Dynamic virtual dashboard
First Claim
1. A computer-implemented method for presenting identity data to users interacting with one another in a virtual environment, comprising:
- storing personal identity information associated with a first user, a second user, and a third user, respectively, the personal identity information comprising for each user, a plurality of personal identity information elements;
monitoring communications between the first user, the second user, and the third user to determine what personal identity information is revealed between the first user, the second user, and the third user based on communications therebetween;
determining that the first user has initiated a communication to the second user accessible by the third user, wherein the communication is determined to be accessible by the third user based on a determination that the third user is in the presence of the first user in the virtual environment, and that the communication discloses a personal identity information element of the plurality of personal identity information elements associated with the second user;
if the personal identity information element has not been previously revealed to the third user by the second user, programmatically replacing, by operation of one or more computer processors, the personal identity information element with an alias associated with the personal identity information element and outputting the alias, to prevent the first user from disclosing the personal identity information element to the third user, and if the personal identity information element has been previously revealed to the third user by the second user, outputting the personal identity information element to the third user without programmatically replacing the personal identity information element with an alias associated with the second information element;
determining, based on the monitored communications between the users, which personal identity information elements associated with the first and second users have been previously revealed between the first and second users and which personal identity information elements associated with the first and third users have been previously revealed between the first and third users; and
presenting, to the first user, a visual display of said determined previously revealed personal identity information elements in response to a request from the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are disclosed for helping users of virtual worlds and social networking applications to control personal identity data that other users have access to and to determine the type of identity data that users know about each other. Generally, identity awareness records may be used to store the personal identity data that a user has revealed to other users. When the user sends information to another user, personal identity data is mapped to appropriate aliases, depending upon which user is receiving the information. When the user is in the presence of other users, a visual dashboard indicates the types of personal identity information that the user knows about each other user, as well as the types of personal identity information that each other user knows about the user. The visual dashboard may also indicate the types of personal identity information that the other users know about each other.
31 Citations
24 Claims
-
1. A computer-implemented method for presenting identity data to users interacting with one another in a virtual environment, comprising:
-
storing personal identity information associated with a first user, a second user, and a third user, respectively, the personal identity information comprising for each user, a plurality of personal identity information elements; monitoring communications between the first user, the second user, and the third user to determine what personal identity information is revealed between the first user, the second user, and the third user based on communications therebetween; determining that the first user has initiated a communication to the second user accessible by the third user, wherein the communication is determined to be accessible by the third user based on a determination that the third user is in the presence of the first user in the virtual environment, and that the communication discloses a personal identity information element of the plurality of personal identity information elements associated with the second user; if the personal identity information element has not been previously revealed to the third user by the second user, programmatically replacing, by operation of one or more computer processors, the personal identity information element with an alias associated with the personal identity information element and outputting the alias, to prevent the first user from disclosing the personal identity information element to the third user, and if the personal identity information element has been previously revealed to the third user by the second user, outputting the personal identity information element to the third user without programmatically replacing the personal identity information element with an alias associated with the second information element; determining, based on the monitored communications between the users, which personal identity information elements associated with the first and second users have been previously revealed between the first and second users and which personal identity information elements associated with the first and third users have been previously revealed between the first and third users; and presenting, to the first user, a visual display of said determined previously revealed personal identity information elements in response to a request from the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium containing a program which, when executed, performs an operation for presenting identity data to a first user, comprising:
-
storing personal identity information associated with a first user, a second user, and a third user, respectively, the personal identity information comprising, for each user, a plurality of personal identity information elements; monitoring communications between the first user, the second user, and the third user to determine what personal identity information is revealed between the first user, the second user, and the third user based on communications therebetween; determining that the first user has initiated a communication to the second user accessible by the third user, wherein the communication is determined to be accessible by the third user based on a determination that the third user is in the presence of the first user in the virtual environment, and that the communication discloses a personal identity information element of the plurality of personal identity information elements associated with the second user; if the personal identity information element has not been previously revealed to the third user by the second user, programmatically replacing, by operation of one or more computer processors when executing the program, the personal identity information element with an alias associated with the personal identity information element and outputting the alias, to prevent the first user from disclosing the personal identity information element to the third user, and if the personal identity information element has been previously revealed to the third user by the second user, outputting the personal identity information element to the third user without programmatically replacing the personal identity information element with an alias associated with the second information element; determining, based on the monitored communications between the users, which personal identity information elements associated with the first and second users have been previously revealed between the first and second users and which personal identity information elements associated with the first and third users have been previously revealed between the first and third users; and presenting, to the first user, a visual display of said determined previously revealed personal identity information elements in response to a request from the first user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a processor; and a memory containing a program, which, when executed by the processor, performs an operation for presenting identity data to users interacting with one another in a virtual environment, the operation comprising; storing personal identity information associated with a first user, a second user, and a third user, respectively, the personal identity information comprising, for each user, a plurality of personal identity information elements; monitoring communications between the first user, the second user, and the third user to determine what personal identity information is revealed between the first user, the second user, and the third user based on communications therebetween; determining that the first user has initiated a communication to the second user accessible by the third user, wherein the communication is determined to be accessible by the third user based on a determination that the third user is in the presence of the first user in the virtual environment, and that the communication discloses a personal identity information element of the plurality of personal identity information elements associated with the second user; if the personal identity information element has not been previously revealed to the third user by the second user, programmatically replacing the personal identity information element with an alias associated with the personal identity information element and outputting the alias, to prevent the first user from disclosing the personal identity information element to the third user, and if the personal identity information element has been previously revealed to the third user by the second user, outputting the personal identity information element to the third user without programmatically replacing the personal identity information element with an alias associated with the second information element; determining, based on the monitored communications between the users, which personal identity information elements associated with the first and second users have been previously revealed between the first and second users and which personal identity information elements associated with the first and third users have been previously revealed between the first and third users; and presenting, to the first user, a visual display of said determined previously revealed personal identity information elements in response to a request from the first user. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification