Applying access controls to communications with avatars
First Claim
1. A computer-implemented method for applying access control information to an instant message, the method comprising:
- receiving an instant message sent by a sender to a recipient, the instant message including an avatar associated with the sender and content conveying information from the sender to the recipient;
determining access control information of the avatar, the access control information of the avatar including an avatar access control level associated with the avatar;
determining access control information of the recipient, the access control information of the recipient including a recipient access control level associated with the recipient;
comparing the avatar access control level to the recipient access control level to determine whether the recipient can access the avatar;
enabling perception of the avatar by the recipient with content of the instant message only if the comparison of the avatar access control level to the recipient access control level indicates access is appropriate; and
restricting the avatar from being perceived by the recipient when the comparison indicates access of the avatar by the recipient is inappropriate.
8 Assignments
0 Petitions
Accused Products
Abstract
Senders of instant messages may inspire perception by a recipient of avatars capable of being animated in order to customize or personalize communication exchanges from the sender. The avatar, an animation of or associated with the avatar, an object associated with the avatar, or another component of the avatar or communication may be inappropriate, or otherwise objectionable, to the recipient, the recipient class or category, or an identity associated with the recipient. In one example, a parent of a minor who is the intended recipient of an avatar (or a component of the avatar or communication) may object to the minor being exposed to the avatar (or the component of the avatar or communication). In such a case, the communication may be discarded or the perception of the objectionable avatar (or component associated with the avatar or the communication) by the intended recipient may be disabled, replaced or modified.
342 Citations
45 Claims
-
1. A computer-implemented method for applying access control information to an instant message, the method comprising:
-
receiving an instant message sent by a sender to a recipient, the instant message including an avatar associated with the sender and content conveying information from the sender to the recipient; determining access control information of the avatar, the access control information of the avatar including an avatar access control level associated with the avatar; determining access control information of the recipient, the access control information of the recipient including a recipient access control level associated with the recipient; comparing the avatar access control level to the recipient access control level to determine whether the recipient can access the avatar; enabling perception of the avatar by the recipient with content of the instant message only if the comparison of the avatar access control level to the recipient access control level indicates access is appropriate; and restricting the avatar from being perceived by the recipient when the comparison indicates access of the avatar by the recipient is inappropriate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system for applying access control information to an instant message, the system comprising:
-
one or more processing devices; and one or more storage devices storing instructions that, when executed, cause the one or more processing devices to; receive an instant message sent by a sender to a recipient, the instant message including an avatar associated with the sender and content conveying information from the sender to the recipient; determine access control information of the avatar, the access control information of the avatar including an avatar access control level associated with the avatar; determine access control information of the recipient, the access control information of the recipient including a recipient access control level associated with the recipient; compare the avatar access control level to the recipient access control level to determine whether the recipient can access the avatar; enable perception of the avatar by the recipient with content of the instant message only if the comparison of the avatar access control level to the recipient access control level indicates access is appropriate; and restrict the avatar from being perceived by the recipient when the comparison indicates access of the avatar by the recipient is inappropriate. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A non-transitory computer readable medium encoded with a computer program product comprising instructions that, when executed, operate to cause a computer to perform operations comprising:
-
receiving an instant message sent by a sender to a recipient, the instant message including an avatar associated with the sender and content conveying information from the sender to the recipient; determining access control information of the avatar, the access control information of the avatar including an avatar access control level associated with the avatar; determining access control information of the recipient, the access control information of the recipient including a recipient access control level associated with the recipient; comparing the avatar access control level to the recipient access control level to determine whether the recipient can access the avatar; enabling perception of the avatar by the recipient with content of the instant message only if the comparison of the avatar access control level to the recipient access control level indicates access is appropriate; and restricting the avatar from being perceived by the recipient when the comparison indicates access of the avatar by the recipient is inappropriate. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification