SYSTEMS AND METHODS FOR AUTHENTICATING AN AVATAR
First Claim
1. A method for authenticating an avatar for identity, useful in conjunction with an avatar, at least one virtual environment, and an end user, wherein the end user utilizes the avatar within at least one of the at least one virtual environment, the method for authenticating an avatar for identity comprising:
- generating at least one transom, wherein each transom includes a unique transom identifier and is configured to exist in a specific location within the at least one virtual environment;
registering the at least one transom with an identity provider;
initiating an authentication request through the at least one transom wherein the authentication request includes an authentication request type;
acquiring an avatar identifier for the avatar;
conveying an offer, wherein the offer includes the unique transom identifier, the specific location the transom exists and the avatar identifier;
authenticating the avatar, wherein the authentication utilizes a shared secret; and
responding to the offer with avatar identification information.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who uses the avatar in the virtual environments. Transoms are generated, each with a unique identifier configured to exist in a specific location, and registered with an identity provider. The transom initiates a request. An offer is conveyed that includes the transom identifier, the location and the avatar identifier. The avatar is then authenticated by a shared secret. The identity provider then responds to the offer with avatar identification information, including reputation information. Reputation information is for the avatar and the user, and is compiled from external avatar data sources by using a trust matrix. An avatar gallery is generated by linking each avatar owned by each user to the account and compiling avatar profiles from the account, and the reputation information. The avatar profiles are searchable, and include micro formats.
14 Citations
19 Claims
-
1. A method for authenticating an avatar for identity, useful in conjunction with an avatar, at least one virtual environment, and an end user, wherein the end user utilizes the avatar within at least one of the at least one virtual environment, the method for authenticating an avatar for identity comprising:
-
generating at least one transom, wherein each transom includes a unique transom identifier and is configured to exist in a specific location within the at least one virtual environment; registering the at least one transom with an identity provider; initiating an authentication request through the at least one transom wherein the authentication request includes an authentication request type; acquiring an avatar identifier for the avatar; conveying an offer, wherein the offer includes the unique transom identifier, the specific location the transom exists and the avatar identifier; authenticating the avatar, wherein the authentication utilizes a shared secret; and responding to the offer with avatar identification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An avatar authentication system, useful in conjunction with an avatar, at least one virtual environment, and an end user, wherein the end user utilizes the avatar within at least one of the at least one virtual environment, the avatar authentication system comprising:
-
at least one transom configured to exist in a specific location within the at least one virtual environment, and configured to request the identity of the avatar, wherein the at least one transom is managed by a relying party, wherein each transom includes a unique transom identifier, and wherein each transom is enabled to provide a first share of a shared secret; a user agent configured to couple to the end user and the relying party, wherein the user agent is configured to provide a second share of the shared secret; and an identity provider configured to couple to the at least one transom and the user agent, and wherein the identity provider is configured to provide identity for the end user when the request from the at least one transom includes a valid first share and a valid second share of the shared secret. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for generating an avatar gallery, useful in conjunction with an avatar authentication system, at least one avatar, at least one virtual environment, and at least one end user, wherein the end user utilizes the avatar within at least one of the at least one virtual environment, the method for generating an avatar gallery comprising:
-
generating an account for each of the at least one end user; linking each of the at least one avatar owned by each end user to the account; receiving avatar reputation information for each of the at least one avatar owned by each end user; receiving user reputation information for each end user; and
compiling avatar profiles, wherein compiling the avatar profiles utilize the account, the avatar reputation information and the user reputation information. - View Dependent Claims (18, 19)
-
Specification