Conversation abstractions based on trust levels in a virtual world
First Claim
1. A computer implemented method to maintain user privacy by abstracting communications in a virtual world, comprising:
- receiving a communication sent from a first user conversing with a second user represented by respective avatars at a location in a virtual world, wherein the communication includes sensitive information;
identifying a third user having an avatar present in the same location, wherein the third user is not an intended recipient of the communication;
determining that the third user'"'"'s avatar is within a virtual hearing range for observing the communication between the first user and the second user, wherein the third user'"'"'s avatar observes the communication between the first user and the second user when the third user'"'"'s avatar is within the virtual hearing range, wherein the virtual hearing range is determined based on a maximum predefined distance in the virtual world;
determining, based on predetermined trust criteria, a level of trust for the third user relative to the first user and the second user;
preventing the sensitive information from being disclosed to the third user, by abstracting the communication based on the determined level of trust; and
presenting the abstracted communication to the third user.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide techniques for abstracting conversations between avatars within a virtual world. In one embodiment, the user of an avatar observing a conversation between other avatars may be presented with an abstracted version of the conversation. The abstraction may be performed so as to enable the user to determine the general topic or nature of the conversation, without receiving sensitive or detailed information included in the conversation. In one embodiment, the abstraction is performed by substituting words of the conversation with fewer words, or words having a more general meaning. The degree of abstraction performed may be based on a level of trust between the observer and the users engaged in conversation.
11 Citations
25 Claims
-
1. A computer implemented method to maintain user privacy by abstracting communications in a virtual world, comprising:
-
receiving a communication sent from a first user conversing with a second user represented by respective avatars at a location in a virtual world, wherein the communication includes sensitive information; identifying a third user having an avatar present in the same location, wherein the third user is not an intended recipient of the communication; determining that the third user'"'"'s avatar is within a virtual hearing range for observing the communication between the first user and the second user, wherein the third user'"'"'s avatar observes the communication between the first user and the second user when the third user'"'"'s avatar is within the virtual hearing range, wherein the virtual hearing range is determined based on a maximum predefined distance in the virtual world; determining, based on predetermined trust criteria, a level of trust for the third user relative to the first user and the second user; preventing the sensitive information from being disclosed to the third user, by abstracting the communication based on the determined level of trust; and presenting the abstracted communication to the third user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable storage medium including a program, which when executed on a processor performs an operation to maintain user privacy by abstracting communications in a virtual world, comprising:
-
receiving a communication sent from a first user conversing with a second user represented by respective avatars at a location in a virtual world, wherein the communication includes sensitive information; identifying a third user having an avatar present in the same location, wherein the third user is not an intended recipient of the communication; determining that the third user'"'"'s avatar is within a virtual hearing range for observing the communication between the first user and the second user, wherein the third user'"'"'s avatar observes the communication between the first user and the second user when the third user'"'"'s avatar is within the virtual hearing range, wherein the virtual hearing range is determined based on a maximum predefined distance in the virtual world; determining, based on predetermined trust criteria, a level of trust for the third user relative to the first user and the second user; preventing the sensitive information from being disclosed to the third user, by abstracting the communication based on the determined level of trust; and presenting the abstracted communication to the third user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system, comprising:
-
a processor; and a memory containing a program, which when executed by the processor is configured to perform an operation to maintain user privacy by abstracting communications in a virtual world, comprising; receiving a communication sent from a first user conversing with a second user represented by respective avatars at a location in a virtual world, wherein the communication includes sensitive information; identifying a third user having an avatar present in the same location, wherein the third user is not an intended recipient of the communication; determining that the third user'"'"'s avatar is within a virtual hearing range for observing the communication between the first user and the second user, wherein the third user'"'"'s avatar observes the communication between the first user and the second user when the third user'"'"'s avatar is within the virtual hearing range, wherein the virtual hearing range is determined based on a maximum predefined distance in the virtual world; determining, based on predetermined trust criteria, a level of trust for the third user relative to the first user and the second user; preventing the sensitive information from being disclosed to the third user, by abstracting the communication based on the determined level of trust; and presenting the abstracted communication to the third user. - View Dependent Claims (22, 23, 24, 25)
-
Specification