Systems and methods for managing a persistent virtual avatar with migrational ability

ABSTRACT

Systems and methods for managing a virtual avatar with migrational ability, and brokering information, are provided. The persistent avatar exists in a plurality of virtual environments and includes attributes generated by an attribute generator, an enabler for enabling virtual environments to access the stored attribute data, and a migrator for allowing the avatar to migrate from one virtual environment to another while the attributes of the persistent avatar remain substantially constant. The enabler utilizes at least one client based on protocol suite. Stored attribute data is modifiable by experiences in any virtual environment. User of the persistent avatar is notified when events occur in any virtual environment, or within real life, by monitoring for events with a monitor, assessing importance of the event with an assessor, and notifying the owner with an informer of the event if it exceeds a threshold of importance.

BACKGROUND OF THE INVENTION

The present invention relates to a system and method for managing apersistent virtual avatar, and more particularly a persistent virtualavatar that has the ability to migrate between virtual environments, andhave cross-membrane capacity. Such an avatar is useful in conjunctionwith Massively Multiplayer Online Games (MMOGs), virtual worlds, onlinesocial networks, virtual classrooms, virtual healthcare advice, andvirtual personal assistants. Currently most virtual environments arecompiled in a unique and specific language. The fact that the virtualworlds are disparate, with dissimilar native languages makes themovement of data from one virtual environment to another technicallydifficult.

As known to those skilled in the art, an avatar is a virtualrepresentation of an individual within a virtual environment. Avatarsoften include physical characteristics, statistical attributes,inventories, social relations, emotional representations, and weblogs(blogs) or other recorded historical data. Avatars may be human inappearance, but are not limited to any appearance constraints. Avatarsmay be personifications of a real world individual, such as a PlayerCharacter (PC) within a MMOG, or may be an artificial personality, suchas a Non-Player Character (NPC). Additional artificial personality typeavatars include personal assistants, guides, educators, answeringservers and information providers. Additionally, some avatars may havethe ability to be automated some of the time, and controlled by a humanat other times. Such Quasi-Player Characters (QPCs) may perform mundanetasks automatically, but more expensive human agents take over in casesof complex problems.

Avatars often are the products of much labor and effort by theirauthors, since they often provide a unique creative outlet for theauthor and self-expression. The avatar is a representation of theauthor, not simply a tool, and as such the author's desires and essenceis often reflected in the avatar. As a result, the author is oftenemotionally attached with her avatar, and great effort may be spentperfecting the Avatar's appearance, equipment, attributes andstatistics.

Currently, in most situations, an individual owns a personal avatar thatis capable of existing in one virtual environment. These virtualenvironments are typically hosted and maintained by companies.Additionally, these companies maintain an interface that allows theindividual to control her avatar within the virtual environment. Thisinterface utilizes the native language of the virtual environment.

Currently, the online realm is divided into three major categories:Massively Multiplayer Online Games, virtual social worlds, and webcommunities. In some instances the distinction between these virtualcategories may become blurred as certain virtual environments havecharacteristics of a combination of categories. Additionally, Real World(RW) data is increasingly being digitized and may bleed into thetraditional three categories as RW representations. Moreover,telecommunication devices may also be considered a medium for virtualtext-based environments. However, with the advances in cellular phone,Personal Digital Assistants (PDA) and BlackBerry devices these virtualenvironments may evolve significantly in the future.

The number of active subscribers to MMOGs is at least 10 million people.Each person pays $15 and up a month to play these games, and maybe andadditional 20 million people login occasionally. Estimates are thatplayers spent about $1 billion in real money in 2005 on virtual goodsand services for MMOGs combined. Moreover, at least 1.5 million peoplesubscribe to virtual worlds. In January, 2006, inside one such virtualsocial world, people spent nearly $5 million in some 4.2 milliontransactions buying or selling clothes, buildings, and the like.Moreover, participants in web communities number in the multiple tens ofmillions.

Often participants have accounts in multiple different virtualenvironments. And whereas the subscription to these various virtualenvironments may be enormous, there is little to no connectivity betweendifferent virtual environments; largely due in part to disparate nativelanguages and jealous territoriality by the virtual environmentsthemselves. A character in a MMOG is unable to make an appearance withina second MMOG, much less in a virtual social world. There is strong userpressure, however, to allow assets and information from one virtualenvironment into another virtual environment. Examples of this includethe emergence of weblogs, or blogs, discussing the exploits of a MMOGwithin a web community. Convergence describes this joining of virtualenvironments. Similarly, crossing the membrane, or cross-membrane,describes the movement of Real World data into a virtual environment,and vice versa.

The frontier of convergence and cross-membrane offers many possibilitiesfor mapping, exploring, and populating what is unknown territory. Giventhe effort put into the creation of avatars, and the emotionalattachments associated with them, it is logical that a paramount issueof convergence and cross-membrane will be the persistence of theseavatars between virtual environments. Such movement by an avatar betweenmultiple virtual environments is known as migration. Systems formanaging persistent avatars across virtual environments as they migratedo not currently exist.

Additionally, with the migration of avatars across virtual environmentsit will become necessary that the users' information is available to thenew environment. The avatar may be halted in her migration, and promptedfor the necessary information as migration occurs. However such a systemis not conducive to seamless migration between virtual environments. Assuch, a system of ranking the trust level of a specific virtualenvironment, and brokering user information dependent upon such a trustrank will be beneficial.

Lastly, a natural extension of migration will include the ability tomonitor all virtual environments, as well as the real world, for eventsthat the user would take interest in. The user may then be notified ofthe significant event regardless of the user's virtual or physicallocation.

It is therefore apparent that an urgent need exists for a system andmethod for managing virtual avatars that integrates the ability tomigrate between worlds, broker user information and containingcross-membrane capabilities. This system would be able to provide highlypersistent virtual personalities for personal and corporate use.

SUMMARY OF THE INVENTION

To achieve the foregoing and in accordance with the present invention,systems for managing a virtual avatar with migrational ability, andmethods for providing migration and managing the virtual avatar, andbrokering information, are provided. Such systems and methods are usefulfor providing a highly persistent virtual avatar with seamless migratoryabilities.

The persistent avatar may exist in a plurality of virtual environmentsand include attributes. The persistent avatar may be a character,non-player character, quasi-player character, agent, personal assistant,personality, guide, educator or representation. The plurality of virtualenvironments includes at least one of online games, social networks, webcommunities, shared simulations based on user-created content, andvirtual overlays on physical world data. The persistent avatar isassociated with a user.

The method and system for managing the persistent avatar includesenabling virtual environments to access the attributes. Additionally, byallowing multiple virtual environments to access the attributes theavatar may migrate from one virtual environment to another. An attributegenerator generates the attribute data. A preexisting avatar may be usedby the attribute generator to create the attribute data, orpre-selectable attributes may be used to generate the data from scratch.Attributes of the persistent avatar may include appearance, memories,personality, emotional attributes, intelligence attributes, physicalattributes, social attributes, and avatar statistics.

Any virtual environment is enabled to access the stored attribute data.An enabler is utilized to enable this access by decoding the attributes.The enabler utilizes at least one client based on protocol suite.Another virtual environment may then dynamically access the storedattribute data by utilizing the enabler. In such a fashion thepersistent avatar may migrate from the first virtual environment to thesecond virtual environment while the attributes of the persistent avatarremain substantially constant.

The attributes may be modified by experiences in any virtualenvironment. The enabler encodes data produced from experiences in thevirtual environment. The data is processed and modifies the attributes.

The user of the persistent avatar may be notified when events occur inany virtual environment or within real life. The method of notifying theuser may include monitoring for events, assessing importance of theevent, and notifying the user of the event if it exceeds a threshold ofimportance. The user's preferences, degree of impact on user, scope ofevent, duration of event, and degree of impact on user's social networkmay be queried in order to help assess the importance of the event. Theuser may be notified by sending a message to the persistent avatar if itis in use by the user, sending an electronic mail message to the user,sending an instant message to the user, and sending a short messageservice to the user. A monitor may be used for monitoring for events. Anassessor assesses the importance and an notifier notifies the user ofthe event.

Note that the various features of the present invention described abovemay be practiced alone or in combination. These and other features ofthe present invention will be described in more detail below in thedetailed description of the invention and in conjunction with thefollowing figures.

BRIEF DESCRIPTION OF THE DRAWINGS

In order that the present invention may be more clearly ascertained, oneembodiments will now be described, by way of example, with reference tothe accompanying drawings, in which:

FIG. 1A shows a schematic block diagram illustrating a persistent avatarmanagement system in accordance with an embodiments of the presentinvention;

FIG. 1B shows a functional block diagram of wide area networkapplication programming interfaces for the persistent avatar managementsystem of FIG. 1;

FIG. 2A shows a schematic block diagram of the virtual universe for thepersistent avatar management system of FIG. 1;

FIG. 2B shows a logical block diagram of virtual environments for thepersistent avatar management system of FIG. 1;

FIG. 2C shows a schematic block diagram of a virtual environment for thepersistent avatar management system of FIG. 1;

FIG. 2D shows a schematic block diagram of an avatar for the persistentavatar management system of FIG. 1;

FIG. 3 shows a logical block diagram of end user components for thepersistent avatar management system of FIG. 1;

FIG. 4A shows a functional block diagram of the server architecture forthe persistent avatar management system of FIG. 1;

FIG. 4B shows a functional block diagram of the functionality modulesfor the persistent avatar management system of FIG. 1;

FIG. 5 shows a functional block diagram of an enabler for the persistentavatar management system of FIG. 1;

FIG. 6 shows a flow chart illustrating the process for enabling avirtual environment through the enabler for the persistent avatarmanagement system of FIG. 1;

FIG. 7 shows a flow chart illustrating the process for avatar attributegeneration for the persistent avatar management system of FIG. 1;

FIG. 8 shows a logical block diagram of a user interface system for thepersistent avatar management system of FIG. 1;

FIG. 9 shows a logical block diagram of author tools for the persistentavatar management system of FIG. 1;

FIG. 10 shows a functional block diagram of an avatar testing module forthe persistent avatar management system of FIG. 1;

FIG. 11 shows a functional block diagram of an avatar editor for thepersistent avatar management system of FIG. 1;

FIG. 12 shows a flow chart illustrating the process for editing anavatar for the persistent avatar management system of FIG. 1;

FIG. 13 shows a flow chart illustrating the process for editing theappearance of an avatar for the persistent avatar management system ofFIG. 1;

FIG. 14 shows a flow chart illustrating the process for editing thebackstory of an avatar for the persistent avatar management system ofFIG. 1;

FIG. 15 shows a flow chart illustrating the process for editing theemotional disposition of an avatar for the persistent avatar managementsystem of FIG. 1;

FIG. 16 shows a flow chart illustrating the process for editing theanimation of an avatar for the persistent avatar management system ofFIG. 1;

FIG. 17 shows a flow chart illustrating the process for editing thepersonality rules of an avatar for the persistent avatar managementsystem of FIG. 1;

FIG. 18 shows a logical block diagram of user interactions with aninformation broker in accordance with an embodiment of the presentinvention;

FIG. 19 shows a logical block diagram of the information brokering inaccordance with an embodiment of the present invention;

FIG. 20 shows a flow chart illustrating the process for user informationbrokering for the information broker of FIG. 18; and

FIG. 21 shows a flow chart illustrating the process for eventnotification in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

The present invention will now be described in detail with reference toseveral embodiments thereof as illustrated in the accompanying drawings.In the following description, numerous specific details are set forth inorder to provide a thorough understanding of the present invention. Itwill be apparent, however, to one skilled in the art, that the presentinvention may be practiced without some or all of these specificdetails. In other instances, well known process steps and/or structureshave not been described in detail in order to not unnecessarily obscurethe present invention. The features and advantages of the presentinvention may be better understood with reference to the drawings anddiscussions that follow.

The present invention relates to systems and methods for managingpersistent virtual avatars, and more particularly persistent virtualavatars that have the ability to migrate, and have cross-membranecapacity. Such avatars are useful in conjunction with MassivelyMultiplayer Online Games (MMOGs), virtual social worlds and online webcommunities, generically referred to as “virtual environments”. Allvirtual environments may be collectively referred to as the “virtualuniverse”. A persistent avatar may be a character, non-player character,quasi-player character, agent, personal assistant, personality, guide,representation, educator or any additional virtual entity that requirespersistence between virtual environments. In a society of everincreasing reliance and blending between real life and our virtuallives, the ability to migrate seamlessly between virtual environmentswith a substantially constant set of attributes is highly desirable andadvantageous.

To facilitate discussion, FIG. 1A shows a schematic block diagram 100illustrating a persistent avatar management system in accordance with anembodiment of the present invention. A Wide Area Network (WAN) 101provides a medium for all other components to communicate and haveaccess to one another. In some embodiments the WAN 101 may be theInternet, however any WAN may be used as is known by those skilled inthe art. Network connections are made through 10/100/1000 Megabit/secEthernet cable, although other network wiring technologies, such as highspeed optical cable, may also be used. Additionally, Wireless meshnetworks may also be used to couple wired networks, network devices, oraccess points, as is well known by those skilled in the art.

Virtual Universe 110 is coupled to the WAN 101 for access by theCustomers 130. The term Customers 130 includes users who use thepersistent avatar, and owners who own the persistent avatars. In someembodiments the user of a particular avatar may also be the Avatar'sowner. Alternatively, the owner and the user may be separateindividuals. Moreover, the user and owner may include multipleindividuals or organizations, such as a corporation. In someembodiments, some or all of these permutations of user and owner mayconstitute the Customers 130. The Virtual Universe 110 may be accessedby the persistent avatars. Once accessed, the persistent avatar mayengage in the Virtual Universe 110 in at least all capacities that anative avatar is able. Additionally, the persistent avatar maycommunicate with other virtual environments within the Virtual Universe110, or with the real world.

In some embodiments, an Availability Monitor 140 also may couple to theWAN 101. The Availability Monitor 140 may provide constant monitoring ofcritical services for troubleshooting and downtime reduction purposes.In many cases, the Availability Monitor 140 may be located in manydifferent geographical locations, so that a “triangulation” of serviceavailability problems may be preformed.

A Network Operation Center (NOC) 120 includes at least one Public Server121 coupled to an Internal Server 124 through a Firewall 123. TheInternal Server 124 may couple to a Local Area Network (LAN) 125. TheFirewall 123 limits assess by Customers 130 and unauthorized partiesinto the LAN 125. Additionally, communication between the Public Server121 and the Internal Server 124 through the Firewall 123 may utilizeNetwork Address Translation (NAT) as is well known by those skilled inthe art. Public Server 121, Firewall 123 and Internal Server 124 may beseparate physical entities. Alternatively, the Public Server 121,Firewall 123 and Internal Server 124 may be housed within a singleserver. Additionally, Database 122 is coupled to the LAN 125. TheDatabase 122 may include customer account information, persistent avatarattribute data and avatar conversational data for data mining. Due tothe vast amount of avatar data within the Database 122 a data managementsystem for infrequently accessed information may be utilized to increaseDatabase 122 performance. Additional components may be coupled to theLAN 125 that are not shown. These components may include printers,additional databases, additional servers, telephone networks, fax,routers or other network devices.

The NOC 120 may be in a single location, however in some embodiments theNOC 120 may be distributed over multiple locations for increasedreliability and efficiency, and reduced vulnerability to NOC 120disruption and disaster.

The Public Server 121 couples the NOC 120 to the WAN 101. Additionally,in some embodiments, a Merchant Processing 150 and Offsite Backup 160may independently couple to the Public Server 121. Alternatively,Merchant Processing 150 and Offsite Backup 160 may couple to the PublicServer 121 through the WAN 101. Due to the variability of viablecurrencies existing within Virtual Universe 110 Merchant Processing 150allows payment through unconventional means, thus increasing theavailable Customers 130 base. Examples of unconventional paymentsavailable through Merchant Processing 150 include, but are not limitedto, PayPal, Linden Dollars and Google Checkout.

Offsite Backup 160 provides for operational data to be store in a safemeans. In some embodiments, Offsite Backup 160 may include a thirdparty. Offsite Backup 160 may include, but is not limited to disk imagesfor each kind of server configuration, source code repositories,customized third-party software on intranet, database contents, emailarchives and server logs. A server state (web sites, customer services,etc.) may be recovered from Offsite Backup 160. Offsite Backup 160 actsas an insurance against disaster or other NOC 120 disruptions.

In some embodiments, the NOC 120 may access multiple WAN ApplicationProgramming Interfaces (APIs), 170 a, 170 b through 170 r, that may becoupled to the WAN 101. The WAN APIs 170 a, 170 b to 170 rfunctionalities may then be integrated into the persistent avatarscapabilities.

FIG. 1B shows a functional block diagram of an exemplary Wide AreaNetwork Application Programming Interface 170 a for the persistentavatar management system of FIG. 1. Possible WAN API 170 a includedwithin avatar capabilities includes Search Engines 171, References andResearch Tools 172, Social Networking Tools 173, Product Lookup andRecommendations 174, and Calendars or Planners 175. The illustratedcategories of WAN APIs 170 a, 170 b to 170 r listed is not an exhaustivelist, however. Additionally, different WAN APIs 170 a, 170 b to 170 rmay be provided to different Customers 130. In some embodiments theCustomers 130 may be able to choose the WAN APIs 170 a, 170 b to 170 rintegrated into the persistent Avatar's capabilities. Moreover, in someembodiments, the WAN API 170 a may only be accessible to the persistentavatar when the avatar is within particular Virtual Environment 211 b.

FIG. 2A shows a schematic block diagram of the Virtual Universe 110 forthe persistent avatar management system of FIG. 1. The Virtual Universe110 may be broken down into five subcategories: Virtual Overlays of RealWorld Data 201, WEB Communities 202, Massively Multiplayer Online Games(MMOGs) 203, Social Worlds 204, and Telecom 205. Examples of VirtualOverlays of Real World Data 201 include, but are not limited to, GoogleEarth and Microsoft Flight Simulator X. Examples of WEB Communities 202include, but are not limited to, YouTube and MySpace. Examples of MMOGs203 include, but are not limited to, World of Warcraft, Guild Wars andHive. Examples of Social Worlds 204 include, but are not limited to,Second Life and Neopets. Examples of Telecom 205 include, but are notlimited to, cell phones, BlackBerry Devices and Personal DigitalAssistants (PDA). Additional subcategories may exist, or may emerge withnew technology. It is intended that these additional subcategories beincorporated into the Virtual Universe 110. The NOC 120 is coupled tothe subcategories of the Virtual Universe 110 through the WAN 101.

A logical block diagram of the Virtual Universe 110 is shown in FIG. 2B.Each Virtual Environments 211 a, 211 b to 211 x, 212 a, 212 b to 212 y,213 a, 213 b to 213 z, 214 a, 214 b to 214 m, 215 a, 215 b to 215 n iscoupled to the WAN 101. Each subcategory, Virtual Overlays of Real WorldData 201, WEB Communities 202, MMOGs 203, and Social Worlds 204, andTelecom 205, may include multiple Virtual Environments 211 a to 215 n.Moreover, some Virtual Environments 211 a to 215 n may be hybrids ofthese subcategories. Thus, while the line between specific subcategoriesmay become increasingly indistinct, the boundaries between individualVirtual Environments 211 a to 215 n are distinct and nearly impassable.Occasionally, the Virtual Overlays of Real World Data 201 have providedsome connectivity between Virtual Environments 211 a to 215 n as shownin FIG. 3; however this connectivity is limited in scope. The NOC 120,on the other hand, is able to access all the Virtual Environments 211 ato 215 n thereby providing a bridging mechanism to allow for persistentavatars to migrate from any Virtual Environment 211 b to another VirtualEnvironment 211 b.

A logical block diagram of an exemplary Virtual Environment 211 b isshown in FIG. 2C. Within each Virtual Environment 211 b exists anEnabler 231. The Enabler 231 allows for Persistent Avatar 221 a, 221 bto 221 t to access the WAN 101, and eventually the NOC 120. In someembodiments, each Virtual Environment 211 b has a corresponding Enabler231. However, any number of Persistent Avatars 221 a to 221 t may existwithin a Virtual Environment 211 b at any given time. Additionally, dueto the migratory nature of the Persistent Avatars 221 a to 221 t, thenumber of Avatars 221 a to 221 t within the Virtual Environments 211 bis in flux.

An logical block diagram of an exemplary Persistent Avatar 221 a isshown in FIG. 2D. In some embodiments, Persistent Avatar 221 a mayinclude Physical Attributes 241, Intellectual Attributes 242 andEmotional Attributes 243. Physical Attributes 241 may include Avatar's221 a physical statistics, such as strength, and appearance data.Intellectual Attributes 242 may include the Avatar's 221 a backstory,history and memory. Emotional Attributes 243 may include the Avatar's221 a emotional disposition, and reaction and response algorithms.

FIG. 3 shows a logical block diagram of End User Components 330 a, 330 bto 330 p for the persistent avatar management system of FIG. 1. Eachcustomer of the Customers 130 includes an End User Component 330. Insome embodiments, the End User Components 330 a, 330 b to 330 p includesAuthor Tools 332 a, 332 b to 332 p, respectively, that are coupled tothe WAN 101 through Customer Interface 331 a, 331 b to 331 p,respectively. The Author Tools 332 a to 332 p provides user managementof the Persistent Avatar 221 a. In some embodiments, each Customer 130may own or use multiple Persistent Avatars 221 a to 221 t.

FIG. 4A shows a functional block diagram of the server architecture forthe persistent avatar management system of FIG. 1. In some embodiments,Server 121 includes an Application Framework 422, User Accounts 424,multiple Functionality Modules 426 a, 426 b to 426 q and a PersistenceLayer 428. The Application Framework 422 integrates and unifies ServiceOriented Architecture (SOA) technologies. User Accounts 424 providesback access to the Customer Interfaces 330. The Persistence Layer 428provides object/relational persistence and query service. TheFunctionality Modules 426 a to 426 q provide additional functionalcomponents for NOC 120 driven Persistent Avatars 221 a to 221 t.

FIG. 4B shows a functional block diagram of exemplary FunctionalityModules 426 a for the persistent avatar management system of FIG. 1. Insome embodiments, Functionality Modules 426 a include a DiscoveryFunctionality 401, a Reporting Functionality 402, a Planner andScheduler 403, a Language Functionality 404, Emulators 405, a RenderingEngine 406, and a Procedural Degradation 407. The illustratedFunctionality Modules 426 a is not an exhaustive list, however, andadditional Functionality Modules 426 a to 426 q may be incorporated asneed dictates. The Discovery Functionality 401 provides text datamining, simulations and evolving algorithms. The Reporting Functionality402 may include reporting usage, revenues, security attacks and similarstatistically significant data. The Planner and Scheduler 403 maydetermine a sequence of actions, wherein the actions are relatedactivities, and then coordinates the timing for the actions. In someembodiments these functions may be externalized when Avatar 221 a servesas a “personal assistant”. For example, Avatar 221 a takes someresponsibilities for planning the owner's schedule, such as for callsand appointments. The Language Functionality 404 includes grammaticalparsing, statistical parsing and subsequent emotional assessment of textdialog. The Emulators 405 provide the ability to emulate correspondingVirtual Environments 211 a to 215 n. In some embodiments, the Emulators405 may simulate the area most local to the Avatar 221 a and basedecisions on the approximations generated by the simulation. TheRendering Engine 406 provides the ability to render Persistent Avatars'221 a to 221 t appearance. The Procedural Degradation 407 matches thelevel of rendering to the capabilities of the target Virtual Environment211 b. Procedural Degradation 407 may drive the Rendering Engine 406.Each Virtual Environment 211 b tends to have its own unique set offeatures and limitations. For example, a model used to generate the“physical embodiments” of Avatar 221 a may render as 3D with facialexpression in one Virtual Environment 211 b, but may need to be renderedas a 2D image for use as Avatar 221 a in another of Virtual Environments211 a to 215 n.

FIG. 5 shows a functional block diagram of the Enabler 231 for thepersistent avatar management system of FIG. 1. The Enabler 231 includesa Client 510 that utilize a Protocol Suite 520. In some embodiments, theProtocol Suit 520 includes protocols such as XML-RPC 521, HTTP/HTTPS522, XMPP 523, SMS 524, WAP 525, SMTP 526, XML Socket 527, and ProtocolX 528. Protocol X 528 may include any additional protocols as theybecome advantageous to include within the Protocol Suite 520. In someembodiments the Enabler 231 is platform dependent, and uses nativelanguage of the Virtual Environments 211 a to 215 n. Client 510 may be athin client module. Depending on the implementation, the Client 510 maybe a thick client. Enabler 231 may be limited as to avoid the risk ofbeing locked into any particular Virtual Environment 211 b. Dependentupon implementation.

The Enabler 231 may exist within the Virtual Environments 211 a to 215 nas either integrated software, or as independent hardware. In someembodiments, the Enabler 231 may exist within the NOC 120. In alternateembodiments, the Enabler 231 may exist with the Customers 130. In theseembodiments the Customers 130 may additionally include the Database 122and Server 121 thereby circumventing the need for any centralized NOC120.

FIG. 6 shows a flow chart illustrating the process 600 for enabling aVirtual Environment 211 b through the Enabler 231. In this process theEnabler 231 encodes current conversation, position, owner credentials,attribute data and any other data necessary to drive the Avatars 221 ato 221 t, into a transaction request for use by the Server 121 at step601. In some embodiments, the encoding takes place within the VirtualEnvironment 211 b that the Avatar 221 a is located.

In step 602 the Virtual Environment 211 b sends the transaction requestover the WAN 101 to the Server 121.

In step 603 the Server 121 processes the encoded data for language,emotion, animation, planning, and movement and attribute changes. TheServer 121 may then make modifications to the avatars 221 a attributedata.

In step 604 the Virtual Environment 211 b receives the response to thetransaction request over the WAN 101 from the Server 121.

In step 605 the Enabler 510 decodes response from the server to driveconversation, movement, actions or animations.

In step 606 the Persistent Avatar 221 a in the Virtual Environment 211 btalks, moves, acts or gestures.

FIG. 7 shows a flow chart illustrating the process 700 for Avatar 221 aattribute generation. In some embodiments, attributes may includePhysical Attributes 241, Intellectual Attributes 242 and EmotionalAttributes 243. In this process a determination is made whether the useris new at step 701. If the user is not new she/he will be required tologin at step 703. In some embodiments user credentials may be requiredto login, typically with a username and password. Of course alternatemethods of authenticating user may be utilized as is well known by thoseskilled in the art. At step 704, a determination is made whether tocreate a new avatar. If no new avatar is being created the VirtualEnvironments 211 a to 215 n receives the user information and data for apreexisting avatar from over the WAN 101 from the Server 121 at step710. Then proceed to step 711 below.

Otherwise if a new avatar is created then a determination is madewhether the Avatar 221 a attributes will be from an avatar already inexistence in one of the Virtual Environments 211 a to 215 n, at step705. If the Avatar 221 a is not from a preexisting avatar then the newAvatar 221 a will be built from scratch, at step 706. Then, the VirtualEnvironment 211 b receives the user information and data for the newlycreated Avatar 221 a from over the WAN 101 from the Server 121 at step710. Then proceed to step 711 below.

Else, if the new Avatar 221 a is from a preexisting avatar then Enabler510 encodes the avatar's data from the Virtual Environment 211 b forimporting to Server 121, at step 707. Then, in step 708, the avatar datais imported to the Server 121. In step 709, the imported avatar data maybe used to create the new Avatar 221 a. Then, the Virtual Environment211 b receives the user information and data for the newly createdAvatar 221 a from over the WAN 101 from the Server 121 at step 710. Thenproceed to step 711 below.

If in step 701 the user is a new user then the user registers in step702. Registration may include generating a username and password. Thenan Avatar 221 a is created. A determination is made whether the newAvatar 221 a attributes will be from an avatar already in existence in aVirtual Environment 211 b, at step 705. If the new Avatar 221 a is notfrom a preexisting avatar then the new Avatar 221 a will be built fromscratch, at step 706. Then, the Virtual Environment 211 b receives theuser information and data for the newly created Avatar 221 a from overthe WAN 101 from the Server 121 at step 710. Then proceed to step 711below.

Else, if the new Avatar 221 a is from a preexisting avatar then Enabler510 encodes the avatar data from the Virtual Environment 211 b forimporting to Server 121, at step 707. Then, in step 708, the avatar datais imported to the Server 121. In step 709, the imported avatar data maybe used to create the new Avatar 221 a. Then, the Virtual Environment211 b receives the user information and data for the newly createdAvatar 221 a from over the WAN 101 from the Server 121 at step 710.

At step 711 the Enabler 510 decodes the data and logs the Avatar 221 ainto the Virtual Environment 211 b. The Avatar 221 a incurs experienceswithin the Virtual Environment 211 b which may result in changes made tothe Avatar 221 a. At step 712 the experiences within Virtual Environment211 b modify Avatar 221 a data. In step 713 the enabler encodes theAvatar 221 a data, including the modifications, for storage on theServer 121. In step 714 the Virtual Environment sends the Avatar 221 ato 215 n data over the WAN 101 to the Server 121. The Server 121 thenstores the Avatar 221 a data, thereby incorporating changes made to theAvatar 221 a within the Virtual Environment 211 b.

FIG. 8 shows a logical block diagram of an exemplary Customer Interface331 a for the persistent avatar management system of FIG. 1. AnInitializer 801 is coupled to Login Module 811. Login 811 is included ina User Module 810. User Module 810 includes functionality such asPassword Restorer 812, Registrar 813, User Preferences 814, and UserDirector 820. Login 811 is coupled to the Password Restorer 812 andchange Registration 813 information and Main Module 800. Registration813 is coupled with Main 800 and User Preferences 814. Main Module 800is coupled to Login 811, Registration 813, User Preferences 814, UserDirector 820, Forum Module 830, Blog Module 840, Support Module 850 andAvatar Development Module 860 via the Avatar Module 862.

The User Director 820 includes a User Administrator 821 which in turnincludes User Manager 822, and User Parameters 823. User Parameters 823is coupled to the User Administration Main 821. The User Director 820module allows for management of users and the parameters of each user.For instance a particular one of Customers 130 may have multiple users;however, certain Virtual Environments 211 a to 215 n may be accessibleto a subset of the users.

The Forum Module 830 may provide access to forums to enhancecommunication. The Forum Module 830 may include forum search ability,the ability to view forums and archive forum discussions.

The Blog Module 840 provides a web log history of the Avatar's 221 aactions and conversations. The Blog Module 840 may include searchingcapabilities, viewing capabilities, and the ability to edit or deletethe conversational histories of the Avatar 221 a.

The Support Module 850 may include the ability to request support,search support inquiries by other users, view resolutions to commonproblems and troubleshoot.

The Avatar Development Module 860 includes Avatar Module 862, AvatarViewer 861, Avatar Testing Module 870, and an Avatar Redactor 880. TheAvatar Module 862 includes Avatar Manager 863 and Avatar Navigator 864.Avatar Testing Module 870 includes manual Avatar Driver 871 and AvatarMonitor 872. The Avatar Redactor 880 includes an Avatar Creator 881, anAvatar Editor 882, Visualization Editor 883, Intellectual Editor 884 andan Emotional Editor 885. The Avatar Redactor 880 includes the ability tocreate, edit, copy, review and manage one or more Persistent Avatars 221a to 221 t.

The Avatar Module 862 couples with Avatar Viewer 861, manual AvatarDriver 871, Avatar Monitor 872, Avatar Creator 881, and the AvatarRedactor 880 via the Avatar Creator 881 and Avatar Editor 882. TheAvatar Editor 882 couples with the Visualization Editor 883,Intellectual Editor 884 and Emotional Editor 885. The layout andstructure of the Customer Interface 331 a is of course not limited bythe embodiments aforementioned. Alternate interface designs may beutilized as desired.

FIG. 9 shows a logical block diagram of an exemplary Author Tools 332 afor the persistent avatar management system of FIG. 1. Three user rolesexist: Common Users 900 or simply “User”, Administrators 901 and Authors902. Users 900 are coupled to Avatar Navigator 864. Administrators 901and Authors 902 may become Users 900. Conversely, under properconditions a User 900 may become an Administrator 901 or Author 902.

Administrators 901 are power users who may administrate work of mainCustomer Interface 331 a functions. For example Administrators 901 maycreate arbitrator for forums within the Forum Module 830, and approvingof registration new users. Administrators 901 are coupled to WAN Manager903 and Avatar Manager 863. Avatar Manager 863 includes the ability toChange Avatar's Owner 905 and Avatar Lock 907. Avatar Manager 863 hasdirect effects upon Avatar Navigator 864.

Authors 902 are users who are involved in process of Avatar 221 adevelopment (narrations writing, Avatar 221 a knowledgebase filling,drawing, etc.). Author 902 has access to Blog Module 840 as well. Insome embodiments, the Author 902 encapsulates two classes: corporatecustomer and end-user. There may be a difference between the two for thefeature sets enabled in the Avatar Redactor 880. For example corporatecustomer includes game designer at a companies and would include lessbreadth of feature sets but more depth. An example of end-user includesan individual with a MySpace account who requires more breadth offeature sets but less depth. Authors 902 have access to New AvatarCreator 881, Avatar Eliminator 909, utilize Train Wizard 908, accessAvatar Testing Module 870 and Avatar Editor 882. The Train Wizard 908may be an advanced feature that utilizes a “wizard”, wherein the wizardis a guided set of dialog windows with embedded help, to guide the userthrough an initial experience of creating rules for the Avatar 221 a. Insome embodiments, an example of interaction may then be shown in thesame window as the rules editor, thereby allowing convenient training.Such a feature may be valuable to less experienced users.

FIG. 10 shows a functional block diagram of one embodiment of AvatarTesting Module 870 for the persistent avatar management system ofFIG. 1. The Avatar Testing Module 870 may include a manual Avatar Driver871, Avatar Monitor 872, and Avatar Debugger 1000. Avatar Debugger 1000utilizes information from manual Avatar Driver 871 and Avatar Monitor872 to debug an Avatar 221 a. In some embodiments, debugging an Avatar221 a may include monitoring Avatar's 221 a reactions, movements,interactions, gestures and expressions for believability. In alternateembodiments, believability may not be the desired end result, in whichcase the Avatar 221 a may be monitored for some alternate behavioral,movement and reactionary criteria. Minor alterations to the Avatar's 221a attributes may then be implemented to ensure greater compliance to thedesired behavioral, movement and reactionary criteria.

FIG. 11 shows a functional block diagram of the Avatar Editor 882included in Avatar Redactor 880. Avatar Editor 882 function may becoupled to Visualization Editor 883, Intellectual Editor 884 andEmotional Editor 885. Visualization Editor 883 may be coupled toAnimation Editor 1130 and Appearance Editor 1135. Animation Editor 1130may be coupled to Generic Animator 1131, Animation Adjustor 1132,Animation Up-loader 1133 and Animation Selector 1134. Appearance Editor1135 may be coupled to Body Editor 1136 and Accessories Editor 1137.

Intellectual Editor 884 may be coupled to Background Editor 1143 andPersonalizer 1140. Background Editor 1143 may be coupled to NarrationGenerator 1144, Generic Intellectual Background Appointer 1146,Concept-Map Generator 1147 and Narration Parser 1148. In someembodiments a concept-map is a graphical representation of a narrativerepresented by “concepts”. Narration Generator 1144 may be coupled toBackstory Generator 1145. Personalizer 1140 may be coupled to “Rule Map”Editor 1141 and Asset Associator 1142. A Rule Map includes aninteractive graphic of the rules, how they are connected, which rulesare used more often than the others.

Emotional Editor 885 may be coupled to Generic Emotional State Appointer1150, Emotions Adder 1151 and Individual Emotions Editor 1152.Additional aspects of the Avatar 221 a may become editable as Avatar 221a complexity increases. It is intended that these additional editingfunctions become incorporated into the Avatar Editor 882. Additionally,in some embodiments it may be advantageous to have fewer editingfunctions for simplicity or cost versus benefit reasons.

FIG. 12 shows a flow chart 1200 illustrating the process for editing theAvatar 221 a for the persistent avatar management system of FIG. 1. Inthis process, the Avatar's 221 a appearance is edited at step 1201. Thenthe Avatar's 221 a intellectual attributes are edited in step 1202. Instep 1203, the Avatar's 221 a emotional disposition is edited. In step1204, the Avatar's 221 a animation library is customized. Lastly, instep 1205, the Avatar 221 a is personalized.

FIG. 13 shows a flow chart 1201 illustrating the process for editing theAvatar's 221 a appearance within the Avatar Editor 882. In this processthe Avatar's 221 a body is edited at step 1301. Then, in step 1302, theaccessories are edited. After completion the process returns to step1202 of FIG. 12.

Three methods of generating multi-dimensional computer graphics can beutilized by system 100. The first method is to manually input data,either by typing on a keyboard or using a Graphical User Interface (GUI)such as a tablet, a joystick and/or a mouse. This can be tedious, butprecise, and generally looks esthetically pleasing. The second method isto use 3D scanning technology to enter data which is fast, precise,esthetically pleasing, but is often quite expensive since it requires a3D scanner. The third method is the use of algorithms which generatemodels from pre-existing formula, position sets, or other data thatdictates the position of the geometry, then doing some variable on that,or even creating it from the ground up. This method, once built, isquite fast, precise, and inexpensive, but may result in distribution ofpotential errors. Accordingly one, all, or a combination of thesemethods may be utilized to create dimensional computer graphics for usein the process 1201 of editing the Avatar's 221 a appearance.

In some embodiments, template-sets are built that articulate several‘common’ anthropomorphic configurations. This template contains all thefeatures of a numerically average human. The proportions of the nose,arms, posture, and other visual features are built to an average formale, female, and neuter models. This is done for mesomorph, ectomorph,and endomorph body types. This provides nine templates from which towork from. The nine base templates may be edited so that any smalladjustments are made to ensure a high quality model of nearly-perfectappearance. The model may be custom-tailored to specific desires offacial or body features. The user may engage in an editing process withone of the nine templates which, when completed, creates a model thatvery closely approximates the user's desired appearance.

In some embodiments, an alternate production path may be desired. Manygamers and developers will have already built models of Avatars 221 a to221 t that they enjoy, and it is desirous to allow them to reuse thesemodels as they may already have an Avatar 221 a whose attributes aredesired. The user may also want to imbue the Avatar 221 a with emotionand intellect.

Polygons can also be used for generating multi-dimensional graphicalrepresentations. However, while polygons may be subdivided and reduced,the presence of edges generally makes calculation that changes visualresolution complicated, if at all workable. Therefore, in someembodiments, the method of representing geometry may be indefinitelydetailed as visual resolution is altered, and still be sufficientlylight as to be transportable over a WAN 101. Examples of this kind of 3Drepresentation method include Metaballs, and NURBs (Nonuniform rationalB-splines).

FIG. 14 shows a flow chart 1202 illustrating the process for Editing theBackstory 1145 of an Avatar 221 a within the Avatar Editor 882. In thisprocess a determination to use a generic template is made in step 1400.If a generic template will be used, a generic intellectual template isgenerated in step 1401. The personality is then evaluated through chatin step 1406. After completion the process returns to step 1203 of FIG.12. Else, if a generic template will not be used, a backstory is writtenin natural language in step 1402. Then, in step 1403, the backstory isparsed into its conceptual elements. These conceptual elements are thenorganized in a grid concept-map, in step 1404. In step 1405 theconcept-map is edited. The personality is then evaluated through chat instep 1406. After completion the process returns to step 1203 of FIG. 12.

FIG. 15 shows a flow chart 1203 illustrating the process for editing theemotional disposition of an Avatar 221 a within the Avatar Editor 882.In this process a general emotional personality template is selected instep 1501. Then, in step 1502, individual emotions are edited with aslider and fuzzy set. In step 1500, a determination is made to addspecific emotions. Then, if determined so, specific emotions are addedin step 1503. After completion the process returns to step 1204 of FIG.12. Else if no specific emotions are added the process returns to step1204 of FIG. 12.

FIG. 16 shows a flow chart 1204 illustrating the process for editing theanimation of an Avatar 221 a within the Avatar Editor 882. In thisprocess a generic animation template is selected in step 1601. In step1600, a determination is made whether to upload animation. Then, ifdetermined so, animation may be uploaded in step 1602. In step 1603,animations are edited within the animation editor. After completion theprocess returns to step 1205 of FIG. 12. Else if no animations areuploaded, animations are edited within the animation editor in step1603. After completion the process returns to step 1205 of FIG. 12.

FIG. 17 shows a flow chart 1205 illustrating the process for editing thepersonality rules of an Avatar 221 a within the Avatar Editor 882. Inthis process rules within the Rule Map to be modified are selected instep 1701. Then, in step 1702, assets are associated within the ruleeditor.

FIG. 18 shows a logical block diagram 1800 of User 900 interacting withan Information Broker 1802 in accordance with an embodiment of thepresent invention. In some embodiments, the Information Broker 1802 is avariety of Persistent Avatar 221 a that acts as a personal assistant tobroker trust and personal information as the User 900 navigates throughmultiple Virtual Environments 211 a to 211 c with a separate PersistentAvatar 221 a. Multiple Virtual Environments 211 a to 211 c may includeany number of additional Virtual Environments 211 a to 215 n.Alternatively, in some embodiments the Information Broker 1802 may be acomponent of the Persistent Avatar 221 a that User 900 uses to navigatethe Virtual Environments 211 a to 214 c. In some embodiments theInformation Broker 1802 may have no physical representation, and theUser 900 may not realize when the Information Broker 1802 is active.Alternatively, the Information Broker 1802 may be a more tangible aspectof the User's 900 virtual exploration.

The User 900 accesses Virtual Environments 211 a to 211 c through theInformation Broker 1802, a browser 1803 and the WAN 101. In someembodiments, some or all of the Virtual Environments 211 a to 211 crequire personal information about the User 900 to provide access orfull functionality. Thus, every time the User's 900 Avatar 221 amigrates from one Virtual Environment 211 a to 211 c to another the User900 is prompted to provide information before the migration may becompleted. This repetitive prompting may seriously disrupt User's 900migration from one Virtual Environment 211 a to 211 c to another. TheInformation Broker 1802 makes decisions based upon trust levels for eachVirtual Environment 211 a to 211 c and brokers personal informationaccordingly in order to make migration more seamless, yet still maintaina high level of security with personal information.

FIG. 19 shows a logical block diagram of the Information Broker 1802 ofFIG. 18. Personal Data Access Broker 1920 includes Virtual EnvironmentIdentity Authenticator 1930 and User and Avatar Relationship Manager1910. Virtual Environment Identity Authenticator 1930 is very importantsince the level of trust provided any particular Virtual Environment 211b is entirely dependent upon that Virtual Environment's 211 a to 215 nidentity. Subsequently, accurate data is imperative to secure Brokeringof Access to Personal Information 1920. The User and Avatar RelationshipManager 1910 provides the User's 900 comfort level, preferences, trustand habits. The trustworthiness of a Virtual Environment 211 b is thenbalanced by the User's 900 trust to determine the extent of informationaccess.

FIG. 20 shows a flow chart 2020 illustrating the process for PersonalInformation Access Broker 1920 for the Information Broker 1802 of FIG.18. In this process the Virtual Environment 211 b is ranked by trust instep 2021. In some embodiments, this ranking by trust takes into accountthe identity of the Virtual Environment 211 b, the User's 900 previoustrust for the particular Virtual Environment 211 b or similar VirtualEnvironments 211 a to 215 n, public knowledge of the trustworthiness ofthe Virtual Environment 211 b, and the User's 900 natural trust levels.In some embodiments, additional statistical and preferential informationmay be utilized in order to determine a trust ranking. In step 2022, adetermination is made if the Virtual Environment 211 b is fully trusted.If the Virtual Environment 211 b is fully trusted the Information Broker1802 provides full access to the User's 900 available personalinformation in step 2023.

Else if the Virtual Environment 211 b is not fully trusted, adetermination is made if the Virtual Environment 211 b is intermediatelytrusted in step 2024. If the Virtual Environment 211 b is intermediatelytrusted, the Information Broker 1802 may provide a limited access topersonal information in step 2025. Limited access may be regulated bycomparing the level of trust in the Virtual Environment 211 b, asdetermined in step 2021, compared to the sensitivity of the personalinformation. Alternatively, the User's 900 preferences may augment, orsupplant, the sensitivity of the personal information for purposes ofregulating limited access to personal information.

Else, if the Virtual Environment 211 b is not intermediately trusted,the Information Broker 1802 may restrict access to personal informationin step 2026.

FIG. 21 is a flow chart 2100 illustrating the process for EventNotification in accordance with an embodiment of the present invention.In this process an event occurs within a Virtual Environment 211 b orwithin the Real World in step 1201. Examples of an event may include aresponse to a forum comment, a guild raid in a MMOG 203, a swing in theNew York Stock Exchange, or any other event. Events are monitored forwithin Virtual Environments 211 a to 215 n and WAN APIs 170 a, 170 b to170 r. In step 2102, a determination is made as to whether the event isimportant. This determination relies heavily on the User 900 preferencesstored within the User Account 424. Importance may be determined by anassessor, which assesses the scope, and duration, of an event to theUser 900 or the User's Avatar 221 a. The User's 900 preferences, degreeof impact on User 900, scope of event, duration of event, and degree ofimpact on User's 900 social network, group associations, interests,physical location, and demographic data may all be utilized by theassessor to determine importance. Additionally, by incorporating afeedback system the assessor may be adaptable to the Users' desiresthrough statistical means. In some embodiments a value may be generatedfor the importance of an event and the value may be compared to athreshold to determine if an event is important. If the event is foundunimportant then the process ends.

Else, if the event is found important then, in step 2103, the UserAccount 424 is queried for User 900 activity. In step 2104, adetermination is made if the User 900 is logged in. If User 900 islogged in then a message may be sent to the User 900 within the VirtualEnvironment 211 b with an alert of the event, in step 2105.

Else, if the user is not logged in a determination is made if the User900 is engaging in instant messaging, in step 1206. If User 900 isengaging in instant messaging then an instant message may be sent to theUser 900 with an alert of the event, in step 2107.

Else, if the User 900 is not engaging in instant messaging, a query maybe made into the User's 900 contact preference at step 2109. In step2110, a determination is made if the preferred contact method is email.If email is the preferred contact method then an email of the eventalert may be sent to User 900 at step 2111.

Else, if email is not the preferred contact method then, at step 2112, adetermination is made if the preferred contact method is text messaging.If text messaging is the preferred contact method then a text message ofthe event alert may be sent to User 900 at step 2113.

Else, if text message is not the preferred contact method then, at step2114, a determination is made if the preferred contact method is anaudio messaging. If audio messaging is the preferred contact method thenan audio message of the event alert may be sent to User 900 by phone orvoicemail, at step 2115.

Else, if audio message is not the preferred contact method thenadditional methods of User 900 contact may be included, or the processmay end. Alternatively, in some embodiments a default message system,such as email, may be utilized if a User 900 is found to have no contactpreference.

The present invention may also be practiced with other techniques forproviding a Persistent Avatar 221 a with migratory abilities. Forexample, it is possible, to provide Users 900 with the equipmentnecessary to host their own Persistent Avatar 221 a, including anEnabler 231 and access to large external databases, thereby distributingprocessing and eliminating the NOC 120. Alternatively, in someembodiments, the Enabler 231 may exist within the NOC 120, therebycoupling to the Virtual Environments 211 a to 215 n in its nativelanguage. Such embodiments require no cooperation from VirtualEnvironments 211 a to 215 n.

In sum, the present invention provides a persistent avatar managementsystem 100 for the creation, editing and maintaining of avatars that arecapable of migrating across multiple virtual environments whilemaintaining substantially constant attributes personalities andhistories, thereby providing the ability to seamlessly transition fromone virtual environment to another. Persistent avatar management system100 may be implemented entirely with special purpose hardware, or acombination of hardware and software executing on a computer system. Theadvantages of such an efficient system include ease of working withinvirtual environments, reduction of man-hours wasted in alternate avatarcreation, efficiency and economy for the virtual environments, andpositive repercussions for the healthcare and education industries.

Although the present invention has been described in considerable detailwith reference to exemplary embodiments, modifications, variations,permutations, and substitute equivalents may be made to the disclosedembodiments while remaining within the subject and spirit of theinvention. Therefore, the spirit and scope of the appended claims shouldnot be limited to the description of the versions contained herein.

1. A persistent avatar management system, useful in conjunction with apersistent avatar and a first virtual environment having a first userinterface, wherein the persistent avatar includes at least oneattribute, the persistent avatar management system comprising: a firstenabler configured to transpose the at least one attribute of thepersistent avatar to be compatible with the first interface of the firstvirtual environment thereby enabling the first virtual environment toutilize the at least one attribute of the persistent avatar.
 2. Thepersistent avatar management system, as recited in claim 1, furthercomprising a second enabler configured to transpose the at least oneattribute of the persistent avatar to be compatible with a secondinterface of a second virtual environment thereby enabling the secondvirtual environment to utilize the at least one attribute of thepersistent avatar.
 3. The persistent avatar management system, asrecited in claim 2, further comprising a migrator configured to migratethe persistent avatar from the first virtual environment to the secondvirtual environment, wherein the at least one attribute of thepersistent avatar remains substantially consistent from the firstvirtual environment to the second virtual environment.
 4. The persistentavatar management system, as recited in claim 1, wherein the firstenabler includes at least one client module, and wherein the at leastone client module is based on a protocol suite.
 5. The persistent avatarmanagement system, as recited in claim 1, wherein the persistent avatarmanagement system is hosted within a network operation center.
 6. Thepersistent avatar management system, as recited in claim 1, wherein thepersistent avatar is associated with a user and wherein the persistentavatar management system is hosted by the user.
 7. The persistent avatarmanagement system, as recited in claim 1, further comprising anattribute generator configured to generate the at least one attribute ofpersistent avatar.
 8. The persistent avatar management system as recitedin claim 7, wherein the attribute generator generates the at least oneattribute from a plurality of pre-selectable attributes.
 9. A method formanaging a persistent avatar, useful in association with a first virtualenvironment having a first user interface, wherein the persistent avatarincludes at least one attribute, the method comprising: transposing theat least one attribute of the persistent avatar to be compatible withthe first interface of the first virtual environment thereby enablingthe first virtual environment to utilize the at least one attribute ofthe persistent avatar.
 10. The method, as recited in claim 9, furthercomprising transposing the at least one attribute of the persistentavatar to be compatible with a second interface of a second virtualenvironment thereby enabling the second virtual environment to utilizethe at least one attribute of the persistent avatar.
 11. The method, asrecited in claim 10, further comprising migrating the persistent avatarfrom the first virtual environment to the second virtual environment,wherein the at least one attribute of the persistent avatar remainssubstantially consistent from the first virtual environment to thesecond virtual environment.
 12. The method, as recited in claim 9,wherein the persistent avatar includes at least one of a character, anon-player character, a quasi-player character, an agent, a personalassistant, a personality, a guide, an educator and a representation. 13.The method, as recited in claim 10, wherein each of the first and thesecond of virtual environments includes at least one of an online game,a social network, a web community, a shared simulation based onuser-created content, a virtual overlay on physical world data, and atelecommunication device.
 14. The method, as recited in claim 12,wherein the persistent avatar is editable.
 15. The method, as recited inclaim 14, wherein the at least one attribute of the persistent avatarincludes at least one of an appearance, a memory, a personality, anemotional attribute, an intelligence attribute, a physical attribute, asocial attribute, and an avatar statistic.
 16. The method, as recited inclaim 14, further comprising modifying the at least one attribute of thepersistent avatar, wherein the modifying is triggered by an experiencein one of the first and the second virtual environments.
 17. The method,as recited in claim 9, wherein the persistent avatar represents aplurality of persistent avatars.
 18. A notification system, useful inassociation with a user and at least one virtual environment, the noticesystem comprising: a monitor configured to monitor the at least onevirtual environment for an event; an assessor configured to assess animportance of the event and to generate a value for the eventcorresponding to the importance; and a notifier configured to notify theuser of the event if the value generated for the event exceeds athreshold value.
 19. A method for notifying a user, wherein the user isassociated with at least one virtual environment, the method comprising:monitoring the at least one virtual environment for an event; assessingan importance of the event; generating a value for the eventcorresponding to the importance; and notifying the user of the event ifthe value generated for the event exceeds a threshold value.
 20. Themethod, as recited in claim 19, wherein the monitoring furthercomprising monitoring a real-world for an occurrence of the event. 21.The method, as recited in claim 20, wherein assessing the importance ofthe event includes querying at least one of a user preference, a degreeof impact on the user, a scope of the event, a duration of the event,and a degree of impact on a social network associated with the user.