Changing a virtual world based on real-world locations of players
First Claim
Patent Images
1. A system comprising:
- one or more computer processors;
one or more computer memories;
one or more modules incorporated into the one or more computer memories, the one or more modules configuring the one or more computer processors to perform operations to limit illegal trading of real-world items linked to a computer-implemented game, the method comprising;
linking the real-world items to the computer-implemented game, the linking including associating a using of the real-world item with a change to a game state of the computer-implemented game;
providing a user of the computer-implemented game with an ability to unlock the using of the item to perform the using of the real-world item to make the change to the game state of the computer-implemented game;
performing a verification process to confirm a transfer of the real-world item to an additional user, wherein the performing of the verification process includes receiving a communication from a device embedded in the real-world item, the communication including a specification of a location of the real-world item; and
based on a completion of the verification process, providing the additional user of the computer-implemented game with the ability to perform the using of the real-world item to make the change to the game state of the computer-implemented game.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of changing a virtual world of a computer-implemented game based on real-world locations of players of the computer-implemented game is disclosed. A presence of a player of the computer-implemented game is detected at a physical location. A presence of an additional player of the computer-implemented game is detected at the physical location based on a communication received from the player of the computer-implemented game. An aspect of the virtual world of the computer-implemented game is changed based on the detecting of the presence of the player at the physical location and the detecting of the presence of the additional player of the computer-implemented game at the physical location.
-
Citations
17 Claims
-
1. A system comprising:
-
one or more computer processors; one or more computer memories; one or more modules incorporated into the one or more computer memories, the one or more modules configuring the one or more computer processors to perform operations to limit illegal trading of real-world items linked to a computer-implemented game, the method comprising; linking the real-world items to the computer-implemented game, the linking including associating a using of the real-world item with a change to a game state of the computer-implemented game; providing a user of the computer-implemented game with an ability to unlock the using of the item to perform the using of the real-world item to make the change to the game state of the computer-implemented game; performing a verification process to confirm a transfer of the real-world item to an additional user, wherein the performing of the verification process includes receiving a communication from a device embedded in the real-world item, the communication including a specification of a location of the real-world item; and based on a completion of the verification process, providing the additional user of the computer-implemented game with the ability to perform the using of the real-world item to make the change to the game state of the computer-implemented game. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
limiting illegal trading of real-world items linked to a computer-implemented game, the limiting comprising; linking the real-world items to the computer-implemented game, the linking including associating a using of the real-world item with a change to a game state of the computer-implemented game; providing a user of the computer-implemented game with an ability to unlock the using of the item to perform the using of the real-world item to make the change to the game state of the computer-implemented game; performing a verification process to confirm a transfer of the real-world item to an additional user, wherein the performing of the verification process includes receiving a communication from a device embedded in the real-world item, the communication including a specification of a location of the real-world item; and based on a completion of the verification process, providing the additional user of the computer-implemented game with the ability to perform the using of the real-world item to make the change to the game state of the computer-implemented game. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory machine-readable storage medium storing a set of instructions that, when executed by at least one processor, cause the at least one processor to perform operations for limiting illegal trading of real-world items linked to a computer-implemented game, the operations comprising:
-
linking the real-world items to the computer-implemented game, the linking including associating a using of the real-world item with a change to a game state of the computer-implemented game; providing a user of the computer-implemented game with an ability to unlock the using of the item to perform the using of the real-world item to make the change to the game state of the computer-implemented game; performing a verification process to confirm a transfer of the real-world item to an additional user, wherein the performing of the verification process includes receiving a communication from a device embedded in the real-world item, the communication including a specification of a location of the real-world item; and based on a completion of the verification process, providing the additional user of the computer-implemented game with the ability to perform the using of the real-world item to make the change to the game state of the computer-implemented game. - View Dependent Claims (14, 15, 16, 17)
-
Specification