This invention relates generally to field of virtual worlds and more particularly to the development, use and operation of a virtual world.
A virtual world is a computer-base simulated environment intended for its residents to traverse, inhabit and interact, often through the use of avatars. An avatar is a graphical element selected by a user of a system that other users can see and which represents the user. Avatars often take the form of cartoon-like humans, but any other graphical or non graphical representation is possible. For example, an avatar may be a static image, a computer-generated animation or a point of view not perceivable to other participants in the virtual world. Users or residents of a virtual world can interact through their avatars using a myriad of communication and collaboration technologies including, but not limited to, known chat-room technology. For example, to mimic the behavior of real life human interactions, when an avatar speaks a text window can appear on the user interface of the other users whose avatars are within hearing range of the speaking avatar using known chat-room technology. Audio can be used to convey speech, or virtual objects can be used to convey meanings that can not be expressed with spoken or written language.
Other important virtual world concepts include agents and regions. An agent is a user account, upon which the user can build an avatar. The agent is associated with an inventory of assets the user can own. A region is a three dimensional virtual area of land within a virtual world. Assets, avatars, the environment and anything else visual consists of unique identifiers (UUIDs, see http:widipedia.org/wiki/UUID) associated with geometric data (distributed to users as textual coordinates, lists of polygons or lists of vectors, for example), textures (distributed to users as graphics files such as JPEG2000 files), and effects data (rendered by the user's client according to user preferences and user device capabilities.
Many virtual worlds are represented using three dimensional graphics and landscapes, and may be used by many thousands of participants, sometimes known as residents, each having one or more avatars. Residents of a virtual world may traverse and inhabit the virtual world, and interact with one another through the use of those avatars. Other terms for virtual worlds include virtual universes, metaverses, virtual realities, massively multiplayer online games, virtual realms and 3D internet.
Often, virtual worlds resemble the real world in many ways. For example, virtual worlds can resemble the real world as in terms of physics, houses and other buildings, and landscapes. Examples of virtual worlds can include: Second Life, Entropia World, The Sims Online, There, Red Light Center and several massively multiplayer online games such as EverQuest, Ultima Online, Lineage or World of Warcraft.
In many virtual world situations there is a need or desire to add virtual world functionality, virtual world objects, virtual world interactions, and users to an existing virtual world. However, for technical reasons the virtual world content or infrastructure often cannot be easily augmented or expanded. Additionally, in some known virtual world situations a virtual world user population can require segmentation for purposes of security and functionality. Therefore, methods are required to extend functionality and capacity for existing virtual worlds. Furthermore, methods are also needed to segregate user populations within virtual worlds.
One case where extension of functionality can be required is in military virtual world embodiments that require information hiding. The information hiding can be based on security level or levels of clearance. Another example where extension of functionality can be required is providing age appropriate content where adults and children participate in a single virtual world, but only adults may view adult designated content. Other examples can include providing managerial control and objects in worlds in which world managers may see and interact with objects not accessible to the general population participating within the virtual world, and providing a referee view for sports and activities that require officiating. In contests such as sporting events a referee may have a view of objects and object modifications in the virtual world that help officiate, but may otherwise be a distraction to players.
It may be useful to provide modification, editing rights and functionality to a subset of users of a virtual world. Virtual world development and providing secure and cost effective virtual world content creation tools can be a complex task. Thus, an ability to permit virtual world content creation, the addition of new functionality, manipulation in a live virtual world without the need to integrate security, and the tooling directly into the virtual world are useful. This can be cumbersome, expensive, and disruptive.
For example, new functionality and content can be created on an isolated copy of a virtual world, and then migrated to a production copy of the virtual world. This can delay end user involvement and require maintenance of multiple copies of virtual worlds. It can also delay the process of moving functionality from development to production and require disruption of service in the production copy of the virtual world.
Also, managing multiple virtual worlds efficiently and effectively, while separating in-world management functionality is useful. For example, in a virtual world embodiment called Second Life adding functionality to the infrastructure of a specific user population can require modification of the infrastructure itself. Infrastructure modification can be extremely intrusive to virtual world operation, often requiring the entire world or regions within the world to be non-functional for periods of time.
Referring now to
Two methods for extending capacity and functionality of a virtual world such as the prior art virtual world system 10 are known to those skilled in the art. One method is segregating and extending the functionality through a permissions-based mechanism. Another method is providing community segregation through the creation of independent instances of the virtual world.
Permissions based mechanisms that control functionality and access to objects and areas within a virtual world can require all functionality, access control lists and the user community to be managed by a single virtual world instance. Such a system may require continual updates, and capacity and functionality enhancements to the single virtual world infrastructure. Additionally, a single virtual world instance may be required to manage user and functionality accounting for the virtual world. It may not always be desirable to consolidate information and functionality into a single system for a number of reasons including manageability, upgradeability, and understandability.
The other known method for extending capacity and functionality is community segregation. Community segregation can require creation of a separate and independent copy of the virtual world. This practice can create a completely separate and isolated copy of a virtual world. Such an approach can require a complete copy of a virtual world wherein the isolated virtual world requires the same infrastructure as the original. It is common for this method to be used to enhance capacity. Each independent copy can manage and provide functionality for its population base without leveraging existing virtual worlds. Such a method can require inefficient duplication of resources, and a change to the original virtual world must be copied to all derived virtual worlds.
A method for providing virtual world functionality, to a user of a base virtual world having base virtual world functionality includes providing a virtual world layer having virtual world layer functionality beyond the base virtual world functionality, coupling the virtual world layer to the base virtual world, and coupling the virtual world layer to the user. The method also includes providing user access to the base virtual world functionality and to the virtual world layer functionality by the virtual world layer. The user access is provided according to a user command and only by way of the virtual world layer. The base virtual world has a base virtual world object and the virtual world layer has a layer virtual world object. Those skilled in the art will understand that, for example, a base virtual world object can be referred to as a base world object for convenience, and a layer virtual world object can be referred to as a layer world object for convenience. A state of the base world object is managed by the base virtual world to provide a base managed object. A state of the layer world object is managed by the virtual world layer to provide a layer managed object. A state of the base managed object is managed by the virtual world layer to provide a further managed object. User access to the layer managed object and to the further managed object is provided by the virtual world layer. User access to the base managed object is provided by the virtual world layer and the further managed object is independent of any instantiation of the base world object in the virtual world layer. The layer managed object is independent of any instantiation of the layer world object in the base virtual world.
A method for providing virtual world functionality to a user includes coupling a first virtual world layer to the base virtual world and coupling second and third virtual world layers to the first virtual world layer. Segregated users get user access to the base virtual world by way of the second virtual world layer and by way of the third virtual world layer. The base virtual world has a base world object and the second virtual world layer has a second layer world object. User access to a base managed object is provided according to a user command. User access is provided only by way of the virtual world layers. A further managed object is independent of any instantiation of the base world object in the virtual world layers. The layer managed object is independent of any instantiation of the layer world object in the base virtual world.
A method for providing virtual world functionality to a user of a base virtual world having base virtual world functionality and a list of base virtual world users includes providing a virtual world layer, communicating to the base virtual world that the virtual world layer will overlay the base virtual world, and adding the virtual world layer to the list of base virtual world users in order to register the virtual world layer with the base virtual world. A base world functionality to be augmented by the virtual world layer is communicated to the base virtual world. The virtual world layer has a registration list of virtual world layer users and the base virtual world is added to the list of virtual world layer users. The base virtual world functionality is executed by way of the virtual world layer.
The virtual world layer has virtual world layer functionality beyond the base virtual world functionality and a virtual world layer user community. The virtual world layer is coupled to the virtual world layer user community. The virtual world layer user community is provided with access to the base virtual world functionality and the virtual world layer functionality by the virtual world layer. The base virtual world and the virtual world layer each have a respective user community and the user communities are segregated. The base virtual world has base world objects and the virtual world layer notifies the base virtual world which base world objects the virtual world layer will use to provide used base world objects. The used base world objects are managed by the virtual world layer to provide world managed base objects. For example, a texture of the virtual world managed base objects is altered.
A method for providing virtual world functionality to a user of a base virtual world having base virtual world functionality includes providing a virtual world layer having virtual world layer functionality beyond the base virtual world functionality, encapsulating the virtual world layer to provide a virtual world module, transmitting the virtual world module to virtual layer infrastructure to provide a transmitted virtual world module, and executing the transmitted virtual world module to provide user access to the base virtual world functionality and the virtual world layer functionality. A provisioning specification is provided within the virtual world module. The virtual world layer has virtual world layer infrastructure and the virtual world layer infrastructure is provisioned in accordance with the provisioning specification. Computing equipment is provisioned in accordance with the provisioning specification. Accounting support software within the virtual world module is provisioned in accordance with the provisioning specification. Networking is performed in accordance with the virtual world module. The virtual world module is unpacked to provide an unpacked virtual world module and the unpacked virtual world module is executed. The virtual world module is transmitted by a content creator.
Referring now to
Those skilled in the art can use a virtual world layer order notation VW[0] to represent the base virtual world 22. The virtual world layer order notation VW[1] can represent the virtual world layer 26. Furthermore, the virtual world layer order notation View[0] can represent the base virtual world view 24, and View[1] can represent the layer virtual world view 28. The virtual world layer order notation used herein can be a bracketed notation that is substantially similar to array notations common in many programming languages. In this virtual world layer order notation each bracketed numerical value following a virtual world name or virtual world view name can represent a tier.
The virtual world layer 26 can be a middleware including a layered virtual world server, or multiple servers with disk arrays for storing the source virtual world objects of the layer 26. The layer virtual world server can interact with the base virtual world 22 on behalf of the community of layered virtual world users. Any interaction of the virtual world layer 26 that affects the base virtual world 22 can pass through the virtual world layer 26 to the base virtual world 22. Participants in the single layered virtual world system 20 who are not using the layer virtual world view 28 can interact with the base virtual world 22 by connecting directly to it, for example directly using the base virtual world view 24. The single layered virtual world system 20 is inherently secure since the layer objects within the virtual world layer 26 do not exist in the base virtual world 22. The only way participants of the virtual world layer 26 can interact with the layer objects is by accessing the layered virtual world server within the virtual world layer 26.
The user community viewing the layer virtual world view 28 receives the enhanced functionality provided by the virtual world layer 26 including access to additional objects stored by its server by issuing commands to the virtual world layer 26. Furthermore, access to the additional objects can be exclusive to the user community viewing the layer virtual world view 28. The server within the virtual world layer 26 communicates with the base virtual world 22 to retrieve states, objects, textures, scripts, etc. However, the virtual world layer 26 can manage the state and persistence of its own objects and their relation and interaction with the objects of the base virtual world 22.
Furthermore, the virtual world layer 26 can manage its own separate list of users. Clients of the virtual world layer 26, such as the layer virtual world view 28, may render and interact with all of the objects found in the base virtual world 22, but they may also interact with all of the objects stored in the virtual world layer 26. The single layer virtual world view 24 thus enables user access to objects that do not exist in the base virtual world 22. For example, in the embodiment shown in
In one preferred embodiment the layer virtual world view 28 may also provide additional interaction with objects managed in the base virtual world 22. For example, virtual world designers may not want to permit the general population of the base virtual world 22 to change or delete objects in the base virtual world 22. Such actions may be permitted for users of the layer virtual world view 28, and only the user community interacting with the world through single layer virtual world view 28 may have the ability to change and delete functionality.
Accordingly, the use of a virtual world layer package including the single layered virtual world system 20 can extend the functionality and capacity of the existing base virtual world 22, while minimizing the impact and the demand on the base virtual world 22. The layer packages can be used to customize a base virtual world infrastructure without requiring the creator of the customized world to build or maintain a computational infrastructure to support the virtual world. The packages can contain objects, textures, scripts, etc. that describe a virtual world. The packages may describe a complete virtual world or may override only specific items of the base virtual world where the designers deploy them.
The single layered virtual world system 20 or single layered virtual world method 20 can enable an extension of the base virtual world 22 through the implementation of one or more virtual world infrastructures. The virtual world infrastructures can include the layered virtual world server that can act as a proxy between the user and the base virtual world 22 being extended. The layered virtual worlds or proxy virtual worlds can add functionality to the base virtual world 22 by implementing functionality present only on their infrastructure, and managing objects and users that are not part of, or exposed to, the base virtual world 22 or its users. The management of their own virtual world objects by the virtual world layers is in addition to any managing of the base world objects being passed through the layers from the base virtual world 22 to the user community of the virtual world layers.
In a typical virtual world environment such as the prior art virtual world 10 all participants connect to an instance of the virtual world. All participants interact with the same objects. However, within the single layered virtual world system 20 different user communities can have different interactions with the base virtual world 22 mediated by their different virtual world layers 26. Thus, the additional virtual world servers may layer objects and functionality upon the objects and functionality provided by the base virtual world 22. The layered, isolated and differentiated virtual worlds may thus support complementary communities and provide a solution to a number of problems afflicting the development and operation of virtual worlds. Furthermore, the single layered virtual world system 20 permits segregation of user communities whereby the base virtual world 22 does not require knowledge of the users on the single layered virtual world system 20.
An important advantage of the single layered virtual world system 20 is that it can leverage the functionalities of the base virtual world 22 while requiring only enough infrastructures to support its own functionality and its own user community. For example, a layer such as the single layered virtual world system 20 can be designed to tint all of the buildings or selected buildings in a base virtual world a predetermined color. It can be designed to operate selectively on objects provided by the base virtual world according to any parameters or data. For example, a layer can be designed to operate on objects according to global positioning system data that may be associated with the base virtual world objects. In another alternate embodiment objects can be provided with receptor sites for associating images or video or other objects with the receptor sites. For example, the layer can cause images or video to be displayed upon a rendering of an object at the receptor sites of the object.
Participants are users of a virtual world who can interact with augmentations to the base virtual world by connecting exclusively to a layered virtual world server which manage the additional objects not visible or accessible by users of the base virtual world 22. In order to do this its infrastructure communicates with the base virtual world 22 and one or more virtual world clients. Furthermore, single layered virtual world system 20 enables its users to interact with the users of the base virtual world 22 while providing complete segregation between the user communities.
Referring now to
The multiple layered virtual world system 30 embodiment permits multiple communities to access a single base virtual world 32 by way of its own virtual world view 38a-n. It is modular and may be extended to as many layers as required. The base virtual world 32 can maintain the lowest common functionality and object states within the multiple layered virtual world system 30, while the virtual world layers 36a-n can provide n additional separate sets of functionality and object states. Each virtual world layer of the virtual world layers 36a-n inherits the functionality of the base virtual world 32 and the functionality of the virtual world layers between the base virtual world 32 and itself. Additionally, each virtual world layer of the virtual world layers 36a-n adds its own additional functionality to the inherited functionalities. Accordingly, each of the virtual world layers 36a-n provides its inherited functionality and its own functionality, to its own distinct user community by way of its own virtual world view.
Referring now to
However, according to a preferred embodiment of the invention, the parallel multiple layered virtual world system 40 can also be provided with a further series of virtual world layers. The further series of virtual world layers can be coupled to the virtual world layer 46a and can extend to the virtual world layer 46m. Thus, the reference numeral 46a-m can be understood to indicate a total of m elements, ranging from a first virtual element 46a to an mth element 46m, substantially in a manner as previously described with respect to the reference numeral 46a-n. Furthermore, the string of the virtual world layers 46a-n and the string of the virtual world layers 46a-m will be understood to include a common virtual world layer 46a, which is coupled to the base virtual world 42. Each of the virtual world layers 46a-m in the parallel multiple layered virtual world system 40 can inherit the functionality of the base virtual world and the virtual world layers it is layered upon and provide the inherited functionalities along with its own functionality to a user. Additionally, each virtual world layer 46a-m can be provided with its own virtual world view 48a-m for providing the combined functionalities to its user community. Therefore, a user community in the parallel multiple layered virtual world system 40 can view the base virtual world 42 by way of at least two virtual world layers.
Furthermore, any number of additional series of layered virtual worlds beyond layered virtual worlds shown and described can be added in parallel to the parallel multiple layered virtual world system 40 in substantially the same manner. The users coupled to a layer of the parallel multiple layered virtual world system 40 can obtain user access to the augmented functionality or the base virtual world 42 by issuing predetermined commands understood by those skilled in the art. Accordingly,
Parallel layered virtual world systems such as the parallel multiple layered virtual world system 40 are believed to be advantageous for supporting user communities with complex management structures. For example, the parallel multiple layered virtual world system 40 can be useful in a simulation containing separate intelligence personnel supporting a training mission. Soldiers in the training scenario may, for example, connect to the base virtual world 42. The immediate superiors of the soldiers could be provided with additional resources and functionality by attaching them to the various virtual world layer 46a-n. Additionally, intelligence teams may attach to a layered virtual world view VW[2][1] that may contain information and functionality above the security clearance of the soldiers, and their immediate superiors. Trainers may connect to a parallel layered view of the parallel multiple layered virtual world system 40, separate and distinct from that of the intelligence team. The virtual world layer VW[2][1] can provide functionality specific to trainers and command personnel that is not appropriate for the individual soldier or intelligence team members. In this scenario it may not be appropriate to layer intelligence functionality on top of command functionality, or vise versa.
An important benefit of the parallel multiple layered virtual world system 40 is thus the ability to provide independent resources for each independently participating team. This allows resources in a virtual world to be budgeted and allocated in a manner mirroring the resources allocated in a complex management structure. It can also allow for as many parallel layers as necessary in any series or parallel relationship in order to support any number of independent communities requiring well defined complete or partial isolation and separation from each other.
Referring now to
The virtual world layers 56a,b that use the compatible virtual world communication protocol 50 can be any of the virtual world layers of the virtual world systems 20, 30, 40, or any other virtual world systems. The clients 58a,b of the virtual world layers 56a,b using the compatible virtual world communication protocol 50 can be any of the user communities coupled to any of the various virtual world views of the virtual world systems 20, 30, 40, or any other virtual world systems.
Referring now to
The virtual world layers 66a,b that use the incompatible virtual world communication protocol 60 can be any of the virtual world layers of the virtual world systems 20, 30, 40, or any other virtual world systems. The clients 68a,b of the virtual world layers 66a,b using the incompatible virtual world communication protocol 60 can be any of the user communities coupled to any of the various virtual world views of the virtual world systems 20, 30, 40, or any other virtual world systems.
Referring now to
Additionally, each of the virtual world layers 76a,b may augment and enhance the capability of only the portion of the base virtual world it is passing through to the client 78. Furthermore, it is possible for some portion or portions of the functionality of the base virtual world to be passed through to the client 78 by way of one or both of the virtual world layers 76a,b without any augmentation. Additionally, a portion or portions of the base virtual world may be selectively augmented and passed by either of the virtual world layers 76a,b, wherein the portion being selectively passed through can be determined and triggered by any means known to those skilled in the art. Thus, each of the virtual world layers 76a,b, or other virtual world layers in addition to the virtual world layers 76a,b, can provide an independent parallel augmentation of the functionality of the base virtual world to the client 78.
Referring now to
Thus, one skilled in the art can use the composite virtual world 86 to manage any number of base virtual worlds such as the base virtual worlds 82a-n. The composite virtual world 86 is therefore useful for extending the functionality and capacity of the base virtual worlds 82a-n while minimizing the impact and demand on the base virtual worlds 82a-n being extended, as also previously described. For example, the composite virtual world 86 can enable virtual world extension through the implementation of one or more virtual world infrastructures that can act as proxies between a user of the composite virtual world 86 and the base virtual worlds 82a-n. The proxy virtual worlds created in this manner can select functionality from any of the base virtual worlds 82a-n, and create new virtual worlds that are composites of the selected base virtual worlds 82a-n and the virtual world layer 86.
In a typical virtual world environment many participants can connect to a single instance of a virtual world such as the composite virtual world 86. The composite virtual world system 80 thus permits a single user to access multiple base virtual worlds through a single instance of the composite virtual world 86. Additionally, composite virtual world system 80 can create new virtual worlds out of the objects, scripts, textures, etc. that can exist in the other virtual worlds. Creation of a virtual world using a composite proxy such as the composite virtual world 86 permits new virtual world experiences to be created quickly and without the expense of creating a large back-end virtual world processing infrastructure. Furthermore,
The composite virtual world system 80 can be advantageously applied to known virtual worlds because it enables the rapid creation of unique virtual world experiences by permitting composition of new virtual worlds from pieces of existing base virtual worlds. Furthermore, the composite virtual world system 80 permits a user to move rapidly between the base virtual worlds 82a-n by way of the composite virtual world 86. Additionally, the composite virtual world system 80 provides a single point of access for monitoring and managing a potentially large domain of virtual world servers. It allows administrative functionality to reside in a secure environment segregated from the domain of the virtual world servers under management.
Referring now to
It is known to provide a mechanism for requesting assistance within the virtual world contexts. Due to the independent nature of the segregation methods, many different support requests can arise and exist independently, including within the base game virtual worlds 92a-n. An entertainment company can create a separate support team for each virtual world. However, such an approach can be wasteful and expensive. Customer support in such an environment is difficult because it can be laborious for support personnel to log into multiple virtual worlds simultaneously. Support must be provided in-world for issues that arise within each distinct copy of the virtual world. Support personnel may need the implementation of special support functionality so they can assist customers, and support personnel may need equal access to all parallel copies of the virtual world.
Furthermore, virtual world functionality implemented for support personnel can be a target for mischievous security exploits. Therefore, support functionality can be a security risk if implemented in the base virtual worlds. Furthermore, independent parallel copies of a virtual world require support personnel to log off one copy of the virtual world and log on to another. This is a time consuming and therefore expensive task that reduces the ability of the support personnel to assist customers.
The support composite virtual world system 90 can solve many of these and other problems by creating a composite virtual world 96 for the support personnel to permit easy working access to all of the game base virtual worlds 92a-n by way of the composite virtual world 96. In another embodiment of the invention plural composite virtual worlds 96 can be provided for providing working access to the game virtual worlds 92a-n for the support personnel by way of plural paths. Furthermore, the support composite virtual world 96 created in this manner can expose the support functionally to only selected authorized personnel while connecting to all of the game base virtual worlds 92a-n.
Therefore, an entertainment company can use standard segregation methods to support a large user population, the segregation method can require the entertainment company to create several identical copies of the virtual world, and the user population can be divided amongst the copies. In order to support the customer base efficiently the entertainment company can create a single or multiple layer composite virtual world 96 to provide specific segregated support functionality. The composite virtual world 96 can be accessible only to support personnel. The virtual world support layer 96 can maintain concurrent persistent communications with all of the virtual world instances. When a customer submits a support request, the layered virtual world 96 can create a support request object that can be activated by the support personnel. The support request object can be created within the virtual world layer 96, and can consist of the support request data provided by the customer, and information to identify which specific virtual world instance 92a-n originated the request.
The support composite virtual world system 90 can represent the support request to the support personnel as a virtual world object or as a virtual world menu item. The support personnel can activate the request object, and the layer forming the composite virtual world 96 can provide access to the customer objects. Because each copy of the base virtual world 92a-n can be almost identical, only unique data specific to the requesting customer may need to be accessed by the support layer 96. All actions taken by the support personnel on behalf of the customer can be reflected back to the customer specific instance of the base virtual world 92a-n through known communications methods. Thus, in virtual world layer order notation, a support request can be made by a customer of VW[0][1]. The support personnel can activate the request object. The support personnel can be allowed to see to the customers virtual world objects. Actions taken in the virtual world are pushed down to the specific VWS[0][1].
The description of the composite virtual world systems 80, 90 can be applied to the management of multiple virtual worlds such as the base virtual worlds 82a-n, 92a-n that can be substantially similar to each other. However, layered composite worlds such as the composite virtual world systems 80, 90 can also be used to compose new virtual worlds from disparate previously existing base virtual worlds. Such a use can select scripts, textures, objects, avatars, etc. from different base virtual worlds and create a new layered composite virtual world from the selected base world objects. These embodiments may normalize the physics engines for all base virtual worlds, such that objects from one base world could interact with users in the same manner as objects from another base world. Such a composite virtual world need not proxy interactions back to the base virtual worlds. Rather, in an alternate embodiment it could process interactions internally. The composite world embodiments created in this manner enable the rapid creation of new virtual worlds using objects, scripts, textures, etc. from other base virtual worlds.
Referring now to
The registration virtual world layer 1006 can be used to make different virtual world software applications aware of each other and to enable them to add each other to their registration lists. In one preferred embodiment the registration list of a virtual world layer can include all of the users in its user community as well as any other virtual world layers it is coupled to, for example any base virtual worlds or any other virtual world layers it is coupled to. The registration list of a base virtual world can include all of the users in its user community as well as any virtual world layers it is coupled to. The registration process of the invention can be used when a new virtual world layer, such as a virtual world layer adding functionality or capability to a base virtual world, is about to be applied to the base virtual world. Under these circumstances a virtual world layer to be added can notify the base virtual world of it existence and that it is about to be applied. Additionally, it can notify the base virtual world what data, objects, etc. it can use or make available. The data, objects, etc. within the base that will be used by the virtual world layer can be referred to as the used data, used objects, etc. Furthermore, the virtual world layer must enable all of the layering operations previously described.
The virtual world registration configuration 1000 thus permits extending the functionality and capacity of existing virtual worlds such as the base virtual world 1002 while minimizing the impact and demand on the virtual world being extended. It enables the extension of the base virtual world 1002 through the implementation of one or more virtual world infrastructures that can register with the base virtual world 1002 and describe the objects and functions it can provide to the base virtual world server. The registered extensions can add functionality to the base virtual world 1002 through implementing the new functionality and managing objects and users that are not part of, or exposed to, the base virtual world 1002, or the users of the base virtual world 1002.
In many virtual world environments when the participants connect to an instance of a base virtual world such as the base virtual world 1002 they can all interact with the same objects, the objects of the base virtual world 1002. The virtual world registration configuration 1000 permits differing user communities to register and have different interactions in the one base virtual world 1002 by way of the registration virtual world layer 1006. Additional virtual world servers may also register with the base virtual world 1002 and provide functionality on top of that provided by the base virtual world 1002 in a similar manner. The registered world layers can be isolated and differentiated virtual worlds. They may support complementary communities and provide a solution to a number of problems afflicting the development and operation of virtual worlds. Furthermore, a system such as the virtual world registration configuration 1000 can permit segregation of the different user communities. Accordingly, the base virtual world 1002 does not require knowledge of the users of the other virtual worlds such as the virtual world 1006.
In the virtual world registration configuration 1000 the infrastructure of the virtual world layer 1006 can thus leverage the infrastructure of the base virtual world 1002, and require only enough capacity to support its own additional layer functionality and user community. Furthermore, the virtual world registration configuration 1000 can enable users of the virtual world layer 1006 to interact with users of the base virtual world 1002 while providing complete segregation between user communities.
The external virtual world registration provided in this manner by the virtual world registration configuration 1000 enables augmented functionality of an existing base virtual world such as the base virtual world 1002 without modification to the base virtual world 1002 itself. The registered layered virtual world can communicate with the base virtual world 1002 rather than directly with a client. This enables extension of the functionality of the base virtual world 1002 without modification to the infrastructure of the base virtual world 1002. The virtual world layer 1006 does not necessarily add any additional virtual space to the base virtual world 1002. However, it does add functionality and objects to those provided within the space of the base virtual world 1002.
The virtual world registration configuration 1000 can thus permit the virtual world layer 1006 to register itself with the base virtual world 1002. The registration process can inform the base virtual world 1002 of the objects, and functions the virtual world layer 1006 can provide and perform. When a client performs an action that requests functionality not provided by the base virtual world 1002, the base virtual world 1002 can forward the request to the virtual world layer 1006. The virtual world layer 1006 can process the request, and return the results to the base virtual world 1002. The base virtual world 1002 can then forward the results to the requesting client. The registration process performed by the virtual world registration configuration 1000 may be embodiment dependant with multiple distinct methods for selecting and expanding functionality from the base virtual world 1002 to any number of registered layers.
A virtual world can be a complex system made up of computational hardware, data storage devices, data communications devices, executable software systems, and data. These systems may be decomposed into a client half and a server half. The client half can render a virtual world and enable users to interact with any number of objects. The server half can simulate interactions, maintain virtual world states, coordinate participants, persist data, communicate the state of the virtual world to clients, and provide any other virtual world functionality. The server infrastructure for layered virtual worlds operating according to the various embodiments can execute on server systems or other types of computer systems connected to a computer network, including computer networks coupled to the internet. The server infrastructure for operation of the virtual worlds can include the computers, storage and network equipment that provide the physical infrastructure to support the virtual worlds.
A preferred embodiment can include a system or method for encapsulating, transmitting, and installing any of the software components of a virtual world layer, also known as content. The content can be separate from the installing, maintaining and running of the virtual world server. A business model used by a company that creates virtual world content can be different from the business model used by a company that operates virtual world servers. It is therefore advantageous to enable such companies to operate independently and communicate through a standard. A layered virtual world package or bundle can provide this capability.
Thus, a registration virtual world 1006 can notify a base virtual world 1002 of its existence as shown in block 1052 of the virtual world registration process 1050. The registration virtual world 1006 can also notify the base virtual world 1002 of its intention to overlay the base virtual world 1002 as shown in block 1054. It can notify the base 1002 which objects, data, etc. it can use when the overlay is accomplished as shown in block 1056. The functionality or functionalities of the base virtual worlds 1002 to be augmented by the layer 1006 can also be communicated to the base virtual world 1002 as shown in block 1058. The base virtual world 1002 can add the virtual world layer 1006 to its list of users as shown in block 1060. In a preferred embodiment the base virtual world 1002 and the virtual world layer 1006 can maintain segregated user lists as shown in block 1062.
Referring now to
Referring now to
The virtual world layer package 1200 can be encapsulated such that it can be copied and delivered from a virtual world content creator to a virtual world operator. A virtual world layer package 1200 can be a single object that is itself an aggregation of all of the objects relevant to a layered virtual world or a portion of the objects relevant to the layered virtual world. The virtual world layer package 1200 may utilize compression technologies to reduce its size, but this is not a requirement. In addition to the layered virtual world objects, the virtual world layer package 1200 may also contain an infrastructure provisioning specification 1220, as well as installation automations.
The virtual world layer package 1200 is not required to define all objects within a virtual world. Some virtual world layer packages 1200 may define only the objects they are overriding within another virtual world on which it the package is to be deployed. The layer package may define the objects to override using references to the base world objects UUID or any other types of references known to those skilled in the art. It should be noted that virtual world layer packages 1200 may be chained, such that one virtual world layer package 1200 references another virtual world layer package 1200 and the base virtual world modifications are inherited through package references.
The provisioning specification of a virtual world layer package can include computing resources, operating system specifications, external middleware, external middleware configuration and networking configuration. Additionally, the provisioning specification may describe methods for user accounting support infrastructure. User and customer groups, rights and authorities are likewise specified in the provisioning package. In some embodiments, the specification may also describe external account authentication or authorization directories, such as LDAP, to use for authentication and authorization. Furthermore, in some embodiments a provisioning specification may specify a unique identifier for the layered virtual world and communication protocols including communication protocols that are different from the ones used by the base virtual world.
Referring now to
A virtual world layer package 1100 can be encapsulated using any encapsulation technology known to those skilled in the art and agreed upon by, for example, a content creation company and a virtual world operating company. An operating company can receive and encapsulate the virtual world layer package 1100 and provide access to storage for the content to be uploaded. The virtual world layer package 1100 may be delivered from the content creator to the operator via any common and mutually agreed upon network communications protocols. The possible communications protocols for transmitting a virtual world layer package 1100 can include protocols such as the well known Internet Protocols and File Transfer Protocol, physical communications such as DVD transfer via courier, or any other protocol.
A transmitted virtual world layer package 1100 received by an operator infrastructure it can be received and unpacked as shown in block 1258. Any method known to those skilled in the art can be used to extract the individual components from the transmitted layered virtual world package 1100. Provisioning specification can then be performed as shown in 1260. In this step the operator installation or other entity receiving a package can read the infrastructure provisioning specification and provision the appropriate computing, storage, operating system, middleware and network. The installation of the virtual world layer package 1100 on servers or other kinds of operational infrastructure can be performed as shown in block 1262.
When the infrastructure is provisioned according to specification of the virtual world layer package 1100, an installation automation can execute in any manner known to those skilled in the art as shown in block 1264. The installation automation can distribute the layered virtual world objects and begin execution of middleware and software components required to operate the virtual world of the virtual world layer package 1100. The installation automation can also create any user or customer account information that may be required. When the installation automation has completed its tasks, users can access the layered virtual world using the identifiers and protocols specified in the provisioning specification.
While the invention has been described in detail and with reference to specific examples thereof, it will be apparent to one skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope thereof.
Number | Name | Date | Kind |
---|---|---|---|
5319758 | Arai et al. | Jun 1994 | A |
5736982 | Suzuki et al. | Apr 1998 | A |
5852672 | Lu | Dec 1998 | A |
5880788 | Bregler | Mar 1999 | A |
6069632 | Mullaly et al. | May 2000 | A |
6088698 | Lipkin | Jul 2000 | A |
6227974 | Eilat et al. | May 2001 | B1 |
6332163 | Bowman-Amuah | Dec 2001 | B1 |
6340332 | Rimoto et al. | Jan 2002 | B1 |
6377263 | Falacara et al. | Apr 2002 | B1 |
6421047 | de Groot | Jul 2002 | B1 |
6522333 | Hatlelid et al. | Feb 2003 | B1 |
6553006 | Kalliokulju et al. | Apr 2003 | B1 |
6564250 | Nguyen | May 2003 | B1 |
6572662 | Manohar et al. | Jun 2003 | B2 |
6629112 | Shank et al. | Sep 2003 | B1 |
6629129 | Bookspan | Sep 2003 | B1 |
6677976 | Parker et al. | Jan 2004 | B2 |
6714987 | Amin | Mar 2004 | B1 |
6798407 | Benman | Sep 2004 | B1 |
6907395 | Hunt et al. | Jun 2005 | B1 |
6912565 | Powers et al. | Jun 2005 | B1 |
7027975 | Pazandak et al. | Apr 2006 | B1 |
7155380 | Hunt et al. | Dec 2006 | B2 |
7155680 | Akazawa et al. | Dec 2006 | B2 |
7240067 | Timmons | Jul 2007 | B2 |
7269632 | Edeker et al. | Sep 2007 | B2 |
7337208 | Gall et al. | Feb 2008 | B2 |
7342587 | Danzig et al. | Mar 2008 | B2 |
7412422 | Shiloh | Aug 2008 | B2 |
7445549 | Best | Nov 2008 | B1 |
7564476 | Coughlan et al. | Jul 2009 | B1 |
7685237 | Weaver et al. | Mar 2010 | B1 |
7882222 | Dolbier et al. | Feb 2011 | B2 |
7990384 | Cosatto et al. | Aug 2011 | B2 |
7996818 | Venugopal | Aug 2011 | B1 |
8026918 | Murphy | Sep 2011 | B1 |
8527625 | Dolbier et al. | Sep 2013 | B2 |
8957914 | Dolbier et al. | Feb 2015 | B2 |
9324173 | Castelli et al. | Apr 2016 | B2 |
20010030667 | Kelts | Oct 2001 | A1 |
20010037316 | Shiloh | Nov 2001 | A1 |
20010037508 | Hindus et al. | Nov 2001 | A1 |
20020129106 | Gutfreund | Sep 2002 | A1 |
20020152268 | Kureshy et al. | Oct 2002 | A1 |
20020188678 | Edecker | Dec 2002 | A1 |
20030014524 | Tormasov | Jan 2003 | A1 |
20030115132 | Iggland | Jun 2003 | A1 |
20030117485 | Mochizuki et al. | Jun 2003 | A1 |
20030177187 | Levine | Sep 2003 | A1 |
20030177195 | Han et al. | Sep 2003 | A1 |
20040017385 | Cosman | Jan 2004 | A1 |
20040030741 | Wolton | Feb 2004 | A1 |
20040054740 | Daigle et al. | Mar 2004 | A1 |
20040068518 | McDowell | Apr 2004 | A1 |
20050021625 | Fujimura et al. | Jan 2005 | A1 |
20050137015 | Rogers et al. | Jun 2005 | A1 |
20050204287 | Wang | Sep 2005 | A1 |
20050216558 | Flesch et al. | Sep 2005 | A1 |
20060031080 | Mallya | Feb 2006 | A1 |
20060053380 | Spataro | Mar 2006 | A1 |
20060115157 | Mori et al. | Jun 2006 | A1 |
20060123127 | Littlefield | Jun 2006 | A1 |
20060181535 | Watt | Aug 2006 | A1 |
20060256135 | Aoyama | Nov 2006 | A1 |
20070013691 | Jung | Jan 2007 | A1 |
20070035831 | Gutierrez | Feb 2007 | A1 |
20070126733 | Yang et al. | Jun 2007 | A1 |
20070130001 | Jung et al. | Jun 2007 | A1 |
20070188502 | Bishop | Aug 2007 | A1 |
20070203828 | Jung et al. | Aug 2007 | A1 |
20070220435 | Sriprakash et al. | Sep 2007 | A1 |
20070233605 | Mueller | Oct 2007 | A1 |
20070233839 | Gaos | Oct 2007 | A1 |
20070248261 | Zhou et al. | Oct 2007 | A1 |
20070260984 | Marks et al. | Nov 2007 | A1 |
20070294171 | Sprunk | Dec 2007 | A1 |
20080005237 | Borys | Jan 2008 | A1 |
20080052242 | Merritt et al. | Feb 2008 | A1 |
20080059570 | Bill | Mar 2008 | A1 |
20080104079 | Craig | May 2008 | A1 |
20080155019 | Wallace | Jun 2008 | A1 |
20080215434 | Jung et al. | Sep 2008 | A1 |
20080215972 | Zalewski et al. | Sep 2008 | A1 |
20080215975 | Harrison et al. | Sep 2008 | A1 |
20080215994 | Harrison | Sep 2008 | A1 |
20080228607 | Jung et al. | Sep 2008 | A1 |
20080263460 | Altberg et al. | Oct 2008 | A1 |
20080267282 | Kalipatnapu et al. | Oct 2008 | A1 |
20080267449 | Dumas et al. | Oct 2008 | A1 |
20080274769 | Linden | Nov 2008 | A1 |
20080307066 | Amidon | Dec 2008 | A1 |
20090002479 | Sangberg et al. | Jan 2009 | A1 |
20090024636 | Shiloh | Jan 2009 | A1 |
20090027337 | Hildreth | Jan 2009 | A1 |
20090046094 | Hamilton, II | Feb 2009 | A1 |
20090055484 | Vuong et al. | Feb 2009 | A1 |
20090077475 | Koster | Mar 2009 | A1 |
20090089684 | Boss et al. | Apr 2009 | A1 |
20090100352 | Huang et al. | Apr 2009 | A1 |
20090106347 | Harwood | Apr 2009 | A1 |
20090110352 | Schorpp et al. | Apr 2009 | A1 |
20090113319 | Dawson et al. | Apr 2009 | A1 |
20090138943 | Kawanaka | May 2009 | A1 |
20090144173 | Mo et al. | Jun 2009 | A1 |
20090164518 | Ghafoor | Jun 2009 | A1 |
20090187604 | Guo | Jul 2009 | A1 |
20090241049 | Bates | Sep 2009 | A1 |
20090251457 | Walker | Oct 2009 | A1 |
20090288015 | Fujioka | Nov 2009 | A1 |
20090300521 | Jerrard-Dunne | Dec 2009 | A1 |
20090307611 | Riley | Dec 2009 | A1 |
20100020100 | Dolbier et al. | Jan 2010 | A1 |
20100026681 | Dolbier et al. | Feb 2010 | A1 |
20100030854 | Dolbier et al. | Feb 2010 | A1 |
20100070859 | Shuster et al. | Mar 2010 | A1 |
20110039526 | Ait-Ameur | Feb 2011 | A1 |
20120064878 | Castro et al. | Mar 2012 | A1 |
20120113937 | Aramoto et al. | May 2012 | A1 |
20120221955 | Raleigh et al. | Aug 2012 | A1 |
20120257571 | Liao | Oct 2012 | A1 |
20120307798 | Zhou et al. | Dec 2012 | A1 |
20130016657 | Muhanna et al. | Jan 2013 | A1 |
20130149987 | Cheng et al. | Jun 2013 | A1 |
20140161026 | Stojanovski et al. | Jun 2014 | A1 |
20170006091 | Cabrera et al. | Jan 2017 | A1 |
Number | Date | Country |
---|---|---|
10222692 | Aug 1998 | JP |
2007086038 | Aug 2007 | WO |
Entry |
---|
Matias Rauterberg,Entertainment Computing—ICEC 2004,Third International Conference Eindhoven, The Netherlands, Sep. 1-3, 2004, Proceedings, pp. 241-247. |
Tsuneo Yoshikawa, Hitoshi Ueda, Construction of Virtual World Using Dynamic Modules and Interaction Modules, Proceedings of the 1996 IEEE International Conference on Robotics and Automation Minneapolis, Minnesota Apr. 1996, pp. 2358-2364. |
Shinya Kawanaka, A Method to do Shopping in Securely by Making Virtual World, Document No. JP920070131. |
Gabriel Zachmann, A Language for Describing Behavior of and Interaction with Virtual Worlds, VRST '96 Proceedings of the ACM Symposium on Virtual Reality Technology, 1999, Jul. 1996, pp. 143-150. |
Mary Lou Maher, et al., Agents for multi-disciplinary design in virtual worlds, Artificial Intelligence for Engineering Design, Analysis and Manufacturing, vol. 21, No. 3, pp. 267-277, 2007. |
Elhadi Shakshuki, et al., Agent Frameworks in FCVW, Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA '05), 2005. |
John W. Barrus, et al., Locales:Supporting Large Multiuser Virtual Environments, A Mitsubishi Electric Research Laboratory on Virtual Reality Technology, Document No. 0272, Nov. 1996, pp. 50-57. |
Mojtaba Hosseinii, et al., A Haptic Virtual Environment for Industrial Training, No. 0-7803, 7635; 2002, pp. 25-30. |
Jim Purbrick, et al., An Extensible Event-based Infrastructure for Network Virtual Worlds, Proceedings of the IEEE Virtual Reality 2002 (VR' 02). |
Pedro Ferreira, et al.,Security and Privacy in a Middleware for Large Scale Mobile and Pervasive Augmented Reality. |
C. Santos, et al., Interactive Systems, Design, Specification and Verification , International Workshop, 10th, Jun. 11-13, 2003 DSV-IS 2003 Revised Papers (Lecture Notes in Computer Science, vol. 2844), pp. 410-414. |
Matthew Lewis, et al., Interactively Evolving Environment Maps with Continuous Layered Pattern Functions, Advanced Computing Center for the Arts and Design, The Ohio State University, pp. 1-12. |
Gurminder Singh, et al., Networked Virtual Worlds, Institute of Systems Science. National University of Singapore, Document No. 0-8186-7062, 1995, pp. 44-49. |
Tom Chen, et al., On Integrated Multi-Sensory Components in Virtual Environments, pp. 1-6. |
Dr. John Robinson, et al., MVIP-II: A Protocol for Enabling Communication on Collaborative Virtual Environments, pp. 155-160. |
Michael E. Papka, et al., Mathematics and Computer Science Division, pp. 306-307. |
Richard M. Satava, et al., An Integrated Medical Virtual Reality Program, Mar. /Apr. 1996, pp. 94-104. |
Horoyuki Tarumi, et al., Department of Social Informatics, Graduate School Informatics. |
Tomohiro Tanikawa, et al., Proceedings of the International Symposium on Mixed and Augmented Reality (ISMAR'02). |
Xiaojun Shen, et al., “A Heterogeneous Scalable Architecture for Collaborative Haptics Environments,” 2003. |
Jeremie Allard, et al., “FlowVR: A Middleware for Large Scale Virtual Reality Applications,” 2004. |
Qingping Lin, et al., “Addressing Scalability Issues in Large-Scale Collaborative Virtual Environment,” 2006. |
Pandzic et al., “A flexible architecture for Virtual Humans in Networked Collaborative Virtual Environments”, 1997, pp. 1-15. |
Purbrick et al., “An Extensible Event-based Infrastructure for Networked Virtual Worlds”, 2002, pp. 1-7. |
McNett et al., “Usher: An Extensible Framework for Managing Clusters of Virtual Machines”, 2007, pp. 1-25. |
Tran et al., “An Open Middleware for Large-scale Networked Virtual Environments”, 2002, pp. 1-8. |
Explicit Conversion of Base Class to Derived Class, Microsoft Developer Network, May 2007, pp. 1-11. |
Wikipedia, “Universally Unique Identifier”, [online], [Retrieved on Sep. 26, 2016]. Retrieved from the Internet at <URL: https://en.wikipedia.org/wiki/Universally_unique_identifier>, page last modified on Sep. 18, 2016, Total 6 pp. |
Number | Date | Country | |
---|---|---|---|
20100031164 A1 | Feb 2010 | US |