Controlling communications with proximate avatars in virtual world environment
First Claim
1. A method, performed by at least one processor, of controlling a first avatar in a virtual world environment, the method comprising:
- using a virtual world application enabling access to a virtual world environment within which the first user has an avatar associated with the first user;
identifying, from within the virtual world environment, a virtual world location corresponding to the first avatar;
identifying at least one second avatar proximate to the virtual world location;
accessing filtering information;
accessing profile information related to the second avatar;
comparing the filtering information to the accessed profile information;
determining, based on the comparison results, a metric related to the second avatar;
relating the metric to a threshold;
determining whether relating the metric to the threshold supports enabling communications between the first and second avatars; and
if so, enabling communications to be exchanged between the first and second avatars.
9 Assignments
0 Petitions
Accused Products
Abstract
A first user'"'"'s avatar in a virtual world environment may be controlled by using a virtual world application enabling access to a virtual world environment within which the first user has an avatar associated with the first user. A virtual world location corresponding to the first avatar is identified. At least one second avatar proximate to the virtual world location is identified. Filtering information is accessed. Profile information related to the second avatar is accessed. Filtering information is compared to the accessed profile information. Based on the comparison results, a metric related to the second avatar is determined. The metric is related to a threshold. It is determined whether relating the metric to the threshold supports enabling communications between the first and second avatars, and if so, communications to be exchanged between the first and second avatars are enabled.
117 Citations
42 Claims
-
1. A method, performed by at least one processor, of controlling a first avatar in a virtual world environment, the method comprising:
-
using a virtual world application enabling access to a virtual world environment within which the first user has an avatar associated with the first user; identifying, from within the virtual world environment, a virtual world location corresponding to the first avatar; identifying at least one second avatar proximate to the virtual world location; accessing filtering information; accessing profile information related to the second avatar; comparing the filtering information to the accessed profile information; determining, based on the comparison results, a metric related to the second avatar; relating the metric to a threshold; determining whether relating the metric to the threshold supports enabling communications between the first and second avatars; and if so, enabling communications to be exchanged between the first and second avatars. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for controlling a first avatar in a virtual world environment, the system comprising:
-
at least one processor; means for using a virtual world application enabling access to a virtual world environment within which the first user has an avatar associated with the first user; means for identifying, from within the virtual world environment, a virtual world location corresponding to the first avatar; means for identifying at least one second avatar proximate to the virtual world location; means for accessing filtering information; means for accessing profile information related to the second avatar; means for comparing the filtering information to the accessed profile means for determining, based on the comparison results, a metric related to the second avatar; means for relating the metric to a threshold; means for determining whether relating the metric to the threshold supports enabling communications between the first and second avatars; and means for enabling communications to be exchanged between the first and second avatars if it is determined that relating the metric to the threshold supports enabling communications between the first and second avatars. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program stored in a computer non-transitory storage medium, the computer program comprising instructions that when executed on at least one processor cause the program to:
-
use a virtual world application enabling access to a virtual world environment Within which the first user has an avatar associated with the first user; identify, from within the virtual world environment, a virtual world location corresponding to the first avatar; identify at least one second avatar proximate to the virtual world location; access filtering information; access profile information related to the second avatar; compare the filtering information to the accessed profile information; determine, based on the comparison results, a metric related to the second avatar; relating the metric to a threshold; determining whether relating the metric to the threshold supports enabling communications between the first and second avatars; and if so, enabling communications to be exchanged between the first and second avatars. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification