2030-09-04 US10627983B2 (en) 2007-12-24 2014-06-02 Generating data for managing encounters in a virtual world environment

Country Status (1)

Country Link
US (2) US20090164919A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100070884A1 (en) * 2008-09-17 2010-03-18 International Business Machines Corporation Dynamically Linking Avatar Profiles Within a Virtual Environment
US20100115422A1 (en) * 2008-11-05 2010-05-06 At&T Intellectual Property I, L.P. System and method for conducting a communication exchange
US20110047486A1 (en) * 2009-08-24 2011-02-24 Disney Enterprises, Inc. System and method for enhancing socialization in virtual worlds
US20120047087A1 (en) * 2009-03-25 2012-02-23 Waldeck Technology Llc Smart encounters
US20120053980A1 (en) * 2010-08-31 2012-03-01 International Business Machines Corporation Managing encounters with persons
US20130111366A1 (en) * 2011-10-27 2013-05-02 Disney Enterprises, Inc. Friends lists with dynamic ordering and dynamic avatar appearance
US20130179802A1 (en) * 2012-01-11 2013-07-11 Peter Henry Martinazzi Chaining Connection Requests
US20140032181A1 (en) * 2012-07-24 2014-01-30 Dassault Systemes Design Operation In An Immersive Virtual Environment
US20150156228A1 (en) * 2013-11-18 2015-06-04 Ronald Langston Social networking interacting system
US9473497B1 (en) * 2013-06-05 2016-10-18 Securus Technologies, Inc. Exclusion engine for electronic communications in controlled-environment facilities
US10295968B2 (en) * 2008-12-10 2019-05-21 International Business Machines Corporation Network driven actuator mapping agent and bus and method of use
US10402783B2 (en) * 2014-06-26 2019-09-03 Microsoft Technology Licensing, Llc Method of automatically re-organizing structured data in a reporting system based on screen size by executing computer-executable instructions stored on a non-transitory computer-readable medium
US10627983B2 (en) 2007-12-24 2020-04-21 Activision Publishing, Inc. Generating data for managing encounters in a virtual world environment
US20220092631A1 (en) * 2010-07-12 2022-03-24 At&T Intellectual Property I, L.P. System and method for contextual virtual local advertisement insertion

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8127235B2 (en) 2007-11-30 2012-02-28 International Business Machines Corporation Automatic increasing of capacity of a virtual space in a virtual world
JP5159375B2 (en) 2008-03-07 2013-03-06 インターナショナル・ビジネス・マシーンズ・コーポレーション Object authenticity determination system and method in metaverse, and computer program thereof
US9205328B2 (en) 2010-02-18 2015-12-08 Activision Publishing, Inc. Videogame system and method that enables characters to earn virtual fans by completing secondary objectives
US9682324B2 (en) 2010-05-12 2017-06-20 Activision Publishing, Inc. System and method for enabling players to participate in asynchronous, competitive challenges
US10137376B2 (en) 2012-12-31 2018-11-27 Activision Publishing, Inc. System and method for creating and streaming augmented game sessions
US10376792B2 (en) 2014-07-03 2019-08-13 Activision Publishing, Inc. Group composition matchmaking system and method for multiplayer video games
US11351466B2 (en) 2014-12-05 2022-06-07 Activision Publishing, Ing. System and method for customizing a replay of one or more game events in a video game
US10118099B2 (en) 2014-12-16 2018-11-06 Activision Publishing, Inc. System and method for transparently styling non-player characters in a multiplayer video game
US10486068B2 (en) 2015-05-14 2019-11-26 Activision Publishing, Inc. System and method for providing dynamically variable maps in a video game
US10315113B2 (en) 2015-05-14 2019-06-11 Activision Publishing, Inc. System and method for simulating gameplay of nonplayer characters distributed across networked end user devices
US10286314B2 (en) 2015-05-14 2019-05-14 Activision Publishing, Inc. System and method for providing continuous gameplay in a multiplayer video game through an unbounded gameplay session
US10086266B2 (en) 2015-06-15 2018-10-02 Activision Publishing, Inc. System and method for uniquely identifying physical trading cards and incorporating trading card game items in a video game
US9836895B1 (en) 2015-06-19 2017-12-05 Waymo Llc Simulating virtual objects
US10471348B2 (en) 2015-07-24 2019-11-12 Activision Publishing, Inc. System and method for creating and sharing customized video game weapon configurations in multiplayer video games via one or more social networks
US11185784B2 (en) 2015-10-08 2021-11-30 Activision Publishing, Inc. System and method for generating personalized messaging campaigns for video game players
US10099140B2 (en) 2015-10-08 2018-10-16 Activision Publishing, Inc. System and method for generating personalized messaging campaigns for video game players
US10232272B2 (en) 2015-10-21 2019-03-19 Activision Publishing, Inc. System and method for replaying video game streams
US10245509B2 (en) 2015-10-21 2019-04-02 Activision Publishing, Inc. System and method of inferring user interest in different aspects of video game streams
US10376781B2 (en) 2015-10-21 2019-08-13 Activision Publishing, Inc. System and method of generating and distributing video game streams
US10694352B2 (en) 2015-10-28 2020-06-23 Activision Publishing, Inc. System and method of using physical objects to control software access
US10300390B2 (en) 2016-04-01 2019-05-28 Activision Publishing, Inc. System and method of automatically annotating gameplay of a video game based on triggering events
US10226701B2 (en) 2016-04-29 2019-03-12 Activision Publishing, Inc. System and method for identifying spawn locations in a video game
US10179289B2 (en) 2016-06-21 2019-01-15 Activision Publishing, Inc. System and method for reading graphically-encoded identifiers from physical trading cards through image-based template matching
US10586380B2 (en) 2016-07-29 2020-03-10 Activision Publishing, Inc. Systems and methods for automating the animation of blendshape rigs
WO2018040062A1 (en) * 2016-09-02 2018-03-08 Baidu.Com Times Technology (Beijing) Co., Ltd. Method and system for generating phrase blacklist to prevent certain content from appearing in search result in response to search queries
US10709981B2 (en) 2016-11-17 2020-07-14 Activision Publishing, Inc. Systems and methods for the real-time generation of in-game, locally accessible barrier-aware heatmaps
US10463964B2 (en) 2016-11-17 2019-11-05 Activision Publishing, Inc. Systems and methods for the real-time generation of in-game, locally accessible heatmaps
US10500498B2 (en) 2016-11-29 2019-12-10 Activision Publishing, Inc. System and method for optimizing virtual games
US10055880B2 (en) 2016-12-06 2018-08-21 Activision Publishing, Inc. Methods and systems to modify a two dimensional facial image to increase dimensional depth and generate a facial image that appears three dimensional
US10861079B2 (en) 2017-02-23 2020-12-08 Activision Publishing, Inc. Flexible online pre-ordering system for media
US10818060B2 (en) 2017-09-05 2020-10-27 Activision Publishing, Inc. Systems and methods for guiding motion capture actors using a motion reference system
US10974150B2 (en) 2017-09-27 2021-04-13 Activision Publishing, Inc. Methods and systems for improved content customization in multiplayer gaming environments
US11040286B2 (en) 2017-09-27 2021-06-22 Activision Publishing, Inc. Methods and systems for improved content generation in multiplayer gaming environments
US10561945B2 (en) 2017-09-27 2020-02-18 Activision Publishing, Inc. Methods and systems for incentivizing team cooperation in multiplayer gaming environments
US10463971B2 (en) 2017-12-06 2019-11-05 Activision Publishing, Inc. System and method for validating video gaming data
US10537809B2 (en) 2017-12-06 2020-01-21 Activision Publishing, Inc. System and method for validating video gaming data
US10981051B2 (en) 2017-12-19 2021-04-20 Activision Publishing, Inc. Synchronized, fully programmable game controllers
US10864443B2 (en) 2017-12-22 2020-12-15 Activision Publishing, Inc. Video game content aggregation, normalization, and publication systems and methods
US10596471B2 (en) 2017-12-22 2020-03-24 Activision Publishing, Inc. Systems and methods for enabling audience participation in multi-player video game play sessions
US11278813B2 (en) 2017-12-22 2022-03-22 Activision Publishing, Inc. Systems and methods for enabling audience participation in bonus game play sessions
US11192028B2 (en) 2018-11-19 2021-12-07 Activision Publishing, Inc. Systems and methods for the real-time customization of video game content based on player data
US11263670B2 (en) 2018-11-19 2022-03-01 Activision Publishing, Inc. Systems and methods for dynamically modifying video game content based on non-video gaming content being concurrently experienced by a user
US11115712B2 (en) 2018-12-15 2021-09-07 Activision Publishing, Inc. Systems and methods for indexing, searching for, and retrieving digital media
US11679330B2 (en) 2018-12-18 2023-06-20 Activision Publishing, Inc. Systems and methods for generating improved non-player characters
US11305191B2 (en) 2018-12-20 2022-04-19 Activision Publishing, Inc. Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay
US11344808B2 (en) 2019-06-28 2022-05-31 Activision Publishing, Inc. Systems and methods for dynamically generating and modulating music based on gaming events, player profiles and/or player reactions
US11097193B2 (en) 2019-09-11 2021-08-24 Activision Publishing, Inc. Methods and systems for increasing player engagement in multiplayer gaming environments
US11423605B2 (en) 2019-11-01 2022-08-23 Activision Publishing, Inc. Systems and methods for remastering a game space while maintaining the underlying game simulation
US11712627B2 (en) 2019-11-08 2023-08-01 Activision Publishing, Inc. System and method for providing conditional access to virtual gaming items
US11537209B2 (en) 2019-12-17 2022-12-27 Activision Publishing, Inc. Systems and methods for guiding actors using a motion capture reference system
US11420122B2 (en) 2019-12-23 2022-08-23 Activision Publishing, Inc. Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay
US11563774B2 (en) 2019-12-27 2023-01-24 Activision Publishing, Inc. Systems and methods for tracking and identifying phishing website authors
US11524234B2 (en) 2020-08-18 2022-12-13 Activision Publishing, Inc. Multiplayer video games with virtual characters having dynamically modified fields of view
US11351459B2 (en) 2020-08-18 2022-06-07 Activision Publishing, Inc. Multiplayer video games with virtual characters having dynamically generated attribute profiles unconstrained by predefined discrete values
US11717753B2 (en) 2020-09-29 2023-08-08 Activision Publishing, Inc. Methods and systems for generating modified level of detail visual assets in a video game
US11724188B2 (en) 2020-09-29 2023-08-15 Activision Publishing, Inc. Methods and systems for selecting a level of detail visual asset during the execution of a video game
US11833423B2 (en) 2020-09-29 2023-12-05 Activision Publishing, Inc. Methods and systems for generating level of detail visual assets in a video game
US11439904B2 (en) 2020-11-11 2022-09-13 Activision Publishing, Inc. Systems and methods for imparting dynamic and realistic movement to player-controlled avatars in video games
US12097430B2 (en) 2020-12-28 2024-09-24 Activision Publishing, Inc. Methods and systems for generating and managing active objects in video games
US12064688B2 (en) 2020-12-30 2024-08-20 Activision Publishing, Inc. Methods and systems for determining decal projections intersecting spatial units in a frame of a game space
US11853439B2 (en) 2020-12-30 2023-12-26 Activision Publishing, Inc. Distributed data storage system providing enhanced security
US11794107B2 (en) 2020-12-30 2023-10-24 Activision Publishing, Inc. Systems and methods for improved collision detection in video games
US20240007593A1 (en) * 2022-06-30 2024-01-04 Katmai Tech Inc. Session transfer in a virtual videoconferencing environment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030156134A1 (en) * 2000-12-08 2003-08-21 Kyunam Kim Graphic chatting with organizational avatars
US20070156664A1 (en) * 2005-07-06 2007-07-05 Gemini Mobile Technologies, Inc. Automatic user matching in an online environment
US7293235B1 (en) * 1998-08-14 2007-11-06 British Telecommunications Public Limited Company Predicting avatar movement in a distributed virtual environment
US20080215994A1 (en) * 2007-03-01 2008-09-04 Phil Harrison Virtual world avatar control, interactivity and communication interactive messaging
US20080307066A1 (en) * 2007-06-07 2008-12-11 Qurio Holdings, Inc. Systems and Methods of Providing Collaborative Consumer-Controlled Advertising Environments
US20090037822A1 (en) * 2007-07-31 2009-02-05 Qurio Holdings, Inc. Context-aware shared content representations
US20090055484A1 (en) * 2007-08-20 2009-02-26 Thanh Vuong System and method for representation of electronic mail users using avatars
US20090158151A1 (en) * 2007-12-18 2009-06-18 Li-Te Cheng Computer system and method of using presence visualizations of avators as persistable virtual contact objects
US20090164458A1 (en) * 2007-12-20 2009-06-25 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Methods and systems employing a cohort-linked avatar
US20100211638A1 (en) * 2007-07-27 2010-08-19 Goojet Method and device for creating computer applications
US20110279461A1 (en) * 2007-08-16 2011-11-17 International Business Machines Corporation Spawning projected avatars in a virtual universe

Family Cites Families (584)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3621214A (en) 1968-11-13 1971-11-16 Gordon W Romney Electronically generated perspective images
BE793543A (en) 1971-12-30 1973-04-16 Ibm MECHANISM POSITION CODING METHODS
US3914000A (en) 1973-04-16 1975-10-21 Ibm Method of making tubeless gas panel
US3996672A (en) 1975-03-12 1976-12-14 The Singer Company Real-time simulation of a point system as viewed by a moving observer
JPS55155659A (en) 1979-05-18 1980-12-04 Kinnosuke Furukawa Preparation of catheter
JPS575598A (en) 1980-06-13 1982-01-12 Hitachi Ltd Operation controller for turborefrigerator
US4461301A (en) 1981-10-15 1984-07-24 Self Regulation Systems, Inc. Self adjusting bio-feedback method and apparatus
US4902469A (en) 1986-05-05 1990-02-20 Westinghouse Electric Corp. Status tree monitoring and display system
US4841292A (en) 1986-08-11 1989-06-20 Allied-Signal Inc. Third dimension pop up generation from a two-dimensional transformed image display
US5179656A (en) 1987-03-02 1993-01-12 International Business Machines Corporation Three dimensional directional pointer icon
US4930077A (en) 1987-04-06 1990-05-29 Fan David P Information processing expert system for text analysis and predicting public opinion based information available to the public
US4879849A (en) 1987-11-04 1989-11-14 Omni Films International, Inc. Point-of-view motion simulator system
US4970666A (en) 1988-03-30 1990-11-13 Land Development Laboratory, Inc. Computerized video imaging system for creating a realistic depiction of a simulated object in an actual environment
US5015188A (en) 1988-05-03 1991-05-14 The United States Of America As Represented By The Secretary Of The Air Force Three dimensional tactical element situation (3DTES) display
US4895376A (en) 1988-06-17 1990-01-23 Tigers Electronics, Inc. Interactive video game
US4908761A (en) 1988-09-16 1990-03-13 Innovare Resourceful Marketing Group, Inc. System for identifying heavy product purchasers who regularly use manufacturers' purchase incentives and predicting consumer promotional behavior response patterns
JP2762502B2 (en) 1988-12-29 1998-06-04 ダイキン工業株式会社 Stereoscopic display method and apparatus
US5031089A (en) 1988-12-30 1991-07-09 United States Of America As Represented By The Administrator, National Aeronautics And Space Administration Dynamic resource allocation scheme for distributed heterogeneous computer systems
US5371851A (en) 1989-04-26 1994-12-06 Credence Systems Corporation Graphical data base editor
US5255352A (en) 1989-08-03 1993-10-19 Computer Design, Inc. Mapping of two-dimensional surface detail on three-dimensional surfaces
US5347628A (en) 1990-01-18 1994-09-13 International Business Machines Corporation Method of graphically accessing electronic data
JP3245655B2 (en) 1990-03-05 2002-01-15 インキサイト ソフトウェア インコーポレイテッド Workspace display processing method
US5130794A (en) 1990-03-29 1992-07-14 Ritchey Kurtis J Panoramic display system
CA2040273C (en) 1990-04-13 1995-07-18 Kazu Horiuchi Image displaying system
US5058180A (en) 1990-04-30 1991-10-15 National Semiconductor Corporation Neural network apparatus and method for pattern recognition
FR2662009B1 (en) 1990-05-09 1996-03-08 Apple Computer MULTIPLE FACES MANOPULABLE ICON FOR DISPLAY ON COMPUTER.
US5276785A (en) 1990-08-02 1994-01-04 Xerox Corporation Moving viewpoint with respect to a target in a three-dimensional workspace
US5333272A (en) 1991-06-13 1994-07-26 International Business Machines Corporation Warning timer for users of interactive systems
US5381158A (en) 1991-07-12 1995-01-10 Kabushiki Kaisha Toshiba Information retrieval apparatus
US5745711A (en) 1991-10-23 1998-04-28 Hitachi, Ltd. Display control method and apparatus for an electronic conference
IL99923A0 (en) 1991-10-31 1992-08-18 Ibm Israel Method of operating a computer in a network
US6418424B1 (en) 1991-12-23 2002-07-09 Steven M. Hoffberg Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
US5502638A (en) 1992-02-10 1996-03-26 Honda Giken Kogyo Kabushiki Kaisha System for obstacle avoidance path planning for multiple-degree-of-freedom mechanism
US5442733A (en) 1992-03-20 1995-08-15 The Research Foundation Of State University Of New York Method and apparatus for generating realistic images using a discrete representation
US5761083A (en) 1992-03-25 1998-06-02 Brown, Jr.; Robert J. Energy management and home automation system
US5367614A (en) 1992-04-01 1994-11-22 Grumman Aerospace Corporation Three-dimensional computer image variable perspective display system
US5310349A (en) 1992-04-30 1994-05-10 Jostens Learning Corporation Instructional management system
JP3273443B2 (en) 1992-05-22 2002-04-08 本田技研工業株式会社 Trajectory generation method and apparatus for robot links and the like
US5287437A (en) 1992-06-02 1994-02-15 Sun Microsystems, Inc. Method and apparatus for head tracked display of precomputed stereo images
US5594859A (en) 1992-06-03 1997-01-14 Digital Equipment Corporation Graphical user interface for video teleconferencing
JPH07325934A (en) 1992-07-10 1995-12-12 Walt Disney Co:The Method and equipment for provision of graphics enhanced to virtual world
US5381526A (en) 1992-09-11 1995-01-10 Eastman Kodak Company Method and apparatus for storing and retrieving generalized image data
US5675746A (en) 1992-09-30 1997-10-07 Marshall; Paul S. Virtual reality generator for use with financial information
US5432895A (en) 1992-10-01 1995-07-11 University Corporation For Atmospheric Research Virtual reality imaging system
JP2807608B2 (en) 1992-12-29 1998-10-08 株式会社ナムコ Sorting processing apparatus, image synthesizing apparatus using the same, and sorting processing method
US5633993A (en) 1993-02-10 1997-05-27 The Walt Disney Company Method and apparatus for providing a virtual world sound system
US5555354A (en) 1993-03-23 1996-09-10 Silicon Graphics Inc. Method and apparatus for navigation within three-dimensional information landscape
EP0691056B2 (en) 1993-03-26 2008-06-11 Cisco Technology, Inc. Generic managed object model for lan domain
US5561736A (en) 1993-06-04 1996-10-01 International Business Machines Corporation Three dimensional speech synthesis
US5442569A (en) 1993-06-23 1995-08-15 Oceanautes Inc. Method and apparatus for system characterization and analysis using finite element methods
US5613048A (en) 1993-08-03 1997-03-18 Apple Computer, Inc. Three-dimensional image synthesis using view interpolation
JPH0759945A (en) 1993-08-23 1995-03-07 Sega Enterp Ltd Electronic game device having dome screen
US5689641A (en) 1993-10-01 1997-11-18 Vicor, Inc. Multimedia collaboration system arrangement for routing compressed AV signal through a participant site without decompressing the AV signal
US5498003A (en) 1993-10-07 1996-03-12 Gechter; Jerry Interactive electronic games and screen savers with multiple characters
US5630129A (en) 1993-12-01 1997-05-13 Sandia Corporation Dynamic load balancing of applications
CA2179523A1 (en) 1993-12-23 1995-06-29 David A. Boulton Method and apparatus for implementing user feedback
US5577981A (en) 1994-01-19 1996-11-26 Jarvik; Robert Virtual reality exercise machine and computer controlled video system
JP3704734B2 (en) 1994-01-26 2005-10-12 株式会社日立製作所 Texture mapping method and apparatus
GB2286510A (en) 1994-02-10 1995-08-16 Thomson Consumer Electronics Device for generating applause for karaoke vocals
US5990888A (en) 1994-03-22 1999-11-23 International Business Machines Corporation Method and system for manipulating graphical objects
WO1995029465A1 (en) 1994-04-21 1995-11-02 Sandia Corporation Multi-dimensional user oriented synthetic environment
US5563946A (en) 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
CA2143874C (en) 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5734805A (en) 1994-06-17 1998-03-31 International Business Machines Corporation Apparatus and method for controlling navigation in 3-D space
JP3428151B2 (en) 1994-07-08 2003-07-22 株式会社セガ Game device using image display device
US5535276A (en) 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US5736982A (en) 1994-08-03 1998-04-07 Nippon Telegraph And Telephone Corporation Virtual space apparatus with avatars and speech
US5799268A (en) 1994-09-28 1998-08-25 Apple Computer, Inc. Method for extracting knowledge from online documentation and creating a glossary, index, help database or the like
US5530796A (en) 1994-09-30 1996-06-25 International Business Machines Corporation Menu bar editor
US5685775A (en) 1994-10-28 1997-11-11 International Business Machines Corporation Networking video games over telephone network
US5835692A (en) 1994-11-21 1998-11-10 International Business Machines Corporation System and method for providing mapping notation in interactive video displays
DE69521977T2 (en) 1994-12-13 2002-04-04 International Business Machines Corp., Armonk Process and system for secure program distribution
US5584700A (en) 1994-12-19 1996-12-17 Advanced Technology And Research Corporation Virtual-reality based flycycle exercise machine
US5621906A (en) 1995-02-13 1997-04-15 The Trustees Of Columbia University In The City Of New York Perspective-based interface using an extended masthead
JPH08287288A (en) 1995-03-24 1996-11-01 Internatl Business Mach Corp <Ibm> Plurality of side annotations interactive three-dimensional graphics and hot link
US5694170A (en) 1995-04-06 1997-12-02 International Business Machines Corporation Video compression using multiple computing agents
US5774668A (en) 1995-06-07 1998-06-30 Microsoft Corporation System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing
EP0830774B1 (en) 1995-06-07 2004-10-06 divine technology ventures Internet server access control and monitoring systems
US5706507A (en) 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
US5860137A (en) 1995-07-21 1999-01-12 Emc Corporation Dynamic load balancing
US5878233A (en) 1995-08-07 1999-03-02 International Business Machines Corporation System, method, and computer program product for reviewing and creating advisories for data located on a content server
US5781449A (en) 1995-08-10 1998-07-14 Advanced System Technologies, Inc. Response time measurement apparatus and method
US5736990A (en) 1995-08-28 1998-04-07 Mitsubishi Electric Information Technology Center America, Inc. System for designing a virtual environment utilizing locales
US5768511A (en) 1995-09-18 1998-06-16 International Business Machines Corporation Method and system for managing objects in networked computer system with action performed in the server and object updated in the client
JP3745802B2 (en) 1995-10-13 2006-02-15 株式会社日立製作所 Image generation / display device
US5737619A (en) 1995-10-19 1998-04-07 Judson; David Hugh World wide web browsing with content delivery over an idle connection and interstitial content display
US5737533A (en) 1995-10-26 1998-04-07 Wegener Internet Projects Bv System for generating a virtual reality scene in response to a database search
US5977979A (en) 1995-10-31 1999-11-02 International Business Machines Corporation Simulated three-dimensional display using bit-mapped information
US6219045B1 (en) * 1995-11-13 2001-04-17 Worlds, Inc. Scalable virtual world chat client-server system
US5762552A (en) 1995-12-05 1998-06-09 Vt Tech Corp. Interactive real-time network gaming system
US5880731A (en) 1995-12-14 1999-03-09 Microsoft Corporation Use of avatars with automatic gesturing and bounded interaction in on-line chat session
US5850225A (en) 1996-01-24 1998-12-15 Evans & Sutherland Computer Corp. Image mapping system and process using panel shear transforms
US5963915A (en) 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US6426757B1 (en) 1996-03-04 2002-07-30 International Business Machines Corporation Method and apparatus for providing pseudo-3D rendering for virtual reality computer user interfaces
US5978841A (en) 1996-03-08 1999-11-02 Berger; Louis Look ahead caching process for improved information retrieval response time by caching bodies of information before they are requested by the user
US5745113A (en) 1996-04-03 1998-04-28 Institute For Research On Learning Representing work practices
US5702307A (en) 1996-04-11 1997-12-30 Moran; Kristen G. Pivotal, spherically shaped, motion simulator-with shifting means for controlling its' center of gravity
US5825877A (en) 1996-06-11 1998-10-20 International Business Machines Corporation Support for portable trusted software
US5898423A (en) 1996-06-25 1999-04-27 Sun Microsystems, Inc. Method and apparatus for eyetrack-driven captioning
US5736985A (en) 1996-07-02 1998-04-07 International Business Machines Corp. GUI pushbutton with multi-function mini-button
US5862337A (en) 1996-07-12 1999-01-19 Microsoft Corporation Determining throughput dynamically
US6570587B1 (en) 1996-07-26 2003-05-27 Veon Ltd. System and method and linking information to a video
US5889989A (en) 1996-09-16 1999-03-30 The Research Foundation Of State University Of New York Load sharing controller for optimizing monetary cost
US6195657B1 (en) 1996-09-26 2001-02-27 Imana, Inc. Software, method and apparatus for efficient categorization and recommendation of subjects according to multidimensional semantics
US6346956B2 (en) 1996-09-30 2002-02-12 Sony Corporation Three-dimensional virtual reality space display processing apparatus, a three-dimensional virtual reality space display processing method, and an information providing medium
US6437777B1 (en) 1996-09-30 2002-08-20 Sony Corporation Three-dimensional virtual reality space display processing apparatus, a three-dimensional virtual reality space display processing method, and an information providing medium
US5926179A (en) 1996-09-30 1999-07-20 Sony Corporation Three-dimensional virtual reality space display processing apparatus, a three-dimensional virtual reality space display processing method, and an information providing medium
US5990896A (en) 1996-09-30 1999-11-23 Mitsubishi Electric Information Technology Center America, Inc. (Ita) Rapid and efficient terrain surface finding system
JPH10187638A (en) 1996-10-28 1998-07-21 Mitsubishi Electric Corp Cluster control system
US5796393A (en) 1996-11-08 1998-08-18 Compuserve Incorporated System for intergrating an on-line service community with a foreign service
US5884029A (en) 1996-11-14 1999-03-16 International Business Machines Corporation User interaction with intelligent virtual objects, avatars, which interact with other avatars controlled by different users
US5982372A (en) 1996-11-14 1999-11-09 International Business Machines Corp. Visual metaphor for shortcut navigation in a virtual world
US5983003A (en) 1996-11-15 1999-11-09 International Business Machines Corp. Interactive station indicator and user qualifier for virtual worlds
US5919045A (en) 1996-11-18 1999-07-06 Mariah Vision3 Entertainment Llc Interactive race car simulator system
US5920325A (en) 1996-11-20 1999-07-06 International Business Machines Corporation Prioritization of background display during animation
US6023698A (en) 1996-12-05 2000-02-08 International Business Machines Corporation System and method for transparently registering and updating information over the internet
US5884024A (en) 1996-12-09 1999-03-16 Sun Microsystems, Inc. Secure DHCP server
US6148294A (en) 1996-12-20 2000-11-14 Siemens Information And Communication Networks, Inc. System and method for computer directory updating and presentation based on frequency of access
US5854897A (en) 1996-12-27 1998-12-29 Quantum Systems, Inc. Network communications marketing system
US5835094A (en) 1996-12-31 1998-11-10 Compaq Computer Corporation Three-dimensional computer environment
US6111581A (en) 1997-01-27 2000-08-29 International Business Machines Corporation Method and system for classifying user objects in a three-dimensional (3D) environment on a display in a computer system
US6081270A (en) 1997-01-27 2000-06-27 International Business Machines Corporation Method and system for providing an improved view of an object in a three-dimensional environment on a computer display
US5875296A (en) 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US5969724A (en) 1997-01-31 1999-10-19 International Business Machines Corporation Method and system for navigating through opaque structures on a display
US5908469A (en) 1997-02-14 1999-06-01 International Business Machines Corporation Generic user authentication for network computers
US5903266A (en) 1997-02-18 1999-05-11 International Business Machines Corporation Audio setup and use instructions
US5969720A (en) 1997-03-07 1999-10-19 International Business Machines Corporation Data processing system and method for implementing an informative container for a file system
US6138128A (en) 1997-04-02 2000-10-24 Microsoft Corp. Sharing and organizing world wide web references using distinctive characters
US6137904A (en) 1997-04-04 2000-10-24 Sarnoff Corporation Method and apparatus for assessing the visibility of differences between two signal sequences
US6104406A (en) 1997-04-04 2000-08-15 International Business Machines Corporation Back away navigation from three-dimensional objects in three-dimensional workspace interactive displays
US6734884B1 (en) 1997-04-04 2004-05-11 International Business Machines Corporation Viewer interactive three-dimensional objects and two-dimensional images in virtual three-dimensional workspace
US6271842B1 (en) 1997-04-04 2001-08-07 International Business Machines Corporation Navigation via environmental objects in three-dimensional workspace interactive displays
US5923324A (en) 1997-04-04 1999-07-13 International Business Machines Corporation Viewer interactive three-dimensional workspace with interactive three-dimensional objects and corresponding two-dimensional images of objects in an interactive two-dimensional workplane
US6115718A (en) 1998-04-01 2000-09-05 Xerox Corporation Method and apparatus for predicting document access in a collection of linked documents featuring link proprabilities and spreading activation
US6037950A (en) 1997-04-18 2000-03-14 Polaroid Corporation Configurable, extensible, integrated profile generation and maintenance environment for facilitating image transfer between transform spaces
US6003065A (en) 1997-04-24 1999-12-14 Sun Microsystems, Inc. Method and system for distributed processing of applications on host and peripheral devices
US5911045A (en) 1997-04-24 1999-06-08 International Business Machines Corp. Method and system for sharing information in a virtual reality world
US5900879A (en) 1997-04-28 1999-05-04 International Business Machines Corporation Three-dimensional workspace interactive display having browsing viewpoints for navigation and work viewpoints for user-object interactive non-navigational work functions with automatic switching to browsing viewpoints upon completion of work functions
US5944824A (en) 1997-04-30 1999-08-31 Mci Communications Corporation System and method for single sign-on to a plurality of network elements
US6216098B1 (en) 1997-04-30 2001-04-10 Institute For Research On Learning Simulating work behavior
US6144381A (en) 1997-05-14 2000-11-07 International Business Machines Corporation Systems, methods and computer program products for compass navigation of avatars in three dimensional worlds
US6081271A (en) 1997-05-23 2000-06-27 International Business Machines Corporation Determining view point on objects automatically in three-dimensional workspace from other environmental objects in a three-dimensional workspace
US5903271A (en) 1997-05-23 1999-05-11 International Business Machines Corporation Facilitating viewer interaction with three-dimensional objects and two-dimensional images in virtual three-dimensional workspace by drag and drop technique
US6064389A (en) 1997-05-27 2000-05-16 International Business Machines Corporation Distance dependent selective activation of three-dimensional objects in three-dimensional workspace interactive displays
JP3199231B2 (en) 1997-05-27 2001-08-13 日本アイ・ビー・エム株式会社 Method and system for embedding information in three-dimensional shape model
US6351775B1 (en) 1997-05-30 2002-02-26 International Business Machines Corporation Loading balancing across servers in a computer network
US6271843B1 (en) 1997-05-30 2001-08-07 International Business Machines Corporation Methods systems and computer program products for transporting users in three dimensional virtual reality worlds using transportation vehicles
AUPO710597A0 (en) 1997-06-02 1997-06-26 Knowledge Horizons Pty. Ltd. Methods and systems for knowledge management
US5933818A (en) 1997-06-02 1999-08-03 Electronic Data Systems Corporation Autonomous knowledge discovery system and method
US6025839A (en) 1997-06-06 2000-02-15 International Business Machines Corp. Method for displaying information in a virtual reality environment
US6179713B1 (en) 1997-06-18 2001-01-30 Circadence Corporation Full-time turn based network multiplayer game
US6058266A (en) 1997-06-24 2000-05-02 International Business Machines Corporation Method of, system for, and computer program product for performing weighted loop fusion by an optimizing compiler
WO1999000958A1 (en) 1997-06-26 1999-01-07 British Telecommunications Plc Data communications
US5883628A (en) 1997-07-03 1999-03-16 International Business Machines Corporation Climability: property for objects in 3-D virtual environments
US6094196A (en) 1997-07-03 2000-07-25 International Business Machines Corporation Interaction spheres of three-dimensional objects in three-dimensional workspace displays
US6657642B1 (en) 1997-07-03 2003-12-02 International Business Machines Corporation User interactive display interfaces with means for interactive formation of combination display objects representative of combined interactive functions
US6069632A (en) 1997-07-03 2000-05-30 International Business Machines Corporation Passageway properties: customizable protocols for entry and exit of places
US6014145A (en) 1997-07-07 2000-01-11 International Business Machines Corporation Navagation with optimum viewpoints in three-dimensional workspace interactive displays having three-dimensional objects with collision barriers
US6256043B1 (en) 1997-09-26 2001-07-03 Lucent Technologies Inc. Three dimensional virtual reality enhancement techniques
US6006223A (en) 1997-08-12 1999-12-21 International Business Machines Corporation Mapping words, phrases using sequential-pattern to find user specific trends in a text database
US6021268A (en) 1997-08-21 2000-02-01 Analytical Graphics, Inc. Method and apparatus for modeling receiver bandwidth for telecommunications analysis
US6539415B1 (en) 1997-09-24 2003-03-25 Sony Corporation Method and apparatus for the allocation of audio/video tasks in a network system
JPH1198134A (en) 1997-09-24 1999-04-09 Nippon Telegr & Teleph Corp <Ntt> Method for detecting fraudulent alteration and copy of cookie, and program storage medium
GB2330739A (en) 1997-09-26 1999-04-28 Ibm Transmitting data packets over a network to remote users of a multi-user computer game according to multi-user proximity groups
US6018734A (en) 1997-09-29 2000-01-25 Triada, Ltd. Multi-dimensional pattern analysis
US5938722A (en) 1997-10-15 1999-08-17 Mci Communications Corporation Method of executing programs in a network
US6134588A (en) 1997-11-12 2000-10-17 International Business Machines Corporation High availability web browser access to servers
US8272959B2 (en) 1997-11-14 2012-09-25 Elottery, Inc. Interactive computer gaming system with audio response
US6236978B1 (en) 1997-11-14 2001-05-22 New York University System and method for dynamic profiling of users in one-to-one applications
US6023270A (en) 1997-11-17 2000-02-08 International Business Machines Corporation Delivery of objects in a virtual world using a descriptive container
FR2770986B1 (en) 1997-11-18 1999-12-31 Aldes Aeraulique TAKE FOR THE CONNECTION OF A DUST SUCTION PIPE TO A CENTRALIZED SUCTION SYSTEM
JPH11154178A (en) 1997-11-19 1999-06-08 Fujitsu Ltd Communication managing device and recording medium
US6098056A (en) 1997-11-24 2000-08-01 International Business Machines Corporation System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet
US6345287B1 (en) 1997-11-26 2002-02-05 International Business Machines Corporation Gang scheduling for resource allocation in a cluster computing environment
US6091410A (en) 1997-11-26 2000-07-18 International Business Machines Corporation Avatar pointing mode
US6070143A (en) 1997-12-05 2000-05-30 Lucent Technologies Inc. System and method for analyzing work requirements and linking human resource products to jobs
GB2332288A (en) 1997-12-10 1999-06-16 Northern Telecom Ltd agent enabling technology
US6601084B1 (en) 1997-12-19 2003-07-29 Avaya Technology Corp. Dynamic load balancer for multiple network servers
US6356297B1 (en) 1998-01-15 2002-03-12 International Business Machines Corporation Method and apparatus for displaying panoramas with streaming video
US6345264B1 (en) 1998-01-22 2002-02-05 Microsoft Corporation Methods and apparatus, using expansion attributes having default, values, for matching entities and predicting an attribute of an entity
US6148328A (en) 1998-01-29 2000-11-14 International Business Machines Corp. Method and system for signaling presence of users in a networked environment
US6466213B2 (en) 1998-02-13 2002-10-15 Xerox Corporation Method and apparatus for creating personal autonomous avatars
US6396509B1 (en) 1998-02-21 2002-05-28 Koninklijke Philips Electronics N.V. Attention-based interaction in a virtual environment
US6329986B1 (en) 1998-02-21 2001-12-11 U.S. Philips Corporation Priority-based virtual environment
EP0940960A1 (en) 1998-03-02 1999-09-08 Hewlett-Packard Company Authentication between servers
US7302402B2 (en) 1998-03-30 2007-11-27 International Business Machines Corporation Method, system and program products for sharing state information across domains
US6059842A (en) 1998-04-14 2000-05-09 International Business Machines Corp. System and method for optimizing computer software and hardware
US6009455A (en) 1998-04-20 1999-12-28 Doyle; John F. Distributed computation utilizing idle networked computers
US6141699A (en) 1998-05-11 2000-10-31 International Business Machines Corporation Interactive display system for sequential retrieval and display of a plurality of interrelated data sets
US6249779B1 (en) 1998-05-13 2001-06-19 Ben A. Hitt Adaptive fuzzy feature mapping
US6185614B1 (en) 1998-05-26 2001-02-06 International Business Machines Corp. Method and system for collecting user profile information over the world-wide web in the presence of dynamic content using document comparators
US7146627B1 (en) 1998-06-12 2006-12-05 Metabyte Networks, Inc. Method and apparatus for delivery of targeted video programming
US6226009B1 (en) 1998-06-29 2001-05-01 Lucent Technologies Inc. Display techniques for three dimensional virtual reality
EP1098857A1 (en) 1998-06-30 2001-05-16 SDL, Inc. Method and apparatus for manufacturing a rare earth metal doped optical fiber preform
GB2339128A (en) 1998-06-30 2000-01-12 Ibm Meyhod and system for transfering data using a graphical user interface
US6275820B1 (en) 1998-07-16 2001-08-14 Perot Systems Corporation System and method for integrating search results from heterogeneous information resources
US6334127B1 (en) 1998-07-17 2001-12-25 Net Perceptions, Inc. System, method and article of manufacture for making serendipity-weighted recommendations to a user
JP3033956B2 (en) 1998-07-23 2000-04-17 インターナショナル・ビジネス・マシーンズ・コーポレイション Method for changing display attributes of graphic objects, method for selecting graphic objects, graphic object display control device, storage medium storing program for changing display attributes of graphic objects, and program for controlling selection of graphic objects Storage media
US6549933B1 (en) 1998-08-04 2003-04-15 International Business Machines Corporation Managing, accessing, and retrieving networked information using physical objects associated with the networked information
US6205480B1 (en) 1998-08-19 2001-03-20 Computer Associates Think, Inc. System and method for web server user authentication
US6177932B1 (en) 1998-08-21 2001-01-23 Kana Communications, Inc. Method and apparatus for network based customer service
US6282547B1 (en) 1998-08-25 2001-08-28 Informix Software, Inc. Hyperlinked relational database visualization system
US6393467B1 (en) 1998-08-31 2002-05-21 Nortel Networks Limited Network interconnected computing device, server and notification method
US6233583B1 (en) 1998-09-10 2001-05-15 International Business Machines Corporation Report generator for use within a lotus notes database system
US6594673B1 (en) 1998-09-15 2003-07-15 Microsoft Corporation Visualizations for collaborative information
US6266649B1 (en) 1998-09-18 2001-07-24 Amazon.Com, Inc. Collaborative recommendations using item-to-item similarity mappings
US6308208B1 (en) 1998-09-30 2001-10-23 International Business Machines Corporation Method for monitoring network distributed computing resources using distributed cellular agents
US6445389B1 (en) 1998-10-06 2002-09-03 International Business Machines Corp. Compression of polygonal models with low latency decompression
US6466550B1 (en) 1998-11-11 2002-10-15 Cisco Technology, Inc. Distributed conferencing system utilizing data networks
US6353449B1 (en) 1998-12-10 2002-03-05 International Business Machines Corporation Communicating screen saver
US9183306B2 (en) 1998-12-18 2015-11-10 Microsoft Technology Licensing, Llc Automated selection of appropriate information based on a computer user's context
US7073129B1 (en) 1998-12-18 2006-07-04 Tangis Corporation Automated selection of appropriate information based on a computer user's context
US6363174B1 (en) 1998-12-28 2002-03-26 Sony Corporation Method and apparatus for content identification and categorization of textual data
US6418462B1 (en) 1999-01-07 2002-07-09 Yongyong Xu Global sideband service distributed computing method
US6311206B1 (en) 1999-01-13 2001-10-30 International Business Machines Corporation Method and apparatus for providing awareness-triggered push
US6222551B1 (en) 1999-01-13 2001-04-24 International Business Machines Corporation Methods and apparatus for providing 3D viewpoint selection in a server/client arrangement
US6237033B1 (en) 1999-01-13 2001-05-22 Pitney Bowes Inc. System for managing user-characterizing network protocol headers
US6199067B1 (en) 1999-01-20 2001-03-06 Mightiest Logicon Unisearch, Inc. System and method for generating personalized user profiles and for utilizing the generated user profiles to perform adaptive internet searches
EP1024647B1 (en) 1999-01-29 2007-08-15 International Business Machines Corporation Hybrid conferencing system
US6334141B1 (en) 1999-02-02 2001-12-25 International Business Machines Corporation Distributed server for real-time collaboration
US6452593B1 (en) 1999-02-19 2002-09-17 International Business Machines Corporation Method and system for rendering a virtual three-dimensional graphical display
US6314465B1 (en) 1999-03-11 2001-11-06 Lucent Technologies Inc. Method and apparatus for load sharing on a wide area network
US6469712B1 (en) 1999-03-25 2002-10-22 International Business Machines Corporation Projected audio for computer displays
US6388688B1 (en) 1999-04-06 2002-05-14 Vergics Corporation Graph-based visual navigation through spatial environments
US6753857B1 (en) 1999-04-16 2004-06-22 Nippon Telegraph And Telephone Corporation Method and system for 3-D shared virtual environment display communication virtual conference and programs therefor
US6346938B1 (en) 1999-04-27 2002-02-12 Harris Corporation Computer-resident mechanism for manipulating, navigating through and mensurating displayed image of three-dimensional geometric model
US6763371B1 (en) 1999-05-10 2004-07-13 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for collaborative communication in a communication network
US7006616B1 (en) 1999-05-21 2006-02-28 Terayon Communication Systems, Inc. Teleconferencing bridge with EdgePoint mixing
US6462760B1 (en) 1999-05-26 2002-10-08 International Business Machines Corporation User interfaces, methods, and computer program products that can conserve space on a computer display screen by associating an icon with a plurality of operations
US6519571B1 (en) 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US6505208B1 (en) 1999-06-09 2003-01-07 International Business Machines Corporation Educational monitoring method and system for improving interactive skills based on participants on the network
JP2001014282A (en) 1999-06-29 2001-01-19 Sony Corp Device and method for information processing and medium
US6499053B1 (en) 1999-06-30 2002-12-24 International Business Machines Corporation Master/slave architecture for a distributed chat application in a bandwidth constrained network
GB2352154B (en) 1999-07-16 2003-08-27 Ibm Automatic target enlargement for simplified selection
US6496851B1 (en) 1999-08-04 2002-12-17 America Online, Inc. Managing negotiations between users of a computer network by automatically engaging in proposed activity using parameters of counterproposal of other user
US6330281B1 (en) 1999-08-06 2001-12-11 Richfx Ltd. Model-based view extrapolation for interactive virtual reality systems
US6618751B1 (en) 1999-08-20 2003-09-09 International Business Machines Corporation Systems and methods for publishing data with expiration times
ATE345002T1 (en) 1999-09-24 2006-11-15 Citicorp Dev Ct Inc METHOD AND APPARATUS FOR AUTHENTICATED ACCESS TO A MULTIPLE NETWORK OPERATORS THROUGH A SINGLE LOGIN
US6574477B1 (en) 1999-10-06 2003-06-03 Lucent Technologies Inc. Dynamic load balancing during message processing in a wireless communication service network
JP2001119403A (en) 1999-10-20 2001-04-27 Aval Data Corp Usage pattern analysis method for data transfer resource and usage pattern analyzer
US6684255B1 (en) 1999-10-26 2004-01-27 International Business Machines Corporation Methods and apparatus for transmission and rendering of complex 3D models over networks using mixed representations
US6772195B1 (en) 1999-10-29 2004-08-03 Electronic Arts, Inc. Chat clusters for a virtual world application
US6525731B1 (en) 1999-11-09 2003-02-25 Ibm Corporation Dynamic view-dependent texture mapping
AU1195401A (en) 1999-11-12 2001-05-30 Net Perceptions, Inc. Interest based recommendation method and system
US6349091B1 (en) 1999-11-12 2002-02-19 Itt Manufacturing Enterprises, Inc. Method and apparatus for controlling communication links between network nodes to reduce communication protocol overhead traffic
US20050210413A1 (en) 1999-11-24 2005-09-22 Quek Su M Utilization of digital images
US6473085B1 (en) 1999-12-17 2002-10-29 International Business Machines Corporation System for dynamically adjusting image quality for interactive graphics applications
US6742032B1 (en) 1999-12-17 2004-05-25 Xerox Corporation Method for monitoring and encouraging community activity in a networked environment
US7012627B1 (en) 1999-12-28 2006-03-14 International Business Machines Corporation System and method for presentation of room navigation
AU2463001A (en) 1999-12-30 2001-07-16 Umagic Systems, Inc. Personal advice system and method
US6636889B1 (en) 2000-01-04 2003-10-21 International Business Machines Corporation System and method for client replication of collaboration space
US6674484B1 (en) 2000-01-10 2004-01-06 Koninklijke Philips Electronics N.V. Video sample rate conversion to achieve 3-D effects
US7328233B2 (en) 2000-01-19 2008-02-05 Corybant, Inc. Method and apparatus for implementing an active information model
JP2001204973A (en) 2000-01-27 2001-07-31 Snk Corp Communication game system and game terminal used for communication game, and game method
US6781607B1 (en) 2000-01-27 2004-08-24 International Business Machines Corporation Method and system for dynamically determining the appropriate information and/or user interface for presentation to differing users
WO2001056007A1 (en) 2000-01-28 2001-08-02 Intersense, Inc. Self-referenced tracking
US6954799B2 (en) 2000-02-01 2005-10-11 Charles Schwab & Co., Inc. Method and apparatus for integrating distributed shared services system
JP3579823B2 (en) 2000-02-14 2004-10-20 インターナショナル・ビジネス・マシーンズ・コーポレーション How to display a character string
GB2359704B (en) 2000-02-26 2002-05-08 Proksim Software Inc Sharing a computer-generated environment
GB2368665A (en) 2000-03-02 2002-05-08 Outersonic Ltd On-line multimedia product catalogue
US6746332B1 (en) 2000-03-16 2004-06-08 Sony Computer Entertainment America Inc. Visual display system for multi-user application
US6672961B1 (en) 2000-03-16 2004-01-06 Sony Computer Entertainment America Inc. Computer system and method of displaying images
US6767287B1 (en) 2000-03-16 2004-07-27 Sony Computer Entertainment America Inc. Computer system and method for implementing a virtual reality environment for a multi-player game
EP1266280B1 (en) 2000-03-20 2006-08-16 BRITISH TELECOMMUNICATIONS public limited company Data entry
US6948168B1 (en) 2000-03-30 2005-09-20 International Business Machines Corporation Licensed application installer
US7353295B1 (en) 2000-04-04 2008-04-01 Motive, Inc. Distributed services architecture through use of a dynamic service point map
US6473597B1 (en) 2000-04-12 2002-10-29 Thomas M. Johnson Method and apparatus for modeling transmitter bandwidth for telecommunications analysis
US20020002602A1 (en) 2000-04-17 2002-01-03 Mark Vange System and method for serving a web site from multiple servers
US6784901B1 (en) 2000-05-09 2004-08-31 There Method, system and computer program product for the delivery of a chat message in a 3D multi-user environment
US6845389B1 (en) 2000-05-12 2005-01-18 Nortel Networks Limited System and method for broadband multi-user communication sessions
US6954728B1 (en) 2000-05-15 2005-10-11 Avatizing, Llc System and method for consumer-selected advertising and branding in interactive media
US20020032903A1 (en) 2000-05-26 2002-03-14 Sprunk Eric J. Authorization using ciphertext tokens
US6978304B2 (en) 2000-05-26 2005-12-20 Pearl Software, Inc. Method of remotely monitoring an internet session
US6611863B1 (en) 2000-06-05 2003-08-26 Intel Corporation Automatic device assignment through programmable device discovery for policy based network management
US20020107918A1 (en) 2000-06-15 2002-08-08 Shaffer James D. System and method for capturing, matching and linking information in a global communications network
US20020023018A1 (en) 2000-06-20 2002-02-21 Robert Kleinbaum Method and system for network-based community for sharing information services
WO2002003258A1 (en) 2000-06-30 2002-01-10 California Institute Of Technology Method and apparatus for heterogeneous distributed computation
AU2001271514A1 (en) 2000-06-30 2002-01-14 Nokia Inc. Method and apparatus to synchronize audio and visual application data presentation
US6832239B1 (en) 2000-07-07 2004-12-14 International Business Machines Corporation Systems for managing network resources
US7227526B2 (en) 2000-07-24 2007-06-05 Gesturetek, Inc. Video-based image control system
US6819669B2 (en) 2000-07-26 2004-11-16 International Business Machines Corporation Method and system for data communication
EP1176828B1 (en) 2000-07-26 2007-10-24 International Business Machines Corporation Method and system for data communication
EP1178409A1 (en) 2000-08-01 2002-02-06 DR. Riccardo Genghini Studio Notarile Genghini Cookiemanager to control the exchange of cookies in an Internet client-server computersystem
ATE244075T1 (en) 2000-08-30 2003-07-15 Pfeiffer Erich Gmbh & Co Kg MINIATURE DISPENSER FOR DISPENSING FRAGRANCES IN VARIOUS APPLICATIONS AND ENVIRONMENTS
KR100415372B1 (en) 2000-08-31 2004-01-16 (주) 고미드 System and method for determining the users having the similar registered information on a cyber space
US8302127B2 (en) 2000-09-25 2012-10-30 Thomson Licensing System and method for personalized TV
US7319992B2 (en) 2000-09-25 2008-01-15 The Mission Corporation Method and apparatus for delivering a virtual reality environment
US7139792B1 (en) 2000-09-29 2006-11-21 Intel Corporation Mechanism for locking client requests to a particular server
AU2001234576A1 (en) 2000-10-04 2002-04-15 Ezonics Corporation A method and system for internet-based video chat
US8316450B2 (en) 2000-10-10 2012-11-20 Addn Click, Inc. System for inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, N-dimensional virtual environments and/or other value derivable from the content
US6826523B1 (en) 2000-11-01 2004-11-30 Sony Computer Entertainment America Inc. Application development interface for multi-user applications executable over communication networks
US6934756B2 (en) 2000-11-01 2005-08-23 International Business Machines Corporation Conversational networking via transport, coding and control conversational protocols
US7091976B1 (en) 2000-11-03 2006-08-15 At&T Corp. System and method of customizing animated entities for use in a multi-media communication application
US6963839B1 (en) 2000-11-03 2005-11-08 At&T Corp. System and method of controlling sound in a multi-media communication application
KR20020038229A (en) 2000-11-17 2002-05-23 김응천 On-line game method and system for providing a real-time audio and video chatting service
JP2002157206A (en) 2000-11-17 2002-05-31 Square Co Ltd Method and system for taking part in electronic conference
US6886026B1 (en) 2000-11-21 2005-04-26 International Business Machines Corporation Method and apparatus providing autonomous discovery of potential trading partners in a dynamic, decentralized information economy
US20030177187A1 (en) 2000-11-27 2003-09-18 Butterfly.Net. Inc. Computing grid for massively multi-player online games and other multi-user immersive persistent-state and session-based applications
US6717600B2 (en) 2000-12-15 2004-04-06 International Business Machines Corporation Proximity selection of selectable item in a graphical user interface
JP4395687B2 (en) 2000-12-20 2010-01-13 ソニー株式会社 Information processing device
JP2002197376A (en) 2000-12-27 2002-07-12 Fujitsu Ltd Method and device for providing virtual world customerized according to user
US6567813B1 (en) 2000-12-29 2003-05-20 Webex Communications, Inc. Quality of service maintenance for distributed collaborative computing
US20020095586A1 (en) 2001-01-17 2002-07-18 International Business Machines Corporation Technique for continuous user authentication
AU2002303082A1 (en) 2001-01-26 2002-09-12 Zaxel Systems, Inc. Real-time virtual viewpoint in simulated reality environment
US20020124137A1 (en) 2001-01-29 2002-09-05 Ulrich Thomas R. Enhancing disk array performance via variable parity based load balancing
US6964023B2 (en) 2001-02-05 2005-11-08 International Business Machines Corporation System and method for multi-modal focus detection, referential ambiguity resolution and mood classification using multi-modal input
US20020112002A1 (en) 2001-02-15 2002-08-15 Abato Michael R. System and process for creating a virtual stage and presenting enhanced content via the virtual stage
US7366759B2 (en) 2001-02-22 2008-04-29 Parity Communications, Inc. Method and system for characterizing relationships in social networks
US6765596B2 (en) 2001-02-27 2004-07-20 International Business Machines Corporation Multi-functional application launcher with integrated status
US6981223B2 (en) 2001-03-19 2005-12-27 Ecrio, Inc. Method, apparatus and computer readable medium for multiple messaging session management with a graphical user interface
US20020138588A1 (en) * 2001-03-20 2002-09-26 Richard Leeds System and method for adaptive forums communication
US20020138607A1 (en) 2001-03-22 2002-09-26 There System, method and computer program product for data mining in a three-dimensional multi-user environment
US20020152147A1 (en) 2001-04-17 2002-10-17 Shulman John Gordon System and method for interest-based data management
US6836480B2 (en) 2001-04-20 2004-12-28 International Business Machines Corporation Data structures for efficient processing of multicast transmissions
AUPR464601A0 (en) 2001-04-30 2001-05-24 Commonwealth Of Australia, The Shapes vector
US20020198940A1 (en) 2001-05-03 2002-12-26 Numedeon, Inc. Multi-tiered safety control system and methods for online communities
US20060253784A1 (en) 2001-05-03 2006-11-09 Bower James M Multi-tiered safety control system and methods for online communities
JP3990170B2 (en) 2001-05-10 2007-10-10 株式会社ソニー・コンピュータエンタテインメント Information processing system, information processing program, computer-readable recording medium storing information processing program, and information processing method
US7571389B2 (en) 2001-05-31 2009-08-04 International Business Machines Corporation System, computer-readable storage device, and method for combining the functionality of multiple text controls in a graphical user interface
US20030008712A1 (en) 2001-06-04 2003-01-09 Playnet, Inc. System and method for distributing a multi-client game/application over a communications network
US7269632B2 (en) 2001-06-05 2007-09-11 Xdyne, Inc. Networked computer system for communicating and operating in a virtual reality environment
US20030040946A1 (en) 2001-06-25 2003-02-27 Sprenger Stanley C. Travel planning system and method
US6657617B2 (en) 2001-06-25 2003-12-02 International Business Machines Corporation Method, apparatus and computer program product for three dimensional text creation
US7143409B2 (en) 2001-06-29 2006-11-28 International Business Machines Corporation Automated entitlement verification for delivery of licensed software
US20030037131A1 (en) 2001-08-17 2003-02-20 International Business Machines Corporation User information coordination across multiple domains
US7454464B2 (en) 2001-09-10 2008-11-18 Intel Corporation Peer discovery and connection management based on context sensitive social networks
US7321925B2 (en) 2001-09-18 2008-01-22 Intel Corporation Load balancing and fault tolerance for server-based software applications
US7493363B2 (en) 2001-09-19 2009-02-17 Microsoft Corporation Peer-to-peer group management and method for maintaining peer-to-peer graphs
US7062533B2 (en) 2001-09-20 2006-06-13 International Business Machines Corporation Specifying monitored user participation in messaging sessions
US7439975B2 (en) 2001-09-27 2008-10-21 International Business Machines Corporation Method and system for producing dynamically determined drop shadows in a three-dimensional graphical user interface
US20030084302A1 (en) 2001-10-29 2003-05-01 Sun Microsystems, Inc., A Delaware Corporation Portability and privacy with data communications network browsing
US20030084172A1 (en) 2001-10-29 2003-05-01 Sun Microsystem, Inc., A Delaware Corporation Identification and privacy in the World Wide Web
KR20030035138A (en) 2001-10-30 2003-05-09 한국전자통신연구원 Transmit method of state message in client-server-based networked virtual environment
US7671861B1 (en) 2001-11-02 2010-03-02 At&T Intellectual Property Ii, L.P. Apparatus and method of customizing animated entities for use in a multi-media communication application
KR20030039019A (en) 2001-11-09 2003-05-17 신선혜 Medium storing a Computer Program with a Function of Lip-sync and Emotional Expression on 3D Scanned Real Facial Image during Realtime Text to Speech Conversion, and Online Game, Email, Chatting, Broadcasting and Foreign Language Learning Method using the Same
US7225256B2 (en) 2001-11-30 2007-05-29 Oracle International Corporation Impersonation in an access system
US7610390B2 (en) 2001-12-04 2009-10-27 Sun Microsystems, Inc. Distributed network identity
ATE306176T1 (en) 2001-12-07 2005-10-15 ACCESS PROVISION METHOD AND SYSTEM FOR SUBSCRIBER SERVICES
EP1318453A1 (en) 2001-12-07 2003-06-11 Hewlett-Packard Company Scheduling system, method and apparatus for a cluster
US7100197B2 (en) 2001-12-10 2006-08-29 Electronic Data Systems Corporation Network user authentication system and method
US7028296B2 (en) 2001-12-13 2006-04-11 International Business Machines Corporation Distributing computer programs to a customer's multiple client computers through a hypertext markup language document distributed to and stored on the customer's network server computer
US6993596B2 (en) 2001-12-19 2006-01-31 International Business Machines Corporation System and method for user enrollment in an e-community
US7159217B2 (en) 2001-12-20 2007-01-02 Cadence Design Systems, Inc. Mechanism for managing parallel execution of processes in a distributed computing environment
US20030119531A1 (en) 2001-12-21 2003-06-26 Patton Charles M. Dynamic selection of avatar policies based on physical device location and derived user control
JP2003191579A (en) 2001-12-27 2003-07-09 Sharp Corp Electronic controller
US20030122858A1 (en) 2002-01-03 2003-07-03 Martin Mauve Partial identification and usage of objects in virtual worlds
AU2003201032A1 (en) 2002-01-07 2003-07-24 Stephen James Crampton Method and apparatus for an avatar user interface system
US7287053B2 (en) 2002-01-15 2007-10-23 International Business Machines Corporation Ad hoc data sharing in virtual team rooms
US20030145128A1 (en) 2002-01-25 2003-07-31 Baird Roger T. Mapping managing devices to managed devices
US6645153B2 (en) 2002-02-07 2003-11-11 Pacesetter, Inc. System and method for evaluating risk of mortality due to congestive heart failure using physiologic sensors
US7221935B2 (en) 2002-02-28 2007-05-22 Telefonaktiebolaget Lm Ericsson (Publ) System, method and apparatus for federated single sign-on services
US6988240B2 (en) 2002-03-29 2006-01-17 Global Knowledge, Inc. Methods and apparatus for low overhead enhancement of web page and markup language presentations
US8516114B2 (en) 2002-03-29 2013-08-20 International Business Machines Corporation Method and apparatus for content pre-fetching and preparation
US7203909B1 (en) 2002-04-04 2007-04-10 Microsoft Corporation System and methods for constructing personalized context-sensitive portal pages or views by analyzing patterns of users' information access activities
JP3559024B2 (en) 2002-04-04 2004-08-25 マイクロソフト コーポレイション GAME PROGRAM AND GAME DEVICE
US6580981B1 (en) 2002-04-16 2003-06-17 Meshnetworks, Inc. System and method for providing wireless telematics store and forward messaging for peer-to-peer and peer-to-peer-to-infrastructure a communication network
US7124071B2 (en) 2002-04-18 2006-10-17 International Business Machines Corporation Partitioning a model into a plurality of independent partitions to be processed within a distributed environment
US6993586B2 (en) 2002-05-09 2006-01-31 Microsoft Corporation User intention modeling for web navigation
US20030220980A1 (en) 2002-05-24 2003-11-27 Crane Jeffrey Robert Method and system for providing a computer network-based community-building function through user-to-user ally association
US6970929B2 (en) 2002-06-12 2005-11-29 Inha University Foundation Vector-based, clustering web geographic information system and control method thereof
EP1552373A4 (en) 2002-06-17 2007-01-17 Porto Ranelli S A Enabling communication between users surfing the same web page
US10298700B2 (en) 2002-06-25 2019-05-21 Artimys Technologies Llc System and method for online monitoring of and interaction with chat and instant messaging participants
US7918730B2 (en) 2002-06-27 2011-04-05 Igt Trajectory-based 3-D games of chance for video gaming machines
US7230616B2 (en) 2002-07-31 2007-06-12 International Business Machines Corporation Bi-level iso-surface compression
US7185067B1 (en) 2002-08-27 2007-02-27 Cisco Technology, Inc. Load balancing network access requests
US7209137B2 (en) 2002-09-12 2007-04-24 International Business Machines Corporation Efficient triangular shaped meshes
US8458028B2 (en) 2002-10-16 2013-06-04 Barbaro Technologies System and method for integrating business-related content into an electronic game
JP3701934B2 (en) 2002-10-21 2005-10-05 株式会社スクウェア・エニックス GAME DEVICE, GAME PROGRESS METHOD, PROGRAM, AND RECORDING MEDIUM
US7249123B2 (en) 2002-10-31 2007-07-24 International Business Machines Corporation System and method for building social networks based on activity around shared virtual objects
US7853594B2 (en) 2002-10-31 2010-12-14 International Business Machines Corporation System and method for determining founders of an information aggregate
US7636755B2 (en) 2002-11-21 2009-12-22 Aol Llc Multiple avatar personalities
US7386799B1 (en) 2002-11-21 2008-06-10 Forterra Systems, Inc. Cinematic techniques in avatar-centric communication during a multi-user online simulation
JP2004178035A (en) 2002-11-25 2004-06-24 Hitachi Ltd Database operation management method
US6980090B2 (en) 2002-12-10 2005-12-27 Current Technologies, Llc Device and method for coupling with electrical distribution network infrastructure to provide communications
US7106358B2 (en) 2002-12-30 2006-09-12 Motorola, Inc. Method, system and apparatus for telepresence communications
US7515156B2 (en) 2003-01-08 2009-04-07 Hrl Laboratories, Llc Method and apparatus for parallel speculative rendering of synthetic images
US7404149B2 (en) 2003-03-28 2008-07-22 International Business Machines Corporation User-defined assistive GUI glue
US6941236B2 (en) 2003-03-31 2005-09-06 Lucent Technologies Inc. Apparatus and methods for analyzing graphs
US7627626B2 (en) 2003-04-21 2009-12-01 Gateway, Inc. System for restricting use of a grid computer by a computing grid
US20040228291A1 (en) 2003-05-15 2004-11-18 Huslak Nicolas Steven Videoconferencing using managed quality of service and/or bandwidth allocation in a regional/access network (RAN)
US7467180B2 (en) 2003-05-29 2008-12-16 International Business Machines Corporation Automatically segmenting and populating a distributed computing problem
US7590984B2 (en) 2003-05-29 2009-09-15 International Business Machines Corporation System and method for balancing a computing load among computing resources in a distributed computing problem
US7089266B2 (en) 2003-06-02 2006-08-08 The Board Of Trustees Of The Leland Stanford Jr. University Computer systems and methods for the query and visualization of multidimensional databases
US8127248B2 (en) 2003-06-20 2012-02-28 Apple Inc. Computer interface having a virtual single-layer mode for viewing overlapping objects
JP3962361B2 (en) 2003-06-27 2007-08-22 インターナショナル・ビジネス・マシーンズ・コーポレーション Phase determining device, decomposable shape generating device, structural mesh generating device, phase determining method, decomposable shape generating method, computer executable program for executing the phase determining method, and decomposable shape generating method Computer executable program and structured mesh generation system
US7165056B2 (en) 2003-07-25 2007-01-16 Lenovo Singapore Pte, Ltd Administering devices in dependence upon user metric vectors including relational metrics and location based device control
GB2404546B (en) 2003-07-25 2005-12-14 Purple Interactive Ltd A method of organising and displaying material content on a display to a viewer
US7517282B1 (en) 2003-08-04 2009-04-14 Microsoft Corporation Methods and systems for monitoring a game to determine a player-exploitable game condition
US20050050137A1 (en) 2003-08-29 2005-03-03 International Business Machines Corporation Administering devices in dependence upon metric patterns
US7429987B2 (en) 2003-09-19 2008-09-30 International Business Machines Corporation Intelligent positioning of items in a tree map visualization
US20050071462A1 (en) 2003-09-30 2005-03-31 Ibm Corporation Creating user metric patterns
US7263511B2 (en) 2003-10-23 2007-08-28 International Business Machines Corporation Creating user metric patterns including user notification
US7565650B2 (en) 2003-10-23 2009-07-21 International Business Machines Corporation Method, apparatus and computer program product for deploying software via post-load images
US6982372B2 (en) 2003-12-04 2006-01-03 England Garnett B Acoustic musical instrument and method
US7305438B2 (en) 2003-12-09 2007-12-04 International Business Machines Corporation Method and system for voice on demand private message chat
US7478127B2 (en) 2003-12-15 2009-01-13 International Business Machines Corporation Service for providing periodic contact to a predetermined list of contacts using multi-party rules
US7734691B2 (en) 2003-12-18 2010-06-08 International Business Machines Corporation Providing collaboration services to a wireless device
US7985138B2 (en) 2004-02-17 2011-07-26 International Business Machines Corporation SIP based VoIP multiplayer network games
US7428588B2 (en) 2004-04-08 2008-09-23 International Business Machines Corporation Method for distributing and geographically load balancing location aware communication device client-proxy applications
US8057307B2 (en) 2004-04-08 2011-11-15 International Business Machines Corporation Handling of players and objects in massive multi-player on-line games
US7856469B2 (en) 2004-04-15 2010-12-21 International Business Machines Corporation Searchable instant messaging chat repositories using topic and identifier metadata
WO2005110033A2 (en) 2004-05-10 2005-11-24 Nintendo Co., Ltd Video game including time dilation effect and a storage medium sotring software for the video game
US7308476B2 (en) 2004-05-11 2007-12-11 International Business Machines Corporation Method and system for participant automatic re-invite and updating during conferencing
US7596596B2 (en) 2004-06-24 2009-09-29 International Business Machines Corporation Chat marking and synchronization
US7475354B2 (en) 2004-07-09 2009-01-06 International Business Machines Corporation Method for generating a portal page
US7426538B2 (en) 2004-07-13 2008-09-16 International Business Machines Corporation Dynamic media content for collaborators with VOIP support for client communications
US7552177B2 (en) 2004-07-29 2009-06-23 International Business Machines Corporation Method for determining availability of participation in instant messaging
US7698656B2 (en) 2004-07-29 2010-04-13 International Business Machines Corporation Methods, apparatus and computer programs supporting shortcuts across a plurality of devices
US20060041663A1 (en) * 2004-08-20 2006-02-23 Icentric Corporation Location based dynamic information services
US20060080613A1 (en) 2004-10-12 2006-04-13 Ray Savant System and method for providing an interactive social networking and role playing game within a virtual community
US20060085759A1 (en) 2004-10-18 2006-04-20 Claus Knapheide User interface display system
US7571224B2 (en) 2004-10-29 2009-08-04 International Business Machines Corporation Method for using presence in a system management environment
US7525964B2 (en) 2004-11-03 2009-04-28 International Business Machines Corporation Mechanism for delivering messages to competing consumers in a point-to-point system
US8176422B2 (en) 2004-11-19 2012-05-08 International Business Machines Corporation Method for aligning demonstrated user actions with existing documentation
US20060123351A1 (en) 2004-12-08 2006-06-08 Evil Twin Studios, Inc. System and method for communicating objects status within a virtual environment using translucency
KR100688079B1 (en) 2004-12-17 2007-03-02 한국전자통신연구원 method for categorizing and processing profile information and personalized service provision system
US7468729B1 (en) 2004-12-21 2008-12-23 Aol Llc, A Delaware Limited Liability Company Using an avatar to generate user profile information
US20070035548A1 (en) 2005-08-12 2007-02-15 Searete Llc Rating technique for virtual world environment
US20070130001A1 (en) 2005-11-18 2007-06-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20060235791A1 (en) 2005-04-15 2006-10-19 Searete Llc Follow-up contacts with virtual world participants
US20060178967A1 (en) 2005-02-04 2006-08-10 Searete Llc Disposition of proprietary virtual rights
US20070035549A1 (en) 2005-08-12 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Variant rating plans for a virtual world environment
US20070118420A1 (en) 2005-02-04 2007-05-24 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Context determinants in virtual world environment
US20070013691A1 (en) 2005-07-18 2007-01-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supervisory authority in virtual world environment
JP3880603B2 (en) 2005-02-22 2007-02-14 株式会社コナミデジタルエンタテインメント Image processing apparatus, image processing method, and program
WO2006094275A2 (en) 2005-03-02 2006-09-08 Markmonitor, Inc. Trust evaluation systems and methods
US8103640B2 (en) 2005-03-02 2012-01-24 International Business Machines Corporation Method and apparatus for role mapping methodology for user registry migration
US7640587B2 (en) 2005-03-29 2009-12-29 International Business Machines Corporation Source code repair method for malicious code detection
US7467181B2 (en) 2005-03-30 2008-12-16 International Business Machines Corporation System and method for context-specific instant messaging
US7506264B2 (en) 2005-04-28 2009-03-17 International Business Machines Corporation Method and apparatus for presenting navigable data center information in virtual reality using leading edge rendering engines
US7396281B2 (en) 2005-06-24 2008-07-08 Disney Enterprises, Inc. Participant interaction with entertainment in real and virtual environments
US20070050214A1 (en) 2005-07-29 2007-03-01 Rick Hawks Apparatus, system, and method for assessing and managing behavioral risk
US7818671B2 (en) 2005-08-29 2010-10-19 Microsoft Corporation Virtual navigation of menus
US20070063999A1 (en) 2005-09-22 2007-03-22 Hyperpia, Inc. Systems and methods for providing an online lobby
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US20080207327A1 (en) 2007-02-20 2008-08-28 Leviathan Entertainment, Llc Virtual Environment with Alerts
US20080026847A1 (en) 2005-10-14 2008-01-31 Leviathan Entertainment, Llc Massive Multi Player Online Video Game that Progresses in Eras
US7827208B2 (en) 2006-08-11 2010-11-02 Facebook, Inc. Generating a feed of stories personalized for members of a social network
US8047915B2 (en) 2006-01-11 2011-11-01 Lyle Corporate Development, Inc. Character for computer game and method
US7443393B2 (en) 2006-01-19 2008-10-28 International Business Machines Corporation Method, system, and program product for re-meshing of a three-dimensional input model using progressive implicit approximating levels
US7792263B2 (en) 2006-02-15 2010-09-07 International Business Machines Corporation Method, system, and computer program product for displaying images of conference call participants
US20080086696A1 (en) 2006-03-03 2008-04-10 Cadcorporation.Com Inc. System and Method for Using Virtual Environments
US7843471B2 (en) 2006-03-09 2010-11-30 International Business Machines Corporation Persistent authenticating mechanism to map real world object presence into virtual world object awareness
US20070218965A1 (en) 2006-03-15 2007-09-20 Tilston Christopher I Player deception in a video game
US7720777B2 (en) 2006-04-11 2010-05-18 Palo Alto Research Center Incorporated Method, device, and program product to monitor the social health of a persistent virtual environment
GB0609070D0 (en) 2006-05-09 2006-06-14 Ibm Postponing an instant messaging session
US7503007B2 (en) 2006-05-16 2009-03-10 International Business Machines Corporation Context enhanced messaging and collaboration system
US20080005319A1 (en) 2006-05-16 2008-01-03 Anderholm Eric J Monitoring computer use through a calendar interface
US7643673B2 (en) 2006-06-12 2010-01-05 Google Inc. Markup language for interactive geographic information system
US7945620B2 (en) 2006-06-13 2011-05-17 International Business Machines Corporation Chat tool for concurrently chatting over more than one interrelated chat channels
US7844663B2 (en) 2006-07-10 2010-11-30 International Business Machines Corporation Methods, systems, and computer program products for gathering information and statistics from a community of nodes in a network
US20080045245A1 (en) * 2006-08-18 2008-02-21 Patent Navigation Inc. Locating people and routes on a digital map
US20080059198A1 (en) 2006-09-01 2008-03-06 Pudding Ltd. Apparatus and method for detecting and reporting online predators
US7580888B2 (en) 2006-09-12 2009-08-25 International Business Machines Corporation Facilitating simulated purchases of items by virtual representations of participants in computer-based simulations
US8277316B2 (en) 2006-09-14 2012-10-02 Nintendo Co., Ltd. Method and apparatus for using a common pointing input to control 3D viewpoint and object targeting
US7940265B2 (en) 2006-09-27 2011-05-10 International Business Machines Corporation Multiple spacial indexes for dynamic scene management in graphics rendering
US7884819B2 (en) 2006-09-27 2011-02-08 International Business Machines Corporation Pixel color accumulation in a ray tracing image processing system
US8089481B2 (en) 2006-09-28 2012-01-03 International Business Machines Corporation Updating frame divisions based on ray tracing image processing system performance
US9329743B2 (en) 2006-10-04 2016-05-03 Brian Mark Shuster Computer simulation method with user-defined transportation and layout
US7805406B2 (en) 2006-10-27 2010-09-28 Xystar Technologies, Inc. Cross-population of virtual communities
US7808500B2 (en) 2006-11-21 2010-10-05 International Business Machines Corporation Method for improving spatial index efficiency by jittering splitting planes
US8026918B1 (en) * 2006-11-22 2011-09-27 Aol Inc. Controlling communications with proximate avatars in virtual world environment
US7782318B2 (en) 2006-11-22 2010-08-24 International Business Machines Corporation Method for reducing network bandwidth by delaying shadow ray generation
US8139060B2 (en) 2006-11-28 2012-03-20 International Business Machines Corporation Ray tracing image processing system
US7768514B2 (en) 2006-12-19 2010-08-03 International Business Machines Corporation Simultaneous view and point navigation
US20080162202A1 (en) 2006-12-29 2008-07-03 Richendra Khanna Detecting inappropriate activity by analysis of user interactions
US7893936B2 (en) 2007-01-12 2011-02-22 International Business Machines Corporation Generating efficient spatial indexes for predictably dynamic objects
US8022950B2 (en) 2007-01-26 2011-09-20 International Business Machines Corporation Stochastic culling of rays with increased depth of recursion
US8085267B2 (en) 2007-01-30 2011-12-27 International Business Machines Corporation Stochastic addition of rays in a ray tracing image processing system
US7765478B2 (en) 2007-02-06 2010-07-27 International Business Machines Corporation Scheduling and reserving virtual meeting locations in a calendaring application
US7719532B2 (en) 2007-02-09 2010-05-18 International Business Machines Corporation Efficient and flexible data organization for acceleration data structure nodes
US8018453B2 (en) 2007-02-09 2011-09-13 International Business Machines Corporation Deferred acceleration data structure optimization for improved performance
US8004518B2 (en) 2007-02-14 2011-08-23 International Business Machines Corporation Combined spatial index for static and dynamic objects within a three-dimensional scene
US7796128B2 (en) 2007-02-14 2010-09-14 International Business Machines Corporation Dynamically load balancing game physics using real-time object scaling
US20090222276A1 (en) 2008-03-02 2009-09-03 Todd Harold Romney Apparatus, System, and Method for Cloning Web Page Designs or Avatar Designs
US8234234B2 (en) 2007-03-20 2012-07-31 International Business Machines Corporation Utilizing ray tracing for enhanced artificial intelligence path-finding
US8139780B2 (en) 2007-03-20 2012-03-20 International Business Machines Corporation Using ray tracing for real time audio synthesis
US7773087B2 (en) 2007-04-19 2010-08-10 International Business Machines Corporation Dynamically configuring and selecting multiple ray tracing intersection methods
US20080263460A1 (en) 2007-04-20 2008-10-23 Utbk, Inc. Methods and Systems to Connect People for Virtual Meeting in Virtual Reality
US20080263459A1 (en) 2007-04-20 2008-10-23 Utbk, Inc. Methods and Systems to Determine Availability for Real Time Communications via Virtual Reality
US20080263446A1 (en) * 2007-04-20 2008-10-23 Utbk, Inc. Methods and Systems to Connect People to Services via Virtual Reality
US8000328B1 (en) * 2007-05-22 2011-08-16 Qurio Holdings, Inc. Filtering messages in a distributed virtual world based on virtual space properties
US7990394B2 (en) 2007-05-25 2011-08-02 Google Inc. Viewing and navigating within panoramic images, and applications thereof
US20090138335A1 (en) 2007-08-13 2009-05-28 Universal Passage, Inc. Method and system for providing identity template management as a part of a marketing and sales program for universal life stage decision support
US7747679B2 (en) 2007-08-17 2010-06-29 International Business Machines Corporation Managing a communication availability status
US20090049513A1 (en) 2007-08-17 2009-02-19 Root Jason E System and method for controlling a virtual environment of a user
US7945802B2 (en) 2007-09-17 2011-05-17 International Business Machines Corporation Modifying time progression rates in a virtual universe
US8243116B2 (en) 2007-09-24 2012-08-14 Fuji Xerox Co., Ltd. Method and system for modifying non-verbal behavior for social appropriateness in video conferencing and other computer mediated communications
US8245241B2 (en) 2007-10-02 2012-08-14 International Business Machines Corporation Arrangements for interactivity between a virtual universe and the world wide web
US9289681B2 (en) 2007-10-09 2016-03-22 International Business Machines Corporation Suggested actions within a virtual environment
US8131740B2 (en) 2007-10-09 2012-03-06 International Business Machines Corporation User-specific search indexing within a virtual environment
US8055656B2 (en) 2007-10-10 2011-11-08 International Business Machines Corporation Generating a user-specific search index of content within a virtual environment
US8063905B2 (en) 2007-10-11 2011-11-22 International Business Machines Corporation Animating speech of an avatar representing a participant in a mobile communication
US7792801B2 (en) 2007-10-12 2010-09-07 International Business Machines Corporation Controlling and using virtual universe wish lists
US8128487B2 (en) 2007-10-15 2012-03-06 International Business Machines Corporation Compensating participants of virtual environments
US8490199B2 (en) 2007-10-29 2013-07-16 Sony Computer Entertainment America Llc Moderation of cheating in on-line gaming sessions
US8056121B2 (en) 2007-10-26 2011-11-08 International Business Machines Corporation Virtual universe account protection
US20090113448A1 (en) 2007-10-29 2009-04-30 Andrew Bryan Smith Satisfying a request for an action in a virtual world
US7743095B2 (en) 2007-10-29 2010-06-22 International Business Machines Corporation Device, method and computer program product for providing an alert indication
US20090113314A1 (en) 2007-10-30 2009-04-30 Dawson Christopher J Location and placement of avatars in virtual worlds
US20090113319A1 (en) 2007-10-30 2009-04-30 Dawson Christopher J Developing user profiles in virtual worlds
US8013861B2 (en) 2007-10-31 2011-09-06 International Business Machines Corporation Reducing a display quality of an area in a virtual universe to conserve computing resources
US8145725B2 (en) 2007-10-31 2012-03-27 International Business Machines Corporation Updating data stores of virtual worlds based on data stores external to the virtual worlds
US8214750B2 (en) 2007-10-31 2012-07-03 International Business Machines Corporation Collapsing areas of a region in a virtual universe to conserve computing resources
US8140982B2 (en) 2007-11-08 2012-03-20 International Business Machines Corporation Method and system for splitting virtual universes into distinct entities
US8171388B2 (en) 2007-11-15 2012-05-01 Yahoo! Inc. Trust based moderation
US8102334B2 (en) 2007-11-15 2012-01-24 International Businesss Machines Corporation Augmenting reality for a user
US8062130B2 (en) 2007-11-16 2011-11-22 International Business Machines Corporation Allowing an alternative action in a virtual world
US8105165B2 (en) 2007-11-16 2012-01-31 International Business Machines Corporation Controlling interaction between protected media
US8165350B2 (en) 2007-11-27 2012-04-24 International Business Machines Corporation Assessment of a view through the overlay of maps
US8127235B2 (en) 2007-11-30 2012-02-28 International Business Machines Corporation Automatic increasing of capacity of a virtual space in a virtual world
US8151191B2 (en) 2007-12-07 2012-04-03 International Business Machines Corporation Managing objectionable material in 3D immersive virtual worlds
US8149241B2 (en) 2007-12-10 2012-04-03 International Business Machines Corporation Arrangements for controlling activities of an avatar
US8239775B2 (en) 2007-12-14 2012-08-07 International Business Machines Corporation Method and apparatus for a computer simulated environment
US20090164919A1 (en) 2007-12-24 2009-06-25 Cary Lee Bates Generating data for managing encounters in a virtual world environment
US7890623B2 (en) 2007-12-27 2011-02-15 International Business Machines Corporation Generating data for media playlist construction in virtual environments
US7886045B2 (en) 2007-12-26 2011-02-08 International Business Machines Corporation Media playlist construction for virtual environments
US8099668B2 (en) 2008-01-07 2012-01-17 International Business Machines Corporation Predator and abuse identification and prevention in a virtual environment
US8713450B2 (en) 2008-01-08 2014-04-29 International Business Machines Corporation Detecting patterns of abuse in a virtual environment
US8140978B2 (en) 2008-01-16 2012-03-20 International Business Machines Corporation System and method for providing information in a virtual world
US8140340B2 (en) 2008-01-18 2012-03-20 International Business Machines Corporation Using voice biometrics across virtual environments in association with an avatar's movements
US8230338B2 (en) 2008-01-21 2012-07-24 International Business Machines Corporation Game determination of tag relevance for social bookmarking
US7921128B2 (en) 2008-02-05 2011-04-05 International Business Machines Corporation Method and system for merging disparate virtual universes entities
US8018462B2 (en) 2008-02-11 2011-09-13 International Business Machines Corporation Pack avatar for shared inventory in a virtual universe
US8145676B2 (en) 2008-02-11 2012-03-27 International Business Machines Corporation Shared inventory item donation in a virtual universe
WO2009104564A1 (en) 2008-02-20 2009-08-27 インターナショナル・ビジネス・マシーンズ・コーポレーション Conversation server in virtual space, method for conversation and computer program
US8171407B2 (en) 2008-02-21 2012-05-01 International Business Machines Corporation Rating virtual world merchandise by avatar visits
US7447996B1 (en) 2008-02-28 2008-11-04 International Business Machines Corporation System for using gender analysis of names to assign avatars in instant messaging applications
JP5159375B2 (en) 2008-03-07 2013-03-06 インターナショナル・ビジネス・マシーンズ・コーポレーション Object authenticity determination system and method in metaverse, and computer program thereof
US8171559B2 (en) 2008-03-13 2012-05-01 International Business Machines Corporation Detecting a phishing entity in a virtual universe
US8006182B2 (en) 2008-03-18 2011-08-23 International Business Machines Corporation Method and computer program product for implementing automatic avatar status indicators
US8095881B2 (en) 2008-03-24 2012-01-10 International Business Machines Corporation Method for locating a teleport target station in a virtual world
US7427980B1 (en) 2008-03-31 2008-09-23 International Business Machines Corporation Game controller spatial detection
US8132235B2 (en) 2008-04-03 2012-03-06 International Business Machines Corporation Method, system, and computer program product for providing e-token based access control for virtual world spaces
US8214751B2 (en) 2008-04-15 2012-07-03 International Business Machines Corporation Dynamic spawning of focal point objects within a virtual universe system
US8028021B2 (en) 2008-04-23 2011-09-27 International Business Machines Corporation Techniques for providing presentation material in an on-going virtual meeting
US8233005B2 (en) 2008-04-24 2012-07-31 International Business Machines Corporation Object size modifications based on avatar distance
US8184116B2 (en) 2008-04-24 2012-05-22 International Business Machines Corporation Object based avatar tracking
US8001161B2 (en) 2008-04-24 2011-08-16 International Business Machines Corporation Cloning objects in a virtual universe
US8659623B2 (en) 2008-04-25 2014-02-25 International Business Machines Corporation Three-dimensional (3D) virtual world wormholes
US8217953B2 (en) 2008-04-25 2012-07-10 International Business Machines Corporation Anisotropic texture filtering with texture data prefetching
US7882243B2 (en) 2008-05-01 2011-02-01 International Business Machines Corporation Connecting external devices to a gaming voice chat service
US8584025B2 (en) 2008-05-02 2013-11-12 International Business Machines Corporation Virtual world teleportation
US7996164B2 (en) 2008-05-06 2011-08-09 International Business Machines Corporation Managing energy usage by devices associated with a virtual universe resource conservation region
US8199145B2 (en) 2008-05-06 2012-06-12 International Business Machines Corporation Managing use limitations in a virtual universe resource conservation region
US7873485B2 (en) 2008-05-08 2011-01-18 International Business Machines Corporation Indicating physical site energy usage through a virtual environment
US8051462B2 (en) 2008-05-09 2011-11-01 International Business Machines Corporation Secure communication modes in a virtual universe
US7970837B2 (en) 2008-05-12 2011-06-28 International Business Machines Corporation Method to invite users to a virtual world using instant messaging
US8184092B2 (en) 2008-05-22 2012-05-22 International Business Machines Corporation Simulation of writing on game consoles through the use of motion-sensing technology
US8099338B2 (en) 2008-06-09 2012-01-17 International Business Machines Corporation Management of virtual universe item returns
US8185450B2 (en) 2008-06-12 2012-05-22 International Business Machines Corporation Method and system for self-service manufacture and sale of customized virtual goods
US8187067B2 (en) 2008-06-13 2012-05-29 International Business Machines Corporation Automatic transformation of inventory items in a virtual universe
US7970840B2 (en) 2008-07-02 2011-06-28 International Business Machines Corporation Method to continue instant messaging exchange when exiting a virtual world
US8510681B2 (en) 2008-07-11 2013-08-13 International Business Machines Corporation RFID reader integration to virtual world monitoring
US8134560B2 (en) 2008-07-25 2012-03-13 International Business Machines Corporation Method for avatar wandering in a computer based interactive environment
US8022948B2 (en) 2008-07-29 2011-09-20 International Business Machines Corporation Image capture and buffering in a virtual world using situational measurement averages
US8026913B2 (en) 2008-07-29 2011-09-27 International Business Machines Corporation Image capture and buffering in a virtual world
US7882222B2 (en) 2008-07-31 2011-02-01 International Business Machines Corporation Virtual environment module bundle
US7515136B1 (en) 2008-07-31 2009-04-07 International Business Machines Corporation Collaborative and situationally aware active billboards
US8037416B2 (en) 2008-08-06 2011-10-11 International Business Machines Corporation Presenting and filtering objects in a virtual world
US8041614B2 (en) 2008-09-04 2011-10-18 International Business Machines Corporation Inventory item expiration and renewal in a virtual universe
US8019858B2 (en) 2008-09-09 2011-09-13 International Business Machines Corporation System and method for utilizing system lag to send facts to an end user
US8203561B2 (en) 2008-09-10 2012-06-19 International Business Machines Corporation Determining valued excursion corridors in virtual worlds
US8082245B2 (en) 2008-09-11 2011-12-20 International Business Machines Corporation Providing location information within a virtual world
US8127236B2 (en) 2008-09-12 2012-02-28 International Business Machines Corporation Virtual universe subject matter expert assistance
US8241131B2 (en) 2008-09-26 2012-08-14 International Business Machines Corporation Avatar protection within a virtual universe
US8176421B2 (en) 2008-09-26 2012-05-08 International Business Machines Corporation Virtual universe supervisory presence
US8108774B2 (en) 2008-09-26 2012-01-31 International Business Machines Corporation Avatar appearance transformation in a virtual universe
US8028022B2 (en) 2008-10-31 2011-09-27 International Business Machines Corporation Generating content recommendations from an online game
US8092288B2 (en) 2008-10-31 2012-01-10 International Business Machines Corporation Managing multi-player video game input
US8113959B2 (en) 2008-12-04 2012-02-14 International Business Machines Corporation Method and system for rendering the scenes of a role playing game in a metaverse
US8214433B2 (en) 2008-12-15 2012-07-03 International Business Machines Corporation System and method to provide context for an automated agent to service multiple avatars within a virtual universe
US8219616B2 (en) 2008-12-15 2012-07-10 International Business Machines Corporation Use of information channels to provide communications in a virtual environment
US8171408B2 (en) 2008-12-17 2012-05-01 International Business Machines Corporation Dynamic location generation within a virtual world
US8185829B2 (en) 2009-01-07 2012-05-22 International Business Machines Corporation Method and system for rating exchangeable gestures via communications in virtual world applications
US8103959B2 (en) 2009-01-07 2012-01-24 International Business Machines Corporation Gesture exchange via communications in virtual world applications
US8174541B2 (en) 2009-01-19 2012-05-08 International Business Machines Corporation Dividing three-dimensional space into location based virtual packets
US8425326B2 (en) 2009-02-20 2013-04-23 Activision Publishing, Inc. Social network system and method for use with and integration into a video game
US8506372B2 (en) 2009-02-20 2013-08-13 Activision Publishing, Inc. System and method configured to provide a location-based vehicular racing videogame
US8245283B2 (en) 2009-03-03 2012-08-14 International Business Machines Corporation Region access authorization in a virtual environment
US8234579B2 (en) 2009-07-20 2012-07-31 International Business Machines Corporation Aging and elimination of avatars and associated objects from computer simulated displayed virtual universes
US9205328B2 (en) 2010-02-18 2015-12-08 Activision Publishing, Inc. Videogame system and method that enables characters to earn virtual fans by completing secondary objectives
US9682324B2 (en) 2010-05-12 2017-06-20 Activision Publishing, Inc. System and method for enabling players to participate in asynchronous, competitive challenges
US10376792B2 (en) 2014-07-03 2019-08-13 Activision Publishing, Inc. Group composition matchmaking system and method for multiplayer video games

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7293235B1 (en) * 1998-08-14 2007-11-06 British Telecommunications Public Limited Company Predicting avatar movement in a distributed virtual environment
US20030156134A1 (en) * 2000-12-08 2003-08-21 Kyunam Kim Graphic chatting with organizational avatars
US20070156664A1 (en) * 2005-07-06 2007-07-05 Gemini Mobile Technologies, Inc. Automatic user matching in an online environment
US20080215994A1 (en) * 2007-03-01 2008-09-04 Phil Harrison Virtual world avatar control, interactivity and communication interactive messaging
US20080307066A1 (en) * 2007-06-07 2008-12-11 Qurio Holdings, Inc. Systems and Methods of Providing Collaborative Consumer-Controlled Advertising Environments
US20100211638A1 (en) * 2007-07-27 2010-08-19 Goojet Method and device for creating computer applications
US20090037822A1 (en) * 2007-07-31 2009-02-05 Qurio Holdings, Inc. Context-aware shared content representations
US20110279461A1 (en) * 2007-08-16 2011-11-17 International Business Machines Corporation Spawning projected avatars in a virtual universe
US20090055484A1 (en) * 2007-08-20 2009-02-26 Thanh Vuong System and method for representation of electronic mail users using avatars
US20090158151A1 (en) * 2007-12-18 2009-06-18 Li-Te Cheng Computer system and method of using presence visualizations of avators as persistable virtual contact objects
US20090164458A1 (en) * 2007-12-20 2009-06-25 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Methods and systems employing a cohort-linked avatar

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10627983B2 (en) 2007-12-24 2020-04-21 Activision Publishing, Inc. Generating data for managing encounters in a virtual world environment
US20100070884A1 (en) * 2008-09-17 2010-03-18 International Business Machines Corporation Dynamically Linking Avatar Profiles Within a Virtual Environment
US20100115422A1 (en) * 2008-11-05 2010-05-06 At&T Intellectual Property I, L.P. System and method for conducting a communication exchange
US8589803B2 (en) * 2008-11-05 2013-11-19 At&T Intellectual Property I, L.P. System and method for conducting a communication exchange
US10295968B2 (en) * 2008-12-10 2019-05-21 International Business Machines Corporation Network driven actuator mapping agent and bus and method of use
US10712721B2 (en) 2008-12-10 2020-07-14 International Business Machines Corporation Network driven actuator mapping agent and bus and method of use
US20120047087A1 (en) * 2009-03-25 2012-02-23 Waldeck Technology Llc Smart encounters
US8589330B2 (en) 2009-03-25 2013-11-19 Waldeck Technology, Llc Predicting or recommending a users future location based on crowd data
US9410814B2 (en) 2009-03-25 2016-08-09 Waldeck Technology, Llc Passive crowd-sourced map updates and alternate route recommendations
US9140566B1 (en) 2009-03-25 2015-09-22 Waldeck Technology, Llc Passive crowd-sourced map updates and alternative route recommendations
US20110047486A1 (en) * 2009-08-24 2011-02-24 Disney Enterprises, Inc. System and method for enhancing socialization in virtual worlds
US9987563B2 (en) * 2009-08-24 2018-06-05 Disney Enterprises, Inc. System and method for enhancing socialization in virtual worlds
US20220092631A1 (en) * 2010-07-12 2022-03-24 At&T Intellectual Property I, L.P. System and method for contextual virtual local advertisement insertion
US8326668B2 (en) * 2010-08-31 2012-12-04 International Business Machines Corporation Managing encounters with persons
US20120053980A1 (en) * 2010-08-31 2012-03-01 International Business Machines Corporation Managing encounters with persons
US20130111366A1 (en) * 2011-10-27 2013-05-02 Disney Enterprises, Inc. Friends lists with dynamic ordering and dynamic avatar appearance
US8887096B2 (en) * 2011-10-27 2014-11-11 Disney Enterprises, Inc. Friends lists with dynamic ordering and dynamic avatar appearance
US9177291B2 (en) * 2012-01-11 2015-11-03 Facebook, Inc. Chaining connection requests
US20130179802A1 (en) * 2012-01-11 2013-07-11 Peter Henry Martinazzi Chaining Connection Requests
US9721045B2 (en) * 2012-07-24 2017-08-01 Dassault Systemes Operation in an immersive virtual environment
US20140032181A1 (en) * 2012-07-24 2014-01-30 Dassault Systemes Design Operation In An Immersive Virtual Environment
US9473497B1 (en) * 2013-06-05 2016-10-18 Securus Technologies, Inc. Exclusion engine for electronic communications in controlled-environment facilities
US20150156228A1 (en) * 2013-11-18 2015-06-04 Ronald Langston Social networking interacting system
US10402783B2 (en) * 2014-06-26 2019-09-03 Microsoft Technology Licensing, Llc Method of automatically re-organizing structured data in a reporting system based on screen size by executing computer-executable instructions stored on a non-transitory computer-readable medium

Also Published As

Publication number Publication date
US10627983B2 (en) 2020-04-21
US20140344725A1 (en) 2014-11-20

Similar Documents

Publication Publication Date Title
US10627983B2 (en) Generating data for managing encounters in a virtual world environment
US8046700B2 (en) System for managing encounters in a virtual world environment
US8516381B2 (en) Suggestion of user actions in a virtual environment based on actions of other users
US9289681B2 (en) Suggested actions within a virtual environment
US8082245B2 (en) Providing location information within a virtual world
US8516380B2 (en) Conversation abstractions based on trust levels in a virtual world
US8055656B2 (en) Generating a user-specific search index of content within a virtual environment
US8037416B2 (en) Presenting and filtering objects in a virtual world
US8131740B2 (en) User-specific search indexing within a virtual environment
US9300612B2 (en) Managing interactions in a virtual world environment
US8605115B2 (en) Recommendations for object use in virtual environment
US20100198653A1 (en) Object organization based on user interactions within a virtual environment
US8924250B2 (en) Advertising in virtual environments based on crowd statistics
US8026913B2 (en) Image capture and buffering in a virtual world
US8022948B2 (en) Image capture and buffering in a virtual world using situational measurement averages
US8692835B2 (en) Spawning projected avatars in a virtual universe
US8345049B2 (en) Method and apparatus for predicting avatar movement in a virtual universe
US20100050100A1 (en) Virtual World Object Presentation, Recommendations and Navigation
US20090046109A1 (en) Method and apparatus for moving an avatar in a virtual universe
WO2023122255A1 (en) Artificial reality applications through virtual object definitions and invocation
US20100064253A1 (en) Providing Users With Location Information Within a Virtual World
US8291327B2 (en) Detecting avatar following in a virtual environment
US20240078004A1 (en) Authoring context aware policies with real-time feedforward validation in extended reality
US8239776B2 (en) Behavior detection and alert in virtual worlds based on spatial and temporal criteria
US20240071378A1 (en) Authoring context aware policies through natural language and demonstrations

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BATES, CARY LEE;CHEN, JIM CHUN-TA;GARBOW, ZACHARY ADAM;AND OTHERS;SIGNING DATES FROM 20071220 TO 20080118;REEL/FRAME:020455/0511

AS Assignment

Owner name: ACTIVISION PUBLISHING, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:029900/0285

Effective date: 20121231

AS Assignment

Owner name: BANK OF AMERICA, N.A., TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNOR:ACTIVISION PUBLISHING, INC.;REEL/FRAME:032240/0257

Effective date: 20140131

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: ACTIVISION ENTERTAINMENT HOLDINGS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:040381/0487

Effective date: 20161014

Owner name: ACTIVISION BLIZZARD INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:040381/0487

Effective date: 20161014

Owner name: BLIZZARD ENTERTAINMENT, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:040381/0487

Effective date: 20161014

Owner name: ACTIVISION PUBLISHING, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:040381/0487

Effective date: 20161014

Owner name: ACTIVISION ENTERTAINMENT HOLDINGS, INC., CALIFORNI

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:040381/0487

Effective date: 20161014