Systems and methods of assessing permissions in virtual worlds
First Claim
1. A method of determining permissibility of actions within a virtual world, the method comprising:
- identifying, by a service provider comprising computing hardware, an attempt by a virtual world entity to take an action upon an object within a virtual world;
selecting one or more gatekeeper objects having permission rules configured to determine permissibility of the action to be taken by the virtual world entity on the object, the permission rules including an avatar matching component, an action matching component, or an object matching component;
iterating through one or more of the gatekeeper objects to identify one or more applicable permission rules based on the virtual world entity, the action to be taken, and the object to be acted upon;
determining whether the action is permitted based on the one or more applicable permission rules; and
automatically permitting or disallowing the action based on the determination of whether the action is permitted.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.
-
Citations
11 Claims
-
1. A method of determining permissibility of actions within a virtual world, the method comprising:
-
identifying, by a service provider comprising computing hardware, an attempt by a virtual world entity to take an action upon an object within a virtual world; selecting one or more gatekeeper objects having permission rules configured to determine permissibility of the action to be taken by the virtual world entity on the object, the permission rules including an avatar matching component, an action matching component, or an object matching component; iterating through one or more of the gatekeeper objects to identify one or more applicable permission rules based on the virtual world entity, the action to be taken, and the object to be acted upon; determining whether the action is permitted based on the one or more applicable permission rules; and automatically permitting or disallowing the action based on the determination of whether the action is permitted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system configured to determine permissibility of actions within a virtual world, the computer system comprising:
-
non-transitory computer-readable storage having stored thereon a plurality of modules implemented as executable instructions; one or more computer processors configured to execute the plurality of modules; an action identification module configured to identify an attempt by a virtual world entity to take an action upon an object within a virtual world; a gatekeeper selection module configured to select one or more gatekeeper objects having permission rules configured to determine permissibility of the action to be taken by the virtual world entity on the object, the permission rules including one or more of an avatar matching component, an action matching component, and an object matching component; a rule application module configured to iterate through one or more of the gatekeeper objects to identify one or more applicable permission rules based on the virtual world entity, the action to be taken, and the object to be acted upon; a permission determination module configured to determine whether the action is permitted based on the one or more applicable permission rules; and a rule execution module configured to automatically permit or disallow the action based on the determination of whether the action is permitted.
-
Specification