Behavior detection and alert in virtual worlds based on spatial and temporal criteria
First Claim
1. A computer-implemented method, comprising:
- initiating a search for at least one avatar following a target avatar under control of a user within a virtual world;
as a result of the search, identifying one or more avatars suspected of following the target avatar based on predetermined criteria by at least one of (i) identifying one or more avatars present in the same virtual location as the target avatar, and (ii) identifying one or more avatars within a defined hearing range of the target avatar;
excluding, from the identified one or more avatars, any avatar that represents at least one of;
(i) a friend of the user, (ii) an acquaintance of the user, and (iii) a second user engaged in a conversation with the user;
determining one or more characteristics of movements of the identified one or more avatars within the virtual world;
upon determining that the one or more characteristics of movements indicate a presence of at least one of the identified one or more avatars in at least one virtual location during at least some of the time that the target avatar was also present in the at least one virtual location, calculating a likelihood that the presence was due to random probability;
upon determining that the calculated likelihood is below a predefined threshold, determining that the at least one of the identified one or more avatars is following the target avatar; and
blocking the at least one of the identified one or more avatars from entering a current virtual location of the target avatar.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide techniques for protecting a user from being followed by an avatar within an immersive virtual environment. To detect a following avatar, any avatars within a specified range of the user may be identified. Historical data may then be examined to determine if any of the identified avatars has been in the same recent virtual locations as the user. In order to rule out coincidental movements, the likelihood of both avatars being in the same places at the same time may be evaluated. Further, the following avatar may be tested by transporting the user to another location, and then monitoring to determine whether the following avatar also transports to the same location. Upon confirming that the following avatar is actually following the user, avoidance actions may be performed in order to avoid the following avatar.
33 Citations
11 Claims
-
1. A computer-implemented method, comprising:
-
initiating a search for at least one avatar following a target avatar under control of a user within a virtual world; as a result of the search, identifying one or more avatars suspected of following the target avatar based on predetermined criteria by at least one of (i) identifying one or more avatars present in the same virtual location as the target avatar, and (ii) identifying one or more avatars within a defined hearing range of the target avatar; excluding, from the identified one or more avatars, any avatar that represents at least one of;
(i) a friend of the user, (ii) an acquaintance of the user, and (iii) a second user engaged in a conversation with the user;determining one or more characteristics of movements of the identified one or more avatars within the virtual world; upon determining that the one or more characteristics of movements indicate a presence of at least one of the identified one or more avatars in at least one virtual location during at least some of the time that the target avatar was also present in the at least one virtual location, calculating a likelihood that the presence was due to random probability; upon determining that the calculated likelihood is below a predefined threshold, determining that the at least one of the identified one or more avatars is following the target avatar; and blocking the at least one of the identified one or more avatars from entering a current virtual location of the target avatar. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable storage medium device containing a program, which, when executed on a processor, performs an operation, the operation comprising:
-
initiating a search for at least one avatar following a target avatar under control of a user within a virtual world; as a result of the search, identifying one or more avatars suspected of following the target avatar based on predetermined criteria by at least one of (i) identifying one or more avatars present in the same virtual location as the target avatar, and (ii) identifying one or more avatars within a defined hearing range of the target avatar; excluding, from the identified one or more avatars, any avatar that represents at least one of;
(i) a friend of the user, (ii) an acquaintance of the user, and (iii) a second user engaged in a conversation with the user;determining one or more characteristics of movements of the identified one or more avatars within the virtual world; upon determining that the one or more characteristics of movements indicate a presence of at least one of the identified one or more avatars in at least one virtual location during at least some of the time that the target avatar was also present in the at least one virtual location, calculating a likelihood that the presence was due to random probability; upon determining that the calculated likelihood is below a predefined threshold, determining that the at least one of the identified one or more avatars is following the target avatar; and blocking the at least one of the identified one or more avatars from entering a current virtual location of the target avatar. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system, comprising:
-
a processor; and
a memory containing a program, which, when executed by the processor, is configured to perform an operation, the operation comprising;initiating a search for at least one avatar following a target avatar under control of a user within a virtual world;
as a result of the search, identifying one or more avatars suspected of following the target avatar based on predetermined criteria by at least one of (i) identifying one or more avatars present in the same virtual location as the target avatar, and (ii) identifying one or more avatars within a defined hearing range of the target avatar;excluding, from the identified one or more avatars, any avatar that represents at least one of;
(i) a friend of the user, (ii) an acquaintance of the user, and (iii) a second user engaged in a conversation with the user;determining one or more characteristics of movements of the identified one or more avatars within the virtual world; upon determining that the one or more characteristics of movements indicate a presence of at least one of the identified one or more avatars in at least one virtual location during at least some of the time that the target avatar was also present in the at least one virtual location, calculating a likelihood that the presence was due to random probability; upon determining that the calculated likelihood is below a predefined threshold, determining that the at least one of the identified one or more avatars is following the target avatar; and
blocking the at least one of the identified one or more avatars from entering a current virtual location of the target avatar.
-
Specification