User credential verification indication in a virtual universe

ABSTRACT

User credential verification indication in a virtual universe is disclosed. A method, system and program product are provided that include verifying a credential of the user of a first avatar in the virtual universe; and establishing a zone that causes an indication of the credential of the user of the first avatar to appear in response to an action being taken relative to the zone.

FIELD OF THE INVENTION

The present invention relates to a virtual universe or virtual world andmore specifically relates to user credential verification indicationinside a virtual universe.

BACKGROUND OF THE INVENTION

A virtual universe is an interactive simulated environment accessed bymultiple users through an online interface. Users inhabit and interactin the virtual universe via avatars, which are two or three-dimensionalgraphical representations. There are many different types of virtualuniverses, however there are several features many virtual universesgenerally have in common:

-   -   Shared Space: the virtual universe allows many users to        participate at once.    -   Graphical User Interface: the virtual universe depicts space        visually, ranging in style from 2D “cartoon” imagery to more        immersive 3D environments.    -   Immediacy: interaction takes place in real time.    -   Interactivity: the virtual universe allows users to alter,        develop, build, or submit customized content.    -   Persistence: the virtual universe's existence continues        regardless of whether individual users are logged in.    -   Socialization/Community: the virtual universe allows and        encourages the formation of social groups such as teams, guilds,        clubs, cliques, housemates, neighborhoods, etc.        Virtual universes may also be referred to as massively        multi-user online (MMO) environments.

An avatar can have a wide range of business and social experiences. Suchbusiness and social experiences are becoming more common andincreasingly important in on-line virtual universes, such as thatprovided in the on-line world Second Life (Second Life® is a trademarkof Linden Research in the United States, other countries, or both). TheSecond Life® client program provides its users (referred to asresidents) with tools to view, navigate, and modify the Second Lifeworld and participate in its virtual economy. Other examples of virtualuniverse environments include Entropia Universe (Entropia Universe is aregistered trademark of Mindark) and Kaneva (Kaneva is a registeredtrademark of Kaneva Inc).

Second Life and other on-line virtual universes present a tremendous newoutlet for both structured and unstructured virtual collaboration,gaming and exploration, as well as real-life simulations in virtualspaces. These activities, along with yet to be disclosed new dimensions,in turn provide a wide open arena for creative and new businessinteractions, methods and mechanisms.

One aspect in virtual universe is the determination of user credentialverification by other users. For example, a user may want to undertake abusiness or social interaction with a reasonable level of confidence asto the other user's actual credentials in the real world.

SUMMARY OF THE INVENTION

User credential verification indication in a virtual universe ispresented. One method includes verifying a credential of the user of afirst avatar in the virtual universe; and establishing a zone thatcauses an indication of the credential of the user of the first avatarto appear in response to an action being taken relative to the zone.

A first aspect of the invention provides a method for user credentialverification indication in a virtual universe, the method comprising:verifying a credential of a user of a first avatar in the virtualuniverse; and establishing a zone that causes an indication of thecredential of the user of the first avatar to appear in response to anaction being taken relative to the zone.

A second aspect of the invention provides a system for user credentialverification indication in a virtual universe, the system comprising atleast one computing device comprising: a verifier for verifying acredential of a user of a first avatar in the virtual universe; and azone establisher for establishing a zone that causes an indication ofthe credential of the user of the first avatar to appear in response toan action being taken relative to the zone.

A third aspect of the invention provides a program product stored on acomputer-readable storage medium, which when executed, performs aprocess comprising: verifying a credential of a user of a first avatarin the virtual universe; and establishing a zone that causes anindication of the credential of the user of the first avatar to appearin response to an action being taken relative to the zone.

A fourth aspect of the invention provides a method for user credentialverification indication in a virtual universe, comprising: producingcomputer executable program code; storing the code on a computerreadable medium; and providing the program code to be deployed andexecuted on a computer system, the program code comprising instructionswhich, when executed on the computer system, cause the computer systemto: verifying a credential of a user of a first avatar in the virtualuniverse, and establishing a zone that causes an indication of thecredential of the user of the first avatar to appear in response to anaction being taken relative to the zone.

The illustrative aspects of the present invention are designed to solvethe problems herein described and/or other problems not discussed.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features of this invention will be more readilyunderstood from the following detailed description of the variousaspects of the invention taken in conjunction with the accompanyingdrawings that depict various embodiments of the invention, in which:

FIG. 1 depicts an illustrative system for user credential verificationindication in a virtual universe in accordance with an embodiment of theinvention.

FIG. 2 depicts an illustrative computer system for implementingembodiment(s) of the present invention.

FIG. 3 depicts an illustrative process in accordance with an embodimentof the present invention.

The drawings are intended to depict only typical aspects of theinvention, and therefore should not be considered as limiting the scopeof the invention. In the drawings, like numbering represents likeelements between the drawings. It is noted that the drawings of theinvention are not to scale.

DETAILED DESCRIPTION OF THE INVENTION

As depicted in FIG. 1, embodiments of the present invention provides acredential verification indication (CVI) system 106 in a virtualuniverse 52. For this invention, focus is on real credential(s) 54 of auser 50 having an avatar 56 controlled by user 50. In this invention,“credential” may include any evidence concerning any actualcharacteristic of a user and, thus, may have a broader meaning than istypical. Credential(s) 54 may comprise practically any information aboutthe avatar's user, for example, an occupational position orcertification, credit rating, possessions, education level, employmentstatus, income, place of residence, social circle volunteer actions,social security number, age, actual name, address, driver's license,etc. For example, the credential may be a real-world name on a creditcard associated with a user or a real-world location of the user asassociated with the credit card information. Credential(s) 54 may begenerated or monitored by one or more credential holding agency(ies) 58,which may include, for example, an agency, credentialing association(e.g., labor union), etc.

As will be appreciated by one skilled in the art, the present inventionmay be embodied as a system, method or computer program product.Accordingly, the present invention may take the form of an entirelyhardware embodiment, an entirely software embodiment (includingfirmware, resident software, micro-code, etc.) or an embodimentcombining software and hardware aspects that may all generally bereferred to herein as a “circuit,” “module” or “system.” Furthermore,the present invention may take the form of a computer program productembodied in any tangible medium of expression having computer-usableprogram code embodied in the medium.

Any combination of one or more computer usable or computer readablemedium(s) may be utilized. The computer-usable or computer-readablestorage medium may be, for example but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, device, or propagation medium. More specific examples (anon-exhaustive list) of the computer-readable storage medium wouldinclude the following: an electrical connection having one or morewires, a portable computer diskette, a hard disk, a random access memory(RAM), a read-only memory (ROM), an erasable programmable read-onlymemory (EPROM or Flash memory), an optical fiber, a portable compactdisc read-only memory (CD-ROM), an optical storage device, atransmission media such as those supporting the Internet or an intranet,or a magnetic storage device. Note that the computer-usable orcomputer-readable storage medium could even be paper or another suitablemedium upon which the program is printed, as the program can beelectronically captured, via, for instance, optical scanning of thepaper or other medium, then compiled, interpreted, or otherwiseprocessed in a suitable manner, if necessary, and then stored in acomputer memory. In the context of this document, a computer-usable orcomputer-readable storage medium may be any medium that can contain,store, communicate, propagate, or transport the program for use by or inconnection with the instruction execution system, apparatus, or device.The computer usable program code may be transmitted using anyappropriate medium, including but not limited to wireless, wireline,optical fiber cable, RF, etc.

Computer program code for carrying out operations of the presentinvention may be written in any combination of one or more programminglanguages, including an object oriented programming language such asJava, Smalltalk, C++ or the like and conventional procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The program code may execute entirely on the user's computer,partly on the user's computer, as a stand-alone software package, partlyon the user's computer and partly on a remote computer or entirely onthe remote computer or server. In the latter scenario, the remotecomputer may be connected to the user's computer through any type ofnetwork, including a local area network (LAN) or a wide area network(WAN), or the connection may be made to an external computer (forexample, through the Internet using an Internet Service Provider).

The present invention is described below with reference to flowchartillustrations and/or block diagrams of methods, apparatus (systems) andcomputer program products according to embodiments of the invention. Itwill be understood that each block of the flowchart illustrations and/orblock diagrams, and combinations of blocks in the flowchartillustrations and/or block diagrams, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce amachine, such that the instructions, which execute via the processor ofthe computer or other programmable data processing apparatus, createmeans for implementing the functions/acts specified in the flowchartand/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable storage medium that can direct a computer or other programmabledata processing apparatus to function in a particular manner, such thatthe instructions stored in the computer-readable medium produce anarticle of manufacture including instruction means which implement thefunction/act specified in the flowchart and/or block diagram block orblocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions which execute on the computer or other programmableapparatus provide processes for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

FIG. 2 shows an illustrative environment 100 including a computerinfrastructure 102 that can perform the various process steps describedherein for credential verification indication. In particular, computerinfrastructure 102 is shown including at least one computing device 104that comprises credential verification indication (CVI) system 106,which enables computing device 104 to indicate verified credential(s) ofa user in the virtual universe 52 by performing the processes of theinvention. CVI system 106 may be provided within the virtual universe 52or (as shown in phantom) as a separate standalone system apart from thevirtual universe 52. In this latter embodiment, CVI system 106 may beprovided as a service compatible with a variety of different virtualuniverses 52.

Computing device 104 is shown including a memory 112, a processor (PU)114, an input/output (I/O) interface 116, and a bus 118. Further,computing device 104 is shown in communication with an external I/Odevice/resource 120 and a storage system 122. As is known in the art, ingeneral, processor 114 executes computer program code, such as CVIsystem 106, that is stored in memory 112 and/or storage system 122.While executing computer program code, processor 114 can read and/orwrite data, such as credential(s) 54 (FIG. 1), to/from memory 112,storage system 122, and/or I/O interface 116. Bus 118 provides acommunications link between each of the components in computing device104. I/O device 118 can comprise any device that enables a user tointeract with computing device 104 or any device that enables computingdevice 104 to communicate with one or more other computing devices.Input/output devices (including but not limited to keyboards, displays,pointing devices, etc.) can be coupled to the system either directly orthrough intervening I/O controllers.

In any event, computing device 104 can comprise any general purposecomputing article of manufacture capable of executing computer programcode installed by a user (e.g., a personal computer, server, handhelddevice, etc.). However, it is understood that computing device 104 andCVI system 106 are only representative of various possible equivalentcomputing devices that may perform the various process steps of theinvention. To this extent, in other embodiments, computing device 104can comprise any specific purpose computing article of manufacturecomprising hardware and/or computer program code for performing specificfunctions, any computing article of manufacture that comprises acombination of specific purpose and general purpose hardware/software,or the like. In each case, the program code and hardware can be createdusing standard programming and engineering techniques, respectively.

Similarly, computer infrastructure 102 is only illustrative of varioustypes of computer infrastructures for implementing the invention. Forexample, in one embodiment, computer infrastructure 102 comprises two ormore computing devices (e.g., a server cluster) that communicate overany type of wired and/or wireless communications link, such as anetwork, a shared memory, or the like, to perform the various processsteps of the invention. When the communications link comprises anetwork, the network can comprise any combination of one or more typesof networks (e.g., the Internet, a wide area network, a local areanetwork, a virtual private network, etc.). Network adapters may also becoupled to the system to enable the data processing system to becomecoupled to other data processing systems or remote printers or storagedevices through intervening private or public networks. Modems, cablemodem and Ethernet cards are just a few of the currently available typesof network adapters. Regardless, communications between the computingdevices may utilize any combination of various types of transmissiontechniques.

As previously mentioned and discussed further below, CVI system 106enables computing infrastructure 102 to indicate verified credentials ofa user's avatar. To this extent, CVI system 106 is shown including averifier 130 and an indicator 132 including a zone establisher 134.Operation of each of these systems is discussed further below. However,it is understood that some of the various systems shown in FIG. 2 can beimplemented independently, combined, and/or stored in memory for one ormore separate computing devices that are included in computerinfrastructure 102. Further, it is understood that some of the systemsand/or functionality may not be implemented, or additional systemsand/or functionality may be included as part of environment 100.

Referring to FIG. 3 in conjunction with FIGS. 1-2, embodiments of amethodology will now be described. In process P1, verifier 130 verifiesa credential of the user of a (first or target) avatar 56 in the virtualuniverse 52. Process P1 may be performed in a number of ways. In oneembodiment, verifier 130 may access a third party outside of the virtualuniverse 52 (i.e., credential holding agency(ies) 58) to obtaincredential(s) 54 verification based on a user 50 having previouslyregistered with such credential holding agency(ies) 58 and providingadequate access permission to CVI system 106.

In another embodiment, verifier 130 may provide appropriate interfacesfor a user 50 to establish verified credential(s) 54. In this case,verifier 130 may allow user 50 to register a real identity, registerhis/her credential(s) and register his/her avatar(s) 56. For example,user 50 may visit a network-connected location using a computing device.This location could either be in a physical world, virtual world or on awebsite or kiosk. User 50 would then register with CVI system 106,providing information about themselves including their real name andidentification. The user's real name may then be verified using existingknown verification methods. Alternatively, other identifiers, such associal security number, credit card information or other positiveidentifiers, can by used in place of the name. Examples of userverification include the provision of a credit card and date ofexpiration, a driver's license, or knowing the number and personalinformation such as the owner's real name, date of birth, or any form ofbiometric information including but not limited to voice biometrics,signature biometrics, DNA, retina and fingerprints. Other informationthat can be collected at this point may include a user's e-mail address,street address, home phone number, work number and any other informationCVI system 106 may require. As an option, an additional online oroffline verification process may occur. Once registered, depending onthe amount of verification data provided and confirmed by verifier 130,an appropriate identity verification level is assigned to user 50 and/orhis/her avatar 56. Generally, more information provided and confirmed bythe verification process equates to higher identity verification levels.

Next, in this embodiment, user 50 could then upload all his/her relevantadditional information to CVI system 106, e.g., to storage system 122.This information may include other personal, academic or any credentialsthey may possess. Verification of additional information provided can gothrough normal external services and channels for validation, e.g.,credential holding agency(ies) 58. An example of this upload may be whena particular user 50 states they are a medical doctor. Their real namewill then be validated with the college of physicians, or otherverifying agency 58. Verifier 130 may also provide interfaces toestablish for real-time validation of information, such as financialstatus with companies such as Equifax, who provide current credit ratinginformation.

Finally, in this embodiment, user 50 can register the user name,password (optionally) and associated the virtual universe 52 account ofone or more avatars 56 with CVI system 106 via verifier 130. This mayoccur for one or more accounts within one or more virtual universes 52,thus allowing verified credential indications in one or more virtualuniverses 52 from a single CVI system 106. This registration processwill continue until all names and passwords are entered. Ideally, theexisting virtual universe 52 space application program interfaces(API's) would be exploited or new ones created to verify that the loggedin user 50 had authority to access (authentication credentials) to theaccounts in the virtual universe 52 space. Essentially, a user 50 wouldregister their virtual universe 52 accounts and avatars by entering theaccess credentials with verifier 130. In this way, verifier 130 couldprogrammatically log into the user's virtual universe 52 accounts andverify the associate ownership and also potentially automaticallypopulate any other fields necessary via the API. For example, a user whohas already registered their real identity will log in to the verifier130 and enter in their user id and password (and any other requiredinformation) to access the virtual universe 52 account and avatar(s).Once saved, verifier 130 can log into the user's virtual universe 52account and record that it was successful, then optionally download anyother relevant information that is available to that user id, e.g., thedate the account was created, status of account, level, time used,etcetera. Some portions of this data can be used to verify or compareexisting data in CVI system 106.

It is understood that the above-described methodology for verifying auser's credentials are not the only possibilities. In addition, theabove-described embodiments may not be mutually exclusive.

Returning to the process flow of FIG. 3, in process P2, indicator 132via zone establisher 134 establishes a zone 70 (FIG. 1) that causes anindication of the credential 54 of user 50 of avatar 56 to appear (inthe virtual universe 52) in response to an action being taken relativeto the zone. As will be described, the zone, the indication and theaction can take a variety of forms. For example, in one embodiment, zone70 includes an area 72 in the virtual universe 52 and the actionincludes avatar 56 being placed in the area or attempting to enter thearea. In one application of this arrangement, other avatars 60 may enterarea 72 and credentials 54 for the avatars 56, 60 appear forverification by the different users' credentials so that each user isassured the other users are credentialed as claimed. That is, user 50and his/her potential partner avatar(s) 60 are positioned in area 72 andzone establisher 134 indicates verified credentials 54 of each user tothe other users. In another application, an avatar 56 may have to hold acertain level of credential verification to enter an area 72. An area 72may be graphically represented (e.g., an amber pentagonal plate mayrepresent an area in some regions or worlds, but the specific graphicalrepresentation may be any conceivable). In any event, the verificationoccurs through three-dimensional (3-D) spatial location within thevirtual universe 52. Although not limited to a business setting, oneparticular application that this invention finds advantage is relativeto indications of age for retailers or individuals that cannot sell orinteract inappropriately with underage individuals.

With regard to indication types, in one example, an indication mayinclude the appearance of a text window 80 indicating credential(s) 54or credential verification level of user 50. For example, the textwindow may include text like “John Doe, MD”, “Jane Doe (New York)”, etc.In another embodiment, the indication may take the form of a change inan appearance of avatar 56, e.g., a colored aura 82 may be presentedabout avatar 56 or other appearance change may occur, or some othervisual indicator may be presented, e.g., a shape on avatar 56, a newpiece of clothing such as a hat 84, etc. Practically any manner ofgraphically communicating may be employed as an indication. Theindication may also include progressive levels corresponding to a levelof credential verification of a user 50. For example, an avatar 56 mayappear transparent where the user 50 does not have certain credentials54, e.g., age above 18, driver's license, claimed professionalcertification, etc., and may appear different shades of a colordepending on credentials. In another example, aura 82 may have differentshades or other appearance differences that indicated differentcredentials. If necessary, a legend may be provided, e.g., in textwindow 80. More complicated progressive level indications could also beemployed such as the reservation of badges, stamps, auras, size, ordynamically appearing indicators (for example those that only appearwhen requested).

In another embodiment, zone 70 may include an object in the virtualuniverse 52 and the action includes an avatar 56, 60 taking the actionrelative to the object. The object can be practically anything that anavatar may interact with such as a button that can be pushed, a stoolthat can be stood upon, etc. In one particular embodiment, the objectmay be a badge 86 associated with avatar 56 (e.g., on or about avatar56) and the action includes a user of a second avatar mousing over,clicking on, and/or having the second avatar touch the badge 86, whichcauses an indication to appear such as aura 82 or a text window 80including verified credential information. In another example, an actionrelative to an object created by a certified avatar could force averification of credentials for the user that created the object. Anexample may include a qualified medical doctor who creates aninformational kiosk on medical subjects. The object created wouldcontain a digital seal, and clicking or otherwise accessing this digitalseal could result in the credential validation being indicated. In thismanner, an implied or forced verification may occur when an actionrelative to an object occurs. Similarly, event-based verification mayoccur, e.g., selling a good or service or the inclusion of an “adultterm” in a conversation. Before the event could occur, credentialverification would need to occur. This could include the ability tomouse over an avatar 56 and see a picture ID card such as a driver'slicense with all the verified credentials.

Indication of credential verification for avatar 56 may also becontrolled by avatar 56. For example, one or more queries to indicator132 using unique identifiers supplied by a virtual universe 52management system 40 may be employed. These identifiers relate tospecific elements already verified by CVI system 106 with respect toavatar 56. The requesting avatar 60 (or zone 72) may ask for averification element and supplies a transaction ID. In this case, avatar56 may accept the request and the virtual universe 52 management system40 supplies a unique ID for that account/avatar 56. The requestingavatar 60 may then use that unique avatar ID and the transaction ID toquery CVI system 106, i.e., indicator 132. Indicator 132 may then queryavatar 56 for authorization to disclose the requested credentialverification (using the transaction ID). In alternative embodiments,some pre-authorization of disclosure may be presumed. The target IDgrants the request and indicator 132 supplies the requesting avatar 60with the authorized credential verification. The user interface of therequesting avatar 60 then, for example, overlay the indication on avatar56, or otherwise makes it available in a targeted fashion to theappropriate recipient. This methodology would typically involve nativecalls supported by the virtual universe 52 to and from avatars 56, 60and virtual universe 52 management system 40. It may also be possiblefor data to be periodically cached by the virtual universe 52 managementsystem 40, and replenished as necessary.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

As discussed herein, various systems and components are described as“obtaining” data (e.g., credentials 54, etc.). It is understood that thecorresponding data can be obtained using any solution. For example, thecorresponding system/component can generate and/or be used to generatethe data, retrieve the data from one or more data stores (e.g., adatabase), receive the data from another system/component, and/or thelike. When the data is not generated by the particular system/component,it is understood that another system/component can be implemented apartfrom the system/component shown, which generates the data and providesit to the system/component and/or stores the data for access by thesystem/component.

Still yet, computer infrastructure 102 is intended to demonstrate thatsome or all of the components of implementation could be deployed,managed, serviced, etc. by a service provider who offers to implement,deploy, and/or perform the functions of the present invention for usercredential verification indication in a virtual universe, for example bylicensing methods and browser or application server technology accordingto the present invention to an internet service providers (ISP) orcellular telephone provider. In one embodiment the invention maycomprise a business method that performs the process steps of theinvention on a subscription, advertising, and/or fee basis. Thus aservice provider can create, maintain, support, etc., a computerinfrastructure, such as the computer infrastructure 102 that performsthe process steps of the invention for user credential verificationindication in a virtual universe, and in return the service provider canreceive payment from the customer(s) under a subscription and/or feeagreement and/or the service provider can receive payment from the saleof advertising content to one or more third parties.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiment was chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

1. A method for user credential verification indication in a virtualuniverse, the method comprising: verifying a credential of a user of afirst avatar in the virtual universe; and establishing a zone thatcauses an indication of the credential of the user of the first avatarto appear in response to an action being taken relative to the zone. 2.The method of claim 1, wherein the indication is selected from a groupconsisting of: a text window, a change in an appearance of the avatar,and a visual indicator.
 3. The method of claim 1, wherein the zoneincludes an area in the virtual universe and the action includes thefirst avatar being placed in the area.
 4. The method of claim 1, whereinthe zone includes an object in the virtual universe and the actionincludes an avatar taking the action relative to the object.
 5. Themethod of claim 4, wherein the object is a badge associated with thefirst avatar and the action includes a user of a second avatarperforming at least one of: mousing over, clicking on, and having thesecond avatar touch the badge.
 6. The method of claim 1, wherein theindication includes progressive levels corresponding to a level ofcredential verification.
 7. The method of claim 1, wherein the verifyingincludes obtaining the credential verification from a third partyoutside of the virtual universe.
 8. The method of claim 1, wherein thecredential is selected from a group consisting of: a real-world name ona credit card associated with a user and a real-world location of theuser as associated with the credit card information.
 9. A system foruser credential verification indication in a virtual universe, thesystem comprising at least one computing device comprising: a verifierfor verifying a credential of a user of a first avatar in the virtualuniverse; and a zone establisher for establishing a zone that causes anindication of the credential of the user of the first avatar to appearin response to an action being taken relative to the zone.
 10. Thesystem of claim 9, wherein the indication is selected from a groupconsisting of: a text window, a change in an appearance of the avatar,and a visual indicator.
 11. The system of claim 9, wherein the zoneincludes an area in the virtual universe and the action includes thefirst avatar being placed in the area.
 12. The system of claim 9,wherein the zone includes an object in the virtual universe and theaction includes an avatar taking the action relative to the object. 13.The system of claim 12, wherein the object is a badge associated withthe first avatar and the action includes a user of a second avatarperforming at least one of: mousing over, clicking on, and having thesecond avatar touch the badge.
 14. The system of claim 9, wherein theindication includes progressive levels corresponding to a level ofcredential verification.
 15. The system of claim 9, wherein thecredential is selected from a group consisting of: a real-world name ona credit card associated with a user and a real-world location of theuser as associated with the credit card information.
 16. A programproduct stored on a computer-readable storage medium, which whenexecuted, performs a process comprising: verifying a credential of auser of a first avatar in the virtual universe; and establishing a zonethat causes an indication of the credential of the user of the firstavatar to appear in response to an action being taken relative to thezone.
 17. The program product of claim 16, wherein the indication isselected from a group consisting of: a text window, a change in anappearance of the avatar, and a visual indicator.
 18. The programproduct of claim 16, wherein the zone includes an area in the virtualuniverse and the action includes the first avatar being placed in thearea.
 19. The program product of claim 16, wherein the zone includes anobject in the virtual universe and the action includes an avatar takingthe action relative to the object.
 20. The program product of claim 16,wherein the object is a badge associated with the first avatar and theaction includes a user of a second avatar performing at least one of:mousing over, clicking on, and having the second avatar touch the badge.21. The program product of claim 16, wherein the indication includesprogressive levels corresponding to a level of credential verification.22. The program product of claim 16, wherein the verifying includesobtaining the credential verification from a third party.
 23. Theprogram product of claim 16, wherein the credential is selected from agroup consisting of: a real-world name on a credit card associated witha user and a real-world location of the user as associated with thecredit card information.
 24. A method for user credential verificationindication in a virtual universe, comprising: producing computerexecutable program code; storing the code on a computer readable medium;and providing the program code to be deployed and executed on a computersystem, the program code comprising instructions which, when executed onthe computer system, cause the computer system to: verifying acredential of a user of a first avatar in the virtual universe, andestablishing a zone that causes an indication of the credential of theuser of the first avatar to appear in response to an action being takenrelative to the zone.