Region access authorization in a virtual environment
First Claim
Patent Images
1. A method comprising:
- regulating crossing, by an avatar, of a region boundary of a region in a virtual universe, the crossing of the region boundary comprising entering the region by the avatar or exiting the region by the avatar, the regulating comprising;
providing said avatar with a public key pair of indicia for secure communication with a region authority associated with said region, and for secure communication with a trusted third party, the region authority regulating access of the avatar to one or more regions in the virtual universe, and the trusted third party storing a persona profile of the avatar, protected with said public key pair, said persona profile comprising one or more attributes describing the avatar;
providing, by the avatar, credentials to the region authority, the credentials indicating permission of the region authority to obtain the persona profile from the trusted third party;
responsive to the region authority providing the credentials to the trusted third party, the trusted third party obtaining the persona profile and providing the persona profile to the region authority; and
determining by the region authority whether to deny permission of the avatar to cross the region boundary based on the one or more attributes of the persona profile provided by the trusted third party.
4 Assignments
0 Petitions
Accused Products
Abstract
The passage of avatars into and out of regions in a virtual universe is regulated through the use of secure communications between and among the avatar, an authority managing of the region and a trusted third party who maintains a database of avatar characteristics. Permission to move from one virtual region to another is determined based upon the avatar characteristics.
-
Citations
21 Claims
-
1. A method comprising:
regulating crossing, by an avatar, of a region boundary of a region in a virtual universe, the crossing of the region boundary comprising entering the region by the avatar or exiting the region by the avatar, the regulating comprising; providing said avatar with a public key pair of indicia for secure communication with a region authority associated with said region, and for secure communication with a trusted third party, the region authority regulating access of the avatar to one or more regions in the virtual universe, and the trusted third party storing a persona profile of the avatar, protected with said public key pair, said persona profile comprising one or more attributes describing the avatar; providing, by the avatar, credentials to the region authority, the credentials indicating permission of the region authority to obtain the persona profile from the trusted third party; responsive to the region authority providing the credentials to the trusted third party, the trusted third party obtaining the persona profile and providing the persona profile to the region authority; and determining by the region authority whether to deny permission of the avatar to cross the region boundary based on the one or more attributes of the persona profile provided by the trusted third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
19. A method comprising:
providing a computer infrastructure operable to regulate crossing, by an avatar, of a region boundary of a region in a virtual universe, the crossing of the region boundary comprising entering the region by the avatar or exiting the region by the avatar, wherein the regulating comprises; providing said avatar with a public key pair of indicia for secure communication with a region authority associated with said region, and for secure communication with a trusted third party, the region authority regulating access of the avatar to one or more regions in the virtual universe, and the trusted third party storing a persona profile of the avatar, protected with said public key pair, said persona profile comprising one or more attributes describing the avatar; providing, by the avatar, credentials to the region authority, the credentials indicating permission of the region authority to obtain the persona profile from the trusted third party; responsive to the region authority providing the credentials to the trusted third party, the trusted third party obtaining the persona profile and providing the persona profile to the region authority; and determining by the region authority whether to deny permission of the avatar to cross a the region boundary based on the one or more attributes of the persona profile provided by the trusted third party.
-
20. A non-transitory computer readable storage medium containing thereon program for execution by a processor to perform a method comprising:
-
regulating crossing, by an avatar, of a region boundary of a region in a virtual universe, the crossing of the region boundary comprising entering the region by the avatar or exiting the region by the avatar, the regulating comprising; providing said avatar with a public key pair of indicia for secure communication with a region authority associated with said region, and for secure communication with a trusted third party, the region authority regulating access of the avatar to one or more regions in the virtual universe, and the trusted third party; storing a persona profile of the avatar, protected with said public key pair, said persona profile comprising one or more attributes describing the avatar; and
providing, by the avatar, credentials to the region authority, the credentials indicating permission of the region authority to obtain the persona profile from the trusted third party;responsive to the region authority providing the credentials to the trusted third party, the trusted third party obtaining the persona profile and providing the persona profile to the region authority; and determining by the region authority whether to deny permission of the avatar to cross the region boundary based on the one or more attributes of the persona profile provided by the trusted third party.
-
-
21. A data processing system comprising:
-
a memory; and a processor in communications with the memory, wherein the data processing system is configured to perform a method comprising; regulating crossing, by an avatar, of a region boundary of a region in a virtual universe, the crossing of the region boundary comprising entering the region by the avatar or exiting the region by the avatar, the regulating comprising; providing said avatar with a public key pair of indicia for secure communication with a region authority associated with said region and for secure communication with a trusted third party, the region authority regulating access of the avatar to one or more regions in the virtual universe, and the trusted third party storing a persona profile of the avatar, protected with said public key pair, said persona profile comprising one or more attributes describing the avatar; providing, by the avatar, credentials to the region authority, the credentials indicating permission of the region authority to obtain the persona profile from the trusted third party; responsive to the region authority providing the credentials to the trusted third party, the trusted third party obtaining the persona profile and providing the persona profile to the region authority; and determining by the region authority whether to deny permission of the avatar to cross the region boundary based on the one or more attributes of the persona profile provided by the trusted third party.
-
Specification