APPLYING ACCESS CONTROLS TO COMMUNICATIONS WITH AVATARS
1 Assignment
0 Petitions
Accused Products
Abstract
Senders of instant messages may inspire perception by a recipient of avatars capable of being animated in order to customize or personalize communication exchanges from the sender. The avatar, an animation of or associated with the avatar, an object associated with the avatar, or another component of the avatar or communication may be inappropriate, or otherwise objectionable, to the recipient, the recipient class or category, or an identity associated with the recipient. In one example, a parent of a minor who is the intended recipient of an avatar (or a component of the avatar or communication) may object to the minor being exposed to the avatar (or the component of the avatar or communication). In such a case, the communication may be discarded or the perception of the objectionable avatar (or component associated with the avatar or the communication) by the intended recipient may be disabled, replaced or modified.
-
Citations
53 Claims
-
1-33. -33. (canceled)
-
34. A computer-implemented method for applying access control information to avatar selection, the method comprising:
-
identifying a user identity; determining access control information associated with the user identity; determining access control information associated with an avatar available for selection; determining whether the access control information associated with the user identity corresponds to the access control information associated with the avatar; and enabling selection of the avatar for use in representing the user identity when it is determined that the access control information associated with the user identity corresponds to the access control information associated with the avatar. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A computer system for applying access control information to avatar selection, the system comprising:
at least one computer adapted to perform a method, the method comprising; identifying a user identity; determining access control information associated with the user identity; determining access control information associated with an avatar available for selection; determining whether the access control information associated with the user identity corresponds to the access control information associated with the avatar; and enabling selection of the avatar for use in representing the user identity when it is determined that the access control information associated with the user identity corresponds to the access control information associated with the avatar. - View Dependent Claims (47, 48, 49, 50)
-
51. A computer-implemented method for applying access control information to avatar selection, the method comprising:
-
identifying a user identity; determining, based on an age of a user associated with the user identity, access control information associated with the user identity; determining access control information associated with an avatar available for selection; determining whether the access control information associated with the user identity corresponds to the access control information associated with the avatar; and enabling selection of the avatar for use in representing the user identity when it is determined that the access control information associated with the user identity corresponds to the access control information associated with the avatar. - View Dependent Claims (52, 53)
-
Specification