Providing notification of spam avatars
First Claim
1. A method in a virtual universe (VU) system comprising:
- identifying, by a VU server having at least one computing device, a spam avatar operating in a region of a virtual universes;
rendering, by the VU server automatically in response to the identifying of the spam avatar, the spam avatar by altering an original avatar of a user associated with the spam avatar with a distinguishable mark added to the original avatar that modifies only a portion of the appearance of the original avatar and differentiates the spam avatar from non-spam avatars;
eliminating by the user, using the at least one computing device, the distinguishable mark;
re-rendering, using the at least one computing device, the spam avatar as the original avatar with the distinguishable mark eliminated; and
removing, using the at least one computing device, the spam avatar from a black list of spam avatars in response to the re-rendering.
2 Assignments
0 Petitions
Accused Products
Abstract
Provided are approaches for monitoring activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A storing mechanism stores a “black list” and a black list score consisting of a list of spam avatar identifications (UUIDs) matching avatars that have been flagged as confirmed or suspected spam advertisers. Another mechanism allows the owner to redraw or otherwise re-render a distinguishing mark when an avatar has been detected as being a spam advertiser. Yet another mechanism signals to the owner of an offending avatar that they have been added to the black list or had a report filed against them. Another mechanism allows for a black listed avatar to be removed from the black list, and scores to be decreased and for the virtual universe and users to utilize the black list and score.
81 Citations
20 Claims
-
1. A method in a virtual universe (VU) system comprising:
-
identifying, by a VU server having at least one computing device, a spam avatar operating in a region of a virtual universes; rendering, by the VU server automatically in response to the identifying of the spam avatar, the spam avatar by altering an original avatar of a user associated with the spam avatar with a distinguishable mark added to the original avatar that modifies only a portion of the appearance of the original avatar and differentiates the spam avatar from non-spam avatars; eliminating by the user, using the at least one computing device, the distinguishable mark; re-rendering, using the at least one computing device, the spam avatar as the original avatar with the distinguishable mark eliminated; and removing, using the at least one computing device, the spam avatar from a black list of spam avatars in response to the re-rendering. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable storage device storing computer instructions, which when executed, enables a computer system to identify and manage spam avatars, the computer instructions comprising:
-
identifying a spam avatar operating in a region of a virtual universe (VU); rendering, by a VU server automatically in response to the identifying of the spam avatar, the spam avatar by altering an original avatar of a user associated with the spam avatar with a distinguishable mark added to the original avatar that modifies only a portion of the appearance of the original avatar and differentiates the spam avatar from non-spam avatars; eliminating, by the user, the distinguishable mark; re-rendering the spam avatar as the original avatar with the distinguishable mark eliminated; and removing the spam avatar from a black list of spam avatars in response to the re-rendering. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system in a virtual universe environment having avatars and spam avatars, the avatars and spam avatars having owners and identifications, the system comprising:
-
memory operably associated with a spam avatar identifier component and a modification component, the spam avatar identifier component and the modification component containing computer instructions, which when executed, cause the system to; identify a spam avatar operating in a region of a virtual universe (VU); render, by a VU server automatically in response to the identifying of the spam avatar, the spam avatar by altering an original avatar of a user associated with the spam avatar with a distinguishable mark added to the original avatar that modifies only a portion of the appearance of the original avatar and differentiates the spam avatar from non-spam avatars; eliminate, by the user, the distinguishable mark; re-render the spam avatar as the original avatar with the distinguishable mark eliminated; and remove the spam avatar from a black list of spam avatars in response to the re-rendering. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification