Systems and methods for authenticating an avatar
First Claim
1. A method for authenticating an avatar for identity, useful in conjunction with an avatar, at least one virtual environment, and an end user, wherein the end user utilizes the avatar within at least one of the at least one virtual environment, the method for authenticating an avatar for identity comprising:
- generating at least one transom, wherein each transom includes a unique transom identifier and is configured to exist in a specific location within the at least one virtual environment;
registering the at least one transom with an identity provider;
initiating an authentication request through the at least one transom wherein the authentication request includes an authentication request type;
acquiring an avatar identifier for the avatar;
conveying an offer, wherein the offer includes the unique transom identifier, the specific location the transom exists and the avatar identifier;
authenticating the avatar, wherein the authentication utilizes a shared secret; and
responding to the offer with avatar identification information.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who uses the avatar in the virtual environments. Transoms are generated, each with a unique identifier configured to exist in a specific location, and registered with an identity provider. The transom initiates a request. An offer is conveyed that includes the transom identifier, the location and the avatar identifier. The avatar is then authenticated by a shared secret. The identity provider then responds to the offer with avatar identification information, including reputation information. Reputation information is for the avatar and the user, and is compiled from external avatar data sources by using a trust matrix. An avatar gallery is generated by linking each avatar owned by each user to the account and compiling avatar profiles from the account, and the reputation information. The avatar profiles are searchable, and include micro formats.
16 Citations
10 Claims
-
1. A method for authenticating an avatar for identity, useful in conjunction with an avatar, at least one virtual environment, and an end user, wherein the end user utilizes the avatar within at least one of the at least one virtual environment, the method for authenticating an avatar for identity comprising:
-
generating at least one transom, wherein each transom includes a unique transom identifier and is configured to exist in a specific location within the at least one virtual environment; registering the at least one transom with an identity provider; initiating an authentication request through the at least one transom wherein the authentication request includes an authentication request type; acquiring an avatar identifier for the avatar; conveying an offer, wherein the offer includes the unique transom identifier, the specific location the transom exists and the avatar identifier; authenticating the avatar, wherein the authentication utilizes a shared secret; and responding to the offer with avatar identification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification