Systems and methods for authenticating an avatar
First Claim
1. A method for generating a searchable avatar gallery in a virtual environment, comprising:
- ascertaining reputation information for a user and an avatar by vetting a relationship chain using a trust matrix, wherein the trust matrix is employed to generate a trust rating for the user by analyzing the relationship chain between the user and a plurality of users, wherein a unique transom identifier corresponds to the avatar;
generating a linked avatar for integration in the searchable avatar gallery, wherein the linked avatar includes any profile corresponding to the user, the reputation information, and the unique transom identifier for the avatar; and
integrating the linked avatar into the searchable avatar gallery, wherein the searchable avatar gallery includes other linked avatars, wherein any of the other linked avatars include any profile corresponding to another user, reputation information of the another user, and another unique transom identifier for another avatar corresponding to the another user.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who uses the avatar in the virtual environments. Transoms are generated, each with a unique identifier configured to exist in a specific location, and registered with an identity provider. The transom initiates a request. An offer is conveyed that includes the transom identifier, the location and the avatar identifier. The avatar is then authenticated by a shared secret. The identity provider then responds to the offer with avatar identification information, including reputation information. Reputation information is for the avatar and the user, and is compiled from external avatar data sources by using a trust matrix. An avatar gallery is generated by linking each avatar owned by each user to the account and compiling avatar profiles from the account, and the reputation information. The avatar profiles are searchable, and include micro formats.
-
Citations
27 Claims
-
1. A method for generating a searchable avatar gallery in a virtual environment, comprising:
-
ascertaining reputation information for a user and an avatar by vetting a relationship chain using a trust matrix, wherein the trust matrix is employed to generate a trust rating for the user by analyzing the relationship chain between the user and a plurality of users, wherein a unique transom identifier corresponds to the avatar; generating a linked avatar for integration in the searchable avatar gallery, wherein the linked avatar includes any profile corresponding to the user, the reputation information, and the unique transom identifier for the avatar; and integrating the linked avatar into the searchable avatar gallery, wherein the searchable avatar gallery includes other linked avatars, wherein any of the other linked avatars include any profile corresponding to another user, reputation information of the another user, and another unique transom identifier for another avatar corresponding to the another user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for authenticating an avatar, comprising:
-
storing a transom within a specific location within a virtual environment, wherein the transom includes a unique transom identifier and is registered with an identity provider; redirecting an end user to a user agent and generating a nonce; conveying an offer, wherein the offer includes the unique transom identifier, the specific location, and an avatar identifier for an avatar; linking the end user to an account with an identity provider; comparing the generated nonce with the offer; authenticating the avatar by utilizing a shared secret; and acquiring end user reputation including a plurality of reputation scores acquired by compiling avatar identity information using a trust matrix which generates a trust rating for the end user by analyzing relationships between the end user and a relying party through at least one intermediate party. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A system for authenticating an avatar, comprising:
-
a memory that stores computer executable components; and a processor that executes at least the following computer executable components stored in the memory; a transom having a unique transom identifier stored in a specific location within a virtual environment and corresponding to an end user, the transom being configured to request an identity of an avatar and to provide a first share of a shared secret a user agent to couple to the end user and a relying party, wherein the user agent is configured to provide a second share of the shared secret; and an identity provider to couple to the at least one transom and the user agent, and wherein the identity provider is configured to provide identity for the end user if the request from the transom includes a valid first share and a valid second share of the shared secret; and wherein the identity for the end user includes a plurality of reputation scores acquired by compiling avatar identity information using a trust matrix which generates a trust rating for the end user by analyzing relationships between the end user and the relying party through at least one intermediate party. - View Dependent Claims (25, 26, 27)
-
Specification