Applying access controls to communications with avatars
First Claim
1. A computer-implemented method for applying access control information to avatar selection, the method comprising:
- identifying a user identity;
determining access control information associated with the user identity;
determining access control information associated with an avatar available for selection;
determining whether the access control information associated with the user identity corresponds to the access control information associated with the avatar; and
enabling selection of the avatar for use in representing the user identity in an electronic message only when it is determined that the access control information associated with the user identity corresponds to the access control information associated with the avatar.
2 Assignments
0 Petitions
Accused Products
Abstract
Senders of instant messages may inspire perception by a recipient of avatars capable of being animated in order to customize or personalize communication exchanges from the sender. The avatar, an animation of or associated with the avatar, an object associated with the avatar, or another component of the avatar or communication may be inappropriate, or otherwise objectionable, to the recipient, the recipient class or category, or an identity associated with the recipient. In one example, a parent of a minor who is the intended recipient of an avatar (or a component of the avatar or communication) may object to the minor being exposed to the avatar (or the component of the avatar or communication). In such a case, the communication may be discarded or the perception of the objectionable avatar (or component associated with the avatar or the communication) by the intended recipient may be disabled, replaced or modified.
-
Citations
25 Claims
-
1. A computer-implemented method for applying access control information to avatar selection, the method comprising:
-
identifying a user identity; determining access control information associated with the user identity; determining access control information associated with an avatar available for selection; determining whether the access control information associated with the user identity corresponds to the access control information associated with the avatar; and enabling selection of the avatar for use in representing the user identity in an electronic message only when it is determined that the access control information associated with the user identity corresponds to the access control information associated with the avatar. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method for applying access control information to creating triggers to control avatar animation, the method comprising:
-
identifying a user identity associated with an avatar capable of being animated in response to a text trigger, wherein the avatar is capable of being animated in response to detection of the text trigger in an electronic message; determining access control information associated with the user identity; receiving an indication of a text trigger to be used to animate the avatar; determining access control information associated with the text trigger; determining whether the access control information associated with the user identity corresponds to the access control information associated with the indicated text trigger; and enabling association of the indicated text trigger with the avatar only when it is determined that the access control information associated with the user identity corresponds to the access control information associated with the indicated text trigger. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer-implemented method for applying access control information to avatar selection, the method comprising:
-
identifying a user identity associated with a user of a messaging system; determining access control information associated with the user identity; receiving, by the user, a selection of an avatar to be associated with the user; determining whether the access control information associated with the user identity corresponds to access control information associated with the selected avatar; when it is determined that the access control information associated with the user identity corresponds to the access control information associated with the selected avatar, associating the user identity with the selected avatar for use in the messaging system; and when it is determined that the access control information associated with the user identity does not correspond to the access control information associated with the selected avatar, preventing association of the user identity with the selected avatar for use in the messaging system.
-
Specification