The present invention relates generally to improving the avatar experience in a virtual universe, and more specifically relates to providing surrogate avatar control in a virtual universe.
A virtual environment is an interactive simulated environment accessed by multiple users through an online interface. Users inhabit and interact in the virtual environment via avatars, which are two or three-dimensional graphical representations of humanoids. There are many different types of virtual environments, however there are several features many virtual environments generally have in common:
A) Shared Space: the world allows many users to participate at once.
B) Graphical User Interface: the environment depicts space visually, ranging in style from 2D “cartoon” imagery to more immersive 3D environments.
C) Immediacy: interaction takes place in real time.
D) Interactivity: the environment allows users to alter, develop, build, or submit customized content.
E) Persistence: the environment's existence continues regardless of whether individual users are logged in.
F) Socialization/Community: the environment allows and encourages the formation of social groups such as teams, guilds, clubs, cliques, housemates, neighborhoods, etc.
An avatar can have a wide range of business and social experiences. Such business and social experiences are becoming more common and increasingly important in on-line virtual environments (e.g., universes, worlds, etc.), such as that provided in the on-line world Second Life (Second Life is a trademark of Linden Research in the United States, other countries, or both). The Second Life client program provides its users (referred to as residents) with tools to view, navigate, and modify the Second Life world and participate in its virtual economy.
Second Life and other on-line virtual environments present a tremendous new outlet for both structured and unstructured virtual collaboration, gaming, exploration, commerce, and travel, as well as real-life simulations in virtual spaces. As the virtual universe expands so does the availability and opportunity for avatars to attend different events.
Currently an individual who participates in a virtual universe is responsible for personally activating and controlling their individually assigned avatar. Virtual universes have also become more complex as processing power, memory storage, and bandwidth have increased, and opportunities for multi-avatar events, such as business meetings, lecture, and social gatherings have increased. A real-world resident who also has an avatar is finding that they are faced with the situation that he/she is obligated to attend multiple events in the virtual universe that may occur simultaneously. Similarly, the real-world resident may also find conflicts between an event(s) in the real-world that occurs simultaneously with one or more events in the virtual universe.
Similarly, if an avatar is running, for example a 24-hour business (e.g., service, store, etc.) in the virtual universe, the real-life person controlling the avatar will have to have time to sleep, run another business, and perform other real-life activities. Another shortcoming is the situation where an avatar may have to wait in a long line in a virtual universe (e.g., at a large event, business, etc.) and the real-life person may wish to have alternatives that allow him/her to leave the avatar during the wait.
Accordingly, there is an opportunity to improve upon the existing virtual universe experience.
The present invention is directed to providing surrogate avatar control in a virtual universe.
A first aspect of the present invention is directed to a method for controlling an avatar in a virtual universe, comprising: providing an avatar in a virtual universe, wherein the avatar is controlled by a first entity; and supplying a token, wherein the token comprises a permission for a second entity to control an aspect of the avatar.
A second aspect of the present invention is directed to a system for controlling an avatar in a virtual universe, comprising: a component for providing an avatar in a virtual universe, wherein the avatar is controlled by a first entity; and a component for supplying a token, wherein the token comprises a permission for a second entity to control an aspect of the avatar.
A third aspect of the present invention is directed to a program product stored on a computer readable medium, which when executed, controls an avatar in a virtual universe, the computer readable medium comprising program code for: providing an avatar in a virtual universe, wherein the avatar is controlled by a first entity; and supplying a token, wherein the token comprises a permission for a second entity to control an aspect of the avatar.
A fourth aspect of the present invention is directed to a method for deploying an application for controlling an avatar in a virtual universe comprising: providing a computer infrastructure being operable to: provide an avatar in a virtual universe, wherein the avatar is controlled by a first entity; and supply a token, wherein the token comprises a permission for a second entity to control an aspect of the avatar.
The illustrative aspects of the present invention are designed to solve the problems herein described and other problems not discussed.
These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings.
The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
As detailed above, the present invention provides surrogate avatar control in a virtual universe. Aspects of the invention provide a solution to the problem of enabling one resident of the virtual universe 12 to take over the avatar of a second resident. This may be when the second resident must be away from the virtual universe 12 and wishes his/her avatar to have an intelligent presence at various virtual universe 12 settings (e.g., meeting, social setting, business, etc.). For example, the solution would allow a 24-hour store in the virtual universe 12 to be operated. Aspects of the invention allow homeowners and/or business owners to have an intelligent presence to deter crime.
Residents or avatars, which as mentioned above are personas or representations of the users of the virtual universe, roam all about the virtual region by walking, driving, flying or even by teleportation or transportation which is essentially moving through space from one point to another, more or less instantaneously. As shown in
As more specifically shown in
An action controls component 46 enables the user to perform actions in the virtual universe such as buying items for his or her avatar or even for their real-life selves, building homes, planting gardens, etc., as well as changing the appearance of their avatar. These actions are only illustrative of some possible actions that a user can perform in the virtual universe and are not limiting of the many possible actions that can be performed. A communications interface 48 enables a user to communicate with other users of the virtual universe 12 through modalities such as chatting, instant messaging, gesturing, talking and email.
An avatar control tool 53 provides for surrogate avatar control in a virtual universe 12. Below is a more detailed discussion of the avatar control tool 53 and how it provides for surrogate avatar control within a virtual universe 12, including a discussion on how the tool 53 provides an avatar(s) in the virtual universe 12 wherein the avatar may be controlled by a first entity; and, supplies a token, or other indicia, that comprises permission for another entity to control at least one aspect of the same avatar.
As shown in
An avatar transport component 66 enables individual avatars to transport, which as mentioned above, allows avatars to transport through space from one point to another point, instantaneously. For example, avatars could teleport to an art exhibit held in a museum held in Greenland.
An avatar management component 68 keeps track of what on-line avatars are doing while in the virtual universe. For example, the avatar management component 68 can track where the avatar presently is in the virtual universe, what activities it is performing or has recently performed. An illustrative but non-exhaustive list of activities can include shopping, eating, talking, recreating, etc.
Because a typical virtual universe has a vibrant economy, the server array 14 has functionalities that are configured to manage the economy. In particular, a universe economy management component 70 manages transactions that occur within the virtual universe between avatars. In one embodiment, the virtual universe 12 will have their own currency that users pay for with real-life money. The users can then take part in commercial transactions for their avatars through the universe economy management component 70. In some instances, the user may want to take part in a commercial transaction that benefits him or her and not their avatar. In this case, a commercial transaction management component 72 allows the user to participate in the transaction. For example, while walking around a commercial zone, an avatar may see a pair of shoes that he or she would like for themselves and not their avatar. In order to fulfill this type of transaction and others similarly related, the commercial transaction management component 72 interacts with banks 74, credit card companies 76 and vendors 78 to facilitate such a transaction.
The components in
The avatar control tool 53 comprises a primary entity control component 80 configured to provide an interface with a first, or primary, entity that is controlling the avatar. The first entity may, for example, be a user (e.g., live, real human being). The first entity typically controls all aspects of the avatar. The aspects may include, for example, the avatar's gestures, recording, utterances, ability to move, teleport, remove items, purchase items, and/or the like.
A surrogate avatar controller 82 is configured to supply tokens, wherein the token comprises a permission for a second entity to control at least one aspect of the avatar. The aspects comprise, for example, the avatar's gestures, recording, utterances, ability to move, teleport, remove items, purchase items, and/or the like. The token(s) may be supplied and/or received from a primary user via the primary entity control component 80 and/or supplied and/or received from a secondary entity via the secondary entity control component 86.
The avatar control database 84 coupled to the surrogate avatar controller 82 contains data such as a listing of users and their concomitant avatars, a listing of various secondary entities that are allowed surrogate control of an aspect of the avatar, a listing of what aspect(s) of the avatar correspond to what particular secondary entity (e.g., surrogate) for control, a listing of what other avatars
The avatar control tool 53 further comprises a secondary entity control component 86 configured to interface between the surrogate avatar controller 82 and at least one of the secondary entities. The secondary entity may be an individual user (e.g., human), an artificial intelligence entity, a service support center, a plurality of users, and/or the like.
In an embodiment the avatar control tool 54 may include, a service support center that allows a surrogate control specialist to take over control aspects of many avatars. For example, as shown in
In another embodiment, an indicia may be provided with the avatar indicating that the avatar is being controlled by the secondary entity. This indicia may be selectively employed, depending on the particular avatar and/or secondary entity is being given control of the avatar. For example, the indicia may be a change in an aspect of the avatar (e.g., color, size, shading, etc.), an indicator (e.g., words, icon, light, signage, etc.), and/or the like. Similarly, the primary entity whose avatar is being controlled by the secondary entity may have, for example, a list of people who would see an icon above the avatar's head that indicates the avatar had been taken over by the secondary entity. This aspect could prevent the person's boss from knowing that someone from knowing that someone was covering for him/her at a meeting. However, if the controlled avatar meets a friend, the friend is warned, via the indicia, that he should not disclose personal data that he/she might not want the surrogate control takeover specialist to know.
In another embodiment, the avatar control tool 53 includes an aspect to prevent remote takeover by malicious residents who wish to create zombies and impersonations. In this embodiment, each avatar has associated metadata which allows or disallows remote control by specific individuals and/or services. This security aspects may be password protected. A sample table listing various security settings that may be stored in the avatar control database 84 is depicted herein at Table 1:
As depicted in Table 1, four avatars (i.e., Avatar 1, Avatar 2, Avatar 3, Avatar 4) are listed for surrogate avatar control to some degree. For example, remote control of the avatar has been enabled (i.e., 1st column) for Avatars 1, 2 and 4; but, not for Avatar 3. The control level (or an aspect(s) of the avatar) has been transferred to the secondary entity. For Avatar 1, the secondary entity is allowed to control the avatar's presence but not chat. Avatar 2 is only allowed to chat with Avatar 27 (not shown). Avatar 4 is able to have gestures. The 5th column shows that only Avatar 2 has teleporting capability. Similarly, the 6th column shows that surrogate control for Avatar 1 is given only the Friend 1 and 2; for Avatar 2 is given to an avatar service center in Bangalore, India; while, Avatar 4 allows only a spouse to exert surrogate control. The final (i.e., 7th) column indicates what times that the applicable surrogate control is allowed.
Under aspects of the present invention a resident (i.e., primary or first) entity) of a virtual universe 12 community passes control of his/her personal avatar (e.g., an aspect, several aspects, entire control, etc.) to a surrogate avatar control entity (i.e., secondary entity). There are a variety of ways of transferring control. For example, a resident may send a signal to another resident to request takeover by that resident or by a remote takeover service. Alternatively, a second resident may issue a digital command to the avatar of the first resident to initiate takeover, after the first resident has given permission. Still alternatively, the transfer of control may entail passing a permission token containing an identification label and a password, or may include more complex information such as the avatar control database 84 containing a profile or description of the avatar design and personal response characteristics.
In another embodiment, a first or primary entity sends a signal to an avatar control center (i.e., service support center at
Referring to
At D2, the system verifies if the transferee (i.e., second entity, surrogate controller, etc.) is logged in. If the transferee is not logged in (i.e., D2 is “NO”), at S5 the request for transfer is rejected, thereby ending the method. Conversely, if the transferee is logged in (i.e., D2 is “YES”), then the method proceeds to D3. D3 queries the transferee (i.e., entity to receive control) whether he/she is willing to accept to control. As with D2 (above), if the transferee is unwilling to accept control of the avatar (i.e., D3 is “NO”), then at S5 the request for transfer is rejected, thereby ending the method. Similarly, if the transferee is willing to accept control of the avatar (i.e., D3 is “YES”), then at D4 the method queries if the transferee is logged in.
At D4 the method queries whether the transferee is logged. If the transferee is not logged in (i.e., D4 is “NO”), then at S5 the request for control transfer is rejected, thereby ending the method. Conversely, if the transferee is logged in (i.e., D4 is “YES”), then at S6 control of avatar and/or assets is removed from the transferor.
In an embodiment, an optional subprocess may exist at D4.1 and S4.2. This subprocess may be invoked if the transferor is logged in (i.e., D4 is “YES”) and includes at D4.1 querying if the transferor opts to remain logged in. If the transferor is to remain logged in (i.e., D4.1 is “YES”), then transferor is left logged in with geometries (e.g., coordinate date) and textures (e.g., graphic files) from the avatar's perspective. In other words, although control of the avatar will transfer to the transferee, the transferor may still be able to view the virtual universe 12 from the avatar's perspective. In this mode, at S4.2 the same data may be streamed to both transferor and transferee.
At S7, log off the avatar and assets for the user who is receiving the avatar control (i.e., transferee). This allows the system to maintain a one-to-one relationship of avatar to user. In another embodiment, multiple avatar windows are allowed thereby allowing multiple avatars to be controlled by a single entity. In this embodiment, S6 may be replaced with a separate avatar window creation step.
Continuing with
In another embodiment of this invention, the avatar control tool 53 is used as a service to charge fees for each user, or group of users, that seeks help in obtaining surrogate avatar control in a virtual universe. In this embodiment, the provider of the virtual universe or a third party service provider could offer this avatar control tool 53 as a service by performing the functionalities described herein on a subscription and/or fee basis. In this case, the provider of the virtual universe or the third party service provider can create, deploy, maintain, support, etc., the avatar control tool 53 that performs the processes described in the invention. In return, the virtual universe or the third party service provider can receive payment from the virtual universe residents via the universe economy management component 70 and the commercial transaction management component 72.
In still another embodiment, the methodologies disclosed herein can be used within a computer system to provide surrogate avatar control in a virtual universe. In this case, the avatar control tool 53 can be provided and one or more systems for performing the processes described in the invention can be obtained and deployed to a computer infrastructure. To this extent, the deployment can comprise one or more of (1) installing program code on a computing device, such as a computer system, from a computer-readable medium; (2) adding one or more computing devices to the infrastructure; and (3) incorporating and/or modifying one or more existing systems of the infrastructure to enable the infrastructure to perform the process actions of the invention.
In the computing environment 100 there is a computer 102 which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with an exemplary computer 102 include, but are not limited to, personal computers, server computers, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable customer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The exemplary computer 102 may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, logic, data structures, and so on, that performs particular tasks or implements particular abstract data types. The exemplary computer 102 may be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
As shown in
Bus 108 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.
The computer 102 typically includes a variety of computer readable media. Such media may be any available media that is accessible by computer 102, and it includes both volatile and non-volatile media, removable and non-removable media.
In
Computer 102 may further include other removable/non-removable, volatile/non-volatile computer storage media. By way of example only,
The drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules, and other data for computer 102. Although the exemplary environment described herein employs a hard disk 116, a removable magnetic disk 118 and a removable optical disk 122, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, RAMs, ROM, and the like, may also be used in the exemplary operating environment.
A number of program modules may be stored on the hard disk 116, magnetic disk 120, optical disk 122, ROM 112, or RAM 110, including, by way of example, and not limitation, an operating system 128, one or more application programs 130 (e.g., primary entity control component 80, surrogate avatar controller 82, secondary entity control component 86, etc.), other program modules 132, and program data 134. Each of the operating system 128, one or more application programs 130 (e.g., primary entity control component 80, surrogate avatar controller 82, secondary entity control component 86, etc.), other program modules 132, and program data 134 or some combination thereof, may include an implementation of the networking environment 10 of
A user may enter commands and information into computer 102 through optional input devices such as a keyboard 136 and a pointing device 138 (such as a “mouse”). Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, serial port, scanner, camera, or the like. These and other input devices are connected to the processor unit 104 through a user input interface 140 that is coupled to bus 108, but may be connected by other interface and bus structures, such as a parallel port, game port, or a universal serial bus (USB).
An optional monitor 142 or other type of display device is also connected to bus 108 via an interface, such as a video adapter 144. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers and printers, which may be connected through output peripheral interface 146.
Computer 102 may operate in a networked environment using logical connections to one or more remote computers, such as a remote server/computer 148. Remote computer 148 may include many or all of the elements and features described herein relative to computer 102.
Logical connections shown in
In a networked environment, program modules depicted relative to the personal computer 102, or portions thereof, may be stored in a remote memory storage device. By way of example, and not limitation,
An implementation of an exemplary computer 102 may be stored on or transmitted across some form of computer readable media. Computer readable media can be any available media that can be accessed by a computer. By way of example, and not limitation, computer readable media may comprise “computer storage media” and “communications media.”
“Computer storage media” include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
“Communication media” typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as carrier wave or other transport mechanism. Communication media also includes any information delivery media.
The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above are also included within the scope of computer readable media.
It is apparent that there has been provided with this invention an approach for providing surrogate avatar control in a virtual universe. While the invention has been particularly shown and described in conjunction with a preferred embodiment thereof, it will be appreciated that variations and modifications will occur to those skilled in the art. Therefore, it is to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.