Multimedia communication method using virtual world interface in mobile personal computers

ABSTRACT

A method for communication of multimedia data using virtual world interface in a mobile personal computers is disclosed. The method comprises logging in to the server; displaying an initial menu picture on a screen of the mobile personal computer, the initial menu picture including a plurality of menu items for transmission or retrieval of the multimedia data; and performing a subroutine associated with a selected one of the menu items in the initial menu picture to transmit or retrieve the multimedia data. According to this invention, information can rapidly and accurately be exchanged at any time or place. Further, desired media data can conveniently be transmitted or retrieved by merely a clicking operation of a stylus pen or a drag operation of a mouse without executing a multiplicity of individual programs for transmission and/or retrieval of different media data.

BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention

[0002] The present invention relates in general to a multimediacommunication method in mobile personal computers, and more particularlyto the multimedia communication method using a virtual world interfaceand an instant messenger program.

[0003] 2. Description of the Prior Art

[0004] Mobile personal computers (PCs) are expected to be universallyused in the early twenty-first century and absorb all functions ofexisting telecommunication and information appliances such as pagers,cellular phones, videophones, facsimiles, etc. These mobile PCs signifynot only existing handheld computers and personal digital assistants(PDAs), but also light and small PCs having all or some of the infraredport, serial port, radio data communication functions and the like forcommunication with remote PCs, as well as the performance of desktopPCs, such as wearable PCs (in the form of a wrist watch or bulletproofjacket), auto PCs (such as a PC which is contained in a vehicle to guidea driver or read an electronic mail for the driver in response to avoice command from the driver), etc. Such mobile PCs are expected, onthe basis of the following reasons, to absorb all functions of existingtelecommunication and information appliances.

[0005] 1. Development is continuously made of fundamental techniquescapable of realizing functions of pagers, cellular phones, videophonesand facsimiles in PCs.

[0006] 2. Mobile PCs, charge coupled devices (CCDs), batteries, etc. arebecoming lighter in weight and higher in performance at a veryremarkable speed.

[0007] 3. Peripheral techniques associated with a wireless asynchronoustransmit mode (ATM) are being developed. These techniques will replaceexisting cellular phones and radio data communication systems using themor be used in combination with them.

[0008] 4. It is much simpler and more convenient for persons to carryand use a single telecommunication/information appliance rather thanindividual pagers, cellular phones, electronic notes, etc.

[0009] On the other hand, it is the current reality that an instantmessenger program runs only on either desktop computers or notebookcomputers. The instant messenger program requires no procedure of serveraccessing by a user and is made active in response to a request from adifferent user while online. This program mostly has memo and chattingfunctions and always runs at a background or foreground.

[0010] An ultimate goal of communication techniques can be defined asallowing users to rapidly exchange information with anybody anytime andanywhere. But, either desktop computers or notebook computers aredisadvantageously limited in places for use. Mobile PCs, expected tohave a multimedia function and be actively spread, will enable rapidcommunication at any place or time as long as they are able to transmitor retrieve multimedia data using the instant messenger program.

SUMMARY OF THE INVENTION

[0011] Therefore, it is an object of the present invention to provide amultimedia communication method using a virtual world interface inmobile personal computers, wherein information can rapidly andaccurately be exchanged at any time or place.

[0012] It is another object of the present invention to provide amultimedia communication method in mobile personal computers, wherein amobile personal computer is capable of readily transmitting orretrieving multimedia data using a virtual world interface and aninstant messenger program.

[0013] It is yet another object of the present invention to provide amultimedia communication method in mobile personal computers, wherein adesired function can be performed by merely a clicking operation of astylus pen or a drag operation of a mouse without executing amultiplicity of individual programs for transmission and/or retrieval ofdifferent media data.

[0014] In accordance with the present invention, the above and otherobjects can be accomplished by a provision of a multimedia communicationmethod in mobile personal computers which includes a virtual worldinterface and an instant messenger program and is connected to a serverover any one of wired and wireless communication networks, the methodcomprising the first step of logging in to the server; the second stepof displaying an initial menu picture on a screen of the mobile personalcomputer, the initial menu picture including a plurality of menu itemsfor transmission or retrieval of the multimedia data; and the third stepof performing a subroutine associated with a selected one of the menuitems in the initial menu picture to transmit or retrieve the multimediadata.

BRIEF DESCRIPTION OF THE DRAWINGS

[0015] The above and other objects, features and advantages of thepresent invention will be more clearly understood from the followingdetailed description taken in conjunction with the accompanyingdrawings, in which:

[0016]FIG. 1 is a view showing the construction of a system forexecution of a multimedia communication method using a virtual worldinterface in mobile personal computers in accordance with the presentinvention;

[0017]FIG. 2 is a top-level flowchart illustrating the multimediacommunication method in accordance with the present invention;

[0018]FIG. 3 is a view showing an exemplary initial menu picturedisplayed on a screen after user authentication, more particularly iconfunctions in the initial menu picture;

[0019]FIG. 4 is a view showing types of services provided in the initialmenu picture of FIG. 3;

[0020]FIG. 5 is a view showing an exemplary avatar selection picturedisplayed on the screen in accordance with the present invention;

[0021]FIG. 6 is a view showing an exemplary avatar chatting picturedisplayed on the screen when an avatar chatting function is selected inFIG. 2;

[0022]FIG. 7 is a view showing an exemplary picture for avatar selectionand file sending in accordance with the present invention;

[0023]FIG. 8 is a flowchart illustrating the step in FIG. 2 of sending afile to a file transmit protocol (FTP) server;

[0024]FIG. 9 is a flowchart illustrating a received mail checking stepin FIG. 2;

[0025]FIG. 10 is a flowchart illustrating an avatar chatting step inFIG. 2;

[0026]FIG. 11 is a flowchart illustrating a peer-to-peer chatting stepin FIG. 2;

[0027]FIG. 12 is a flowchart illustrating a mail sending step in FIG. 2;

[0028]FIG. 13 is a flowchart illustrating the step in FIG. 2 of directlysending a file to the other party;

[0029]FIG. 14 is a flowchart illustrating a multi-peer chatting step inFIG. 2;

[0030]FIG. 15 is a flowchart illustrating a specific user accessdetection/call step in FIG. 2; and

[0031]FIG. 16 is a flowchart illustrating a specific user receptiondenial step in FIG. 2.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0032] In the following description made in conjunction with thepreferred embodiment of the present invention, a variety of specificelements such as the number and names of avatars, types of multimediadata, Windows operating systems and concrete processing are shown. Thedescription of such elements has been made only for a betterunderstanding of the present invention. Those skilled in the art willappreciate that the present invention can be implemented without usingthe above-mentioned specific elements. In the following description ofthe present invention, a detailed description of known functions andconfigurations incorporated herein, for example, a handheld personalcomputer (PC), personal digital assistant (PDA) and a desktop PC, willbe omitted when it may make the subject matter of the present inventionrather unclear. Further, in the following description of the presentinvention, “multimedia data” are defined as including text, handwriting,audio, image, and video data, and an “integrated environment” is definedas a program capable of continuously performing its function in responseto a new media data transmission/retrieval request by not modifying anexisting program code, but registering an additional component orplug-in program. With this integrated environment program, a user neednot execute a multiplicity of individual programs fortransmission/retrieval of different media data.

[0033]FIG. 1 is a view showing the construction of a system forexecution of a multimedia communication method using a virtual worldinterface in mobile personal computers in accordance with the presentinvention. As shown in this drawing, the system comprises a messagingserver 30 connected to a plurality of clients 20 a-20 c via acommunication line 10 (this line may be associated with bothwired/wireless communication networks if a mobile PC supporting radiodata communication is used), and a database (DB) server 40 connected tothe messaging server 30. Each of the clients 20 a-20 c can be a handheldPC, PDA, or desktop PC. Preferably, mobile PCs available as clients maybe a mobile PC employing Windows CE as its operating system, and adesktop PC and notebook PC employing Windows 95/98/NT/2000 as theiroperating systems. The messaging server 30 may preferably be a WindowsNT 4.0 server.

[0034] Now, a description will be given of the multimedia communicationmethod using a virtual world interface of the present invention, whichis carried out by the system with the above-mentioned construction, withreference to the accompanying drawings.

[0035]FIG. 2 is a top-level flowchart illustrating the multimediacommunication method using a virtual world interface in accordance withthe present invention. First, each of the clients 20 a-20 c, physicallyconnected to the messaging server 30 via the communication line 10, isuser-authenticated by the messaging server 30 through a log-in procedure(entering a user identification (ID) and password) at step 50. The userIDs and passwords of the clients must be pre-registered in the DB server40. Upon user authentication by the messaging server (referred tohereinafter as a server) 30, an initial menu picture as shown in FIG. 3is displayed on a screen of each of the clients 20 a, 20 b and 20 c suchthat each client performs desired functions through the server 30connected thereto. In the preferred embodiment of the present invention,the desired functions may be a variety of functions for transmission orretrieval of multimedia data, for example, a multi-peer chattingfunction, avatar chatting function, received mail checking function,etc., which are executed at steps 54 to 68 in FIG. 2.

[0036]FIG. 3 is a view showing an exemplary initial menu picturedisplayed on a screen after user authentication, more particularly iconfunctions in the initial menu picture, and FIG. 4 is a view showingtypes of services provided in the initial menu picture of FIG. 3. In thepresent embodiment, the “initial menu picture” may be referred to as achatting picture.

[0037] If the initial menu picture is displayed on the screen after theuser authentication as stated above, then each of the clients 20 a, 20 band 20 c can conduct a desired type of communication using a virtualworld interface as the described hereinafter with a desired client orclients connected to the server 30 on the displayed initial menupicture. In FIG. 2, the reference numeral 54 denotes the step of sendinga file to a file transmit protocol (FTP) server, and 56 denotes areceived mail check step. Also, the reference numeral 58 denotes anavatar chatting step and 60 denotes a peer-to-peer chatting step. If theavatar chatting function is selected, then avatars as shown in FIG. 5are displayed on the screen. These avatars represent clients connectedto the server 30, respectively, and information thereof must bepre-registered in the DB server 40. An example of chatting using suchavatars is shown in FIG. 6.

[0038] In FIG. 2, the reference numeral 62 denotes a mail sending stepand 64 denotes the step of directly sending a file to the other party.For direct sending to the other party, each client can select a file tobe sent, click on an avatar of the other party and then send theselected file directly to the other party. An example of such directsending is shown in FIG. 7. On the other hand, the reference numeral 66denotes the step of conducting multi-peer chatting in a chatting roomand 68 denotes a specific user access detection/call step and a specificuser reception denial step. The above steps 54 to 68 can be executed byselecting associated menu items in the initial menu picture.

[0039] Hereinafter, a more detailed description will be given of avariety of functions selected in the initial menu picture. FIG. 8 is aflowchart illustrating the step 54 in FIG. 2 of sending a file to theFTP server. For sending of a file to the FTP server, a specific clientfirst enters an “FTP server address”, “user ID” and “password” at step82 to gain access to the FTP server. If the specific client gains accessto the FTP server, then it selects a desired file and sends it to theFTP server at step 84. Subsequently, the specific client proceeds tostep 86 to log off. Through this procedure, the file sending to the FTPserver is completed.

[0040]FIG. 9 is a flowchart illustrating the received mail checking step56 in FIG. 2. For the checking of received mails, a specific clientfirst enters a “user ID”, “password” and “mail server address” at step92 to gain access to the server 30. Then, the specific client reads thenumber and sizes of received messages from the DB server 40 at step 94and displays the received messages and attached files correspondingrespectively thereto on the screen at step 96. Subsequently, thespecific client releases the connection to the server 30 at step 98. Inthis manner, each client can check received mails.

[0041]FIG. 10 is a flowchart illustrating the avatar chatting step 58 inFIG. 2. For avatar chatting, a specific client first selects an avatarof the other party at step 102 and then sends the contents of chattingto the selected avatar at step 104. Alternatively, the specific clientmay send a slip to a desired avatar at step 106, send a mail to thedesired avatar at step 108, send or receive a file to or from the FTPserver at step 110 or send a file directly to the other party at step112. At any step, the corresponding function is performed by selectingan avatar of the other party as in the above step 102.

[0042]FIG. 11 is a flowchart illustrating the peer-to-peer chatting step60 in FIG. 2. For peer-to-peer chatting, a specific client first sets upa one-to-one chatting room at step 114 and then sends an ID of the otherparty and a number of the set-up chatting room to the messaging serverat step 116. As a result, the specific client can conduct one-to-onechatting with a user present in the chatting room at step 118.

[0043]FIG. 12 is a flowchart illustrating the mail sending step 62 inFIG. 2. For sending of a mail to the other party, a specific clientfirst enters a “mail server address”, a “destination ID”, a “sender ID”,a “message title”, “mail contents” and an “attached file or files” atstep 122. Thereafter, if the specific client enters a send command, thena mail is sent to the mail server at step 124. Subsequently, the mailsending client proceeds to step 126 to release the connection to theserver 30.

[0044]FIG. 13 is a flowchart illustrating the step 64 in FIG. 2 ofdirectly sending a file to the other party. For direct sending of a fileto the other party, a specific client first enters a server address andport number at step 132 to gain access to the server 30, and then sendsa destination ID and file name to the server 30 at step 134. At step136, a terminal of the file sender reads a file stored therein accordingto a program therein and sends the read file to a terminal of the otherparty via the server 30. Then, the other client stores or opens the sentfile at step 138.

[0045]FIG. 14 is a flowchart illustrating the multi-peer chatting step66 in FIG. 2. In the present embodiment, the multi-peer chattingfunction is classified into two modes, one where a client selects achatting room and chats with users present in the selected chatting roomand the other where a client chats with all users connected to theserver 30 without selecting the chatting room. In other words, if aspecific client selects the multi-peer chatting function and, in turn, achatting room, displayed on the screen in response to the functionselection, at step 142, then it proceeds to step 146 to send thecontents of chatting to users present in the selected chatting room. Inthis case, the specific client sends “chatting contents”, a “chatter ID”and a “chatting room number” to the server 30.

[0046] On the other hand, in the case where the specific client does notselect the displayed chatting room at the above step 142, it sends thecontents of chatting to all users connected to the server 30 at step144. In this case, the specific client sends “chatting contents” and a“chatter ID” to the server 30. At step 148, the server 30 determinesaccording to the presence or not of a “chatting room number” in receiveddata whether the current chatting mode is to send the chatting contentsto users present in the chatting room or to send the chatting contentsto all users connected thereto. Subsequently, the server 30 determineswhether receivers are online or offline, and then sends the chattingcontents to the receivers determined to be online. Through thisprocedure, each client can conduct the multi-peer chatting.

[0047]FIG. 15 is a flowchart illustrating the specific user accessdetection/call step in FIG. 2. For detection of access by a specificuser, a specific client first logs in to the server 30 at step 152. Inthis case, the server 30 analyzes a user ID and password of the specificclient logging in thereto at step 154 to determine whether the specificclient is a registered member. If the specific client is a registeredmember, the server 30 permits it user connection thereto and stores theuser ID in a log-in table at step 156. If the specific client requeststhe server 30 to detect access by a specific user, then the server 30searches the log-in table for data about the specific user at step 158and sends the searched data to the specific client at step 160.Thereafter, if there is a call command from the specific client to thespecific user at step 162, then the server 30 sends a message to acalled user, or the specific user, at step 164. As a result, the calleduser can respond to the call from the calling user, or the specificclient.

[0048]FIG. 16 is a flowchart illustrating the specific user receptiondenial step in FIG. 2. First, if a specific client selects a specificuser reception denial function in the initial menu picture shown in FIG.3, then the server 30 displays a picture to request the specific clientto register users to be denied reception, on the screen at step 172.Subsequently, if the specific client enters IDs (user names, avatars,etc.) of the reception denied users in the displayed picture, then theserver 30 registers the IDs of the reception denied users in a receptiondenied user table at step 174. Thereafter, upon receiving a message froma specific user at step 176, the server 30 searches the reception denieduser table at step 178 to determine whether the message sender wasregistered in the table. Upon determining at step 180 that the messagesender was registered in the reception denied user table, the server 30ends a specific user reception denial subroutine. However, in the casewhere it is determined at step 180 that the message sender was notregistered in the reception denied user table, the server 30 proceeds tostep 182 to transmit the message from the message sender to the messagereceiver, or the specific client.

[0049] As a result, each client can deny the reception of a message sentfrom a specific user.

[0050] As apparent from the above description, the present inventionprovides a multimedia communication method using a virtual worldinterface in mobile personal computers wherein a mobile personalcomputer is capable of readily transmitting or retrieving multimediadata using a virtual world interface and an instant messenger program,thereby enabling information to rapidly and accurately be exchanged atany time or place. Further, desired media data can conveniently betransmitted or retrieved by merely a clicking operation of a stylus penor a drag operation of a mouse without executing a multiplicity ofindividual programs for transmission and/or retrieval of different mediadata.

[0051] The present multimedia communication method is based on avatarand space concepts such that users, which are targets of a personalinformation inquiry function and other functions, can be distinguishedfrom other users according to the outer appearances of avatars as wellas text IDs, and users participating in chatting can dispose theiravatars in desired places in a virtual world and change the positions ofthe avatars during chatting. Further, in addition to text and voice,users can express actions with feelings through avatars, so that theycan more realistically and intimately chat with one another.

[0052] Although the preferred embodiments of the present invention havebeen disclosed for illustrative purposes, those skilled in the art willappreciate that various modifications, additions and substitutions arepossible, without departing from the scope and spirit of the inventionas disclosed in the accompanying claims.

What is claimed is:
 1. A method for communication of multimedia data ina mobile personal computer which includes a virtual world interface andan instant messenger program and is connected to a server over any oneof wired and wireless communication networks, said method comprising thesteps of: a) logging in to said server; b) displaying an initial menupicture on a screen of said mobile personal computer, said initial menupicture including a plurality of menu items for transmission orretrieval of the multimedia data; and c) performing a subroutineassociated with a selected one of said menu items in said initial menupicture to transmit or retrieve said multimedia data.
 2. The method asset forth in claim 1, wherein said menu items include an item forsending a file to a file transmit protocol server, a received mailchecking item, an avatar chatting item, a peer-to-peer chatting item, amail sending item, an item for directly sending a file to the otherparty, a multi-peer chatting item, a specific user access detection/callitem and a specific user reception denial item.
 3. The method as setforth in claim 2, wherein said step c) is adapted to, if said item forthe file sending to said file transmit protocol server is selected,perform a subroutine including the steps of: c-1) entering an address ofsaid file transmit protocol server, a user identification and a passwordto gain access to said file transmit protocol server; and c-2) selectinga desired file and sending it to said file transfer protocol server. 4.The method as set forth in claim 2, wherein said step c) is adapted to,if said received mail checking item is selected, perform a subroutineincluding the steps of: c-1) entering a user identification, a passwordand an address of a mail server to gain access to a server database; andc-2) reading and displaying message information from said serverdatabase.
 5. The method as set forth in claim 2, wherein said step c) isadapted to, if said avatar chatting item is selected, perform asubroutine including the steps of: c-1) selecting a desired avatar; andc-2) sending the contents of chatting to a client of the selectedavatar.
 6. The method as set forth in claim 5, wherein avatars of amultiplicity of clients are pre-registered in a database of said server.7. The method as set forth in claim 5, wherein said step c) includes thestep of additionally performing a subroutine associated with any one ofa slip sending item, a mail sending item, a direct file sending item andan item for file sending or reception to or from said file transferprotocol server after said avatar is selected.
 8. The method as setforth in claim 2, wherein said step c) is adapted to, if saidpeer-to-peer chatting item is selected, perform a subroutine includingthe steps of: c-1) setting up a chatting room; c-2) sending anidentification of the other party and a number of the set-up chattingroom; and c-3) chatting with a user present in said chatting room. 9.The method as set forth in claim 2, wherein said step c) is adapted to,if said mail sending item is selected, perform a subroutine includingthe steps of: c-1) entering information containing an address of a mailserver, a destination identification, a sender identification, a messagetitle and mail contents; and c-2) sending the entered information tosaid mail server.
 10. The method as set forth in claim 2, wherein saidstep c) is adapted to, if said item for the direct file sending to theother party is selected, perform a subroutine including the steps of:c-1) gaining access to said server and sending a destinationidentification and a file name to said server; and c-2) reading a filestored in said mobile personal computer and transmitting the read fileto a receiving terminal.
 11. The method as set forth in claim 2, whereinsaid step c) is adapted to, if said multi-peer chatting item isselected, perform a subroutine including the steps of: c-1) determiningwhether a chatting room has been selected; and c-2) sending the contentsof chatting to users present in the chatting room if said chatting roomhas been selected and to all users connected to said server if saidchatting room has not been selected.
 12. The method as set forth inclaim 2, wherein said step c) is adapted to, if said specific useraccess detection/call item is selected, perform a subroutine includingthe steps of: c-1) searching a log-in table for data about a specificuser in response to a specific user access detection request from saidmobile personal computer, said log-in table storing identifications ofusers connected to said server; c-2) sending the searched data to saidmobile personal computer; c-3) determining whether there is a callcommand from said mobile personal computer to said specific user; andc-4) sending a message to said specific user if there is the callcommand from said mobile personal computer.
 13. The method as set forthin claim 2, wherein said step c) is adapted to, if said specific userreception denial item is selected, perform a subroutine including thesteps of: c-1) requesting said mobile personal computer to registerusers to be denied reception; c-2) registering identifications of thereception denied users in a reception denied user table in said server;c-3) searching said reception denied user table upon receiving a messagefrom a specific user; and c-4) transmitting the message received fromsaid specific user to said mobile personal computer only when saidspecific user is not registered in said reception denied user table.