Using gender analysis of names to assign avatars in instant messaging applications

ABSTRACT

A method for displaying gender-based avatar representations of users in instant messaging communications comprises receiving a username for a first user having a first user account registered with an instant messaging system; performing an anthroponomastic analysis of the username to assign a probable gender for the first user selected from male, female, and neutral; displaying a current contact area in a communication session window of a user interface provided by an instant messaging application on a client system operated by a second user having a second user account registered with the instant messaging system; and displaying the username for the first user and an avatar representation indicative of the probable gender for the first user in the current contact area while the instant messaging application is accessing the instant messaging system to allow the second user to participate in instant messaging communication with the first user via the user interface.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.12/038,954, filed Feb. 28, 2008, the disclosure of which is incorporatedby reference herein in its entirety.

BACKGROUND

Exemplary embodiments of the present invention relate to electronicmessaging systems, and more particularly, to the display of avatarsrepresenting users communicating within electronic messaging systems.

Instant messaging (IM) is an online chat medium based on typed text thatallows users to communicate with each other and to collaborate inreal-time over a network, commonly the Internet. Instant messagingapplications monitor and report the status of users that haveestablished each other as online contacts. This information is typicallypresented to a user in a window. Instant messaging allows instantaneouscommunication between a number of parties simultaneously by transmittinginformation quickly and efficiently, and featuring immediate receipt ofacknowledgement or reply. For these reasons, instant messagingapplications also are often used by users conducting business. Byutilizing instant messaging, business users can view each other'savailability and initiate a text conversation with colleagues orcustomers when a desired contact becomes available. Millions of userscommunicate using instant messaging systems every day. With instantmessaging becoming an important part of both personal and businesscommunications, communication enhancements are important to thecontinued success of this type of communication tool.

With today's advanced communication technology, people increasinglycommunicate with people from cultures very different from their ownwithout the restrictions of time and space. The social conventions ofelectronic communications such as instant messaging are similar thatthose of face-to-face communications and thus often reflect the societalconventions of the cultures in which the parties exist. In face-to-facesituations, however, the concurrent use of both verbal and non-verbalcommunication enables a rich, multi-modal environment that provides eachcommunicating party with the ability to construct a physicalidentification of another communicating party using visual and/orauditory characteristics. With digital communications that involve typedtext such as instant messaging, all that is typically communicated arethe words themselves, which do not always necessarily provide sufficientgender identification information that would be conveyed in aface-to-face conversation.

There are thousands of languages in use today, which provides for a widevariety of given or first names. In nearly every culture, given namesare commonly used as a contextual form of identity, of which gender isone component. In most cultures, persons of different gender aregenerally addressed differently during communications according toparticular cultural and social conventions (for example, in Englishspeaking countries, men can be addressed formally using ‘Sir’ or ‘Mr.’,and women can be addressed formally using ‘Madam’, ‘Mrs.’, ‘Miss’, or‘Ms.’).

Electronic communications are generally subject to the same or similarsocial categories and rules to that of real world communications, and asa result, the types of cultural differences described above can oftenpresent problems in assessing gender during instant messagingconversations. Generally, an English speaking person can correctly guesswhether a particular individual whom he never met is female or maleduring a communications session based on the first name of that person,when it is provided. But when messaging with people having namesoriginating from other cultures with which the person is not veryfamiliar, for example, people with Indian or Chinese first names, thetask of assessing gender may be more challenging. Particularly insituations in which the electronic messaging system is being used forprofessional purposes, a lack of knowledge of the gender of the personbeing communicated with in a messaging session could lead to potentiallyoffensive communication gaffes and faux pas.

SUMMARY

The shortcomings of the prior art can be overcome and additionaladvantages can be provided through exemplary embodiments of the presentinvention that are related to a method for displaying gender-basedavatar representations of users in instant messaging communicationscomprises receiving a username for a first user having a first useraccount registered with an instant messaging system; performing ananthroponomastic analysis of the username to assign a probable genderfor the first user; displaying a current contact area in a communicationsession window of a user interface provided by an instant messagingapplication on a client system operated by a second user having a seconduser account registered with the instant messaging system, the instantmessaging application accessing the instant messaging system to allowthe second user to participate in instant messaging communication viathe user interface; and displaying the username for the first user and agender-based avatar representation indicative of the probable gender forthe first user in the current contact area while the instant messagingapplication is accessing the instant messaging system to allow thesecond user to participate in instant messaging communication with thefirst user via the user interface. The probable gender is selected frommale, female, and neutral.

The shortcomings of the prior art can also be overcome and additionaladvantages can also be provided through exemplary embodiments of thepresent invention that are related to computer program products and dataprocessing systems corresponding to the above-summarized method are alsodescribed herein.

Additional features and advantages are realized through the techniquesof the present invention. Other embodiments and aspects of the inventionare described in detail herein and are considered a part of the claimedinvention. For a better understanding of the invention with advantagesand features, refer to the description and to the drawings.

TECHNICAL EFFECTS

As a result of the summarized invention, technically we have achieved asolution that can be implemented within electronic messaging systemsthat display graphical avatars to represent participants incommunications to provide a mechanism for performing an anthroponomasticanalysis of the real names of users to determine probable genders forthe users and displaying avatars having genders that correspond to thedetermined probable gender to represent the users to one another duringtheir messaging communications.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The subject matter that is regarded as the invention is particularlypointed out and distinctly claimed in the claims at the conclusion ofthe specification. The foregoing and other objects, features, andadvantages of the invention are apparent from the following detaileddescription of exemplary embodiments of the present invention taken inconjunction with the accompanying drawings in which:

FIG. 1 is a block diagram illustrating a representation of a computernetwork system within which an exemplary embodiment of the presentinvention can be implemented.

FIG. 2 is a block diagram illustrating a representation of a messagingserver system within which an exemplary embodiment of the presentinvention is implemented.

FIG. 3 is a sample illustration of a messaging session window providedby a graphical user interface of within a messaging system implementingan exemplary embodiment of the present invention.

FIG. 4 is a block diagram illustrating a representation of a computersystem within which an exemplary embodiment of the present invention canbe implemented.

The detailed description explains exemplary embodiments of the presentinvention, together with advantages and features, by way of example withreference to the drawings. The flow diagrams depicted herein are justexamples. There may be many variations to these diagrams or the steps(or operations) described therein without departing from the spirit ofthe invention. For instance, the steps may be performed in a differingorder, or steps may be added, deleted, or modified. All of thesevariations are considered a part of the claimed invention.

DETAILED DESCRIPTION

While the specification concludes with claims defining the features ofthe invention that are regarded as novel, it is believed that theinvention will be better understood from a consideration of thedescription of exemplary embodiments in conjunction with the drawings.It is of course to be understood that the embodiments described hereinare merely exemplary of the invention, which can be embodied in variousforms. Therefore, specific structural and functional details disclosedin relation to the exemplary embodiments described herein are not to beinterpreted as limiting, but merely as a representative basis forteaching one skilled in the art to variously employ the presentinvention in virtually any appropriate form. Further, the terms andphrases used herein are not intended to be limiting but rather toprovide an understandable description of the invention.

Referring now to FIG. 1, an example of an electronic messaging systemproviding a client/server environment within which exemplary embodimentsof the present invention can be implemented is illustrated. Messagingsystem 100 contains network 102, which is the medium used to providecommunications links between various devices and computers connectedtogether within the network system. Network 102 may include connectionssuch as wire, wireless communication links, or fiber optic cables, forexample.

In the depicted example, an electronic messaging system server 104 iscommunicatively connected to network 102 along with storage unit 106. Inaddition, messaging client systems 110, 112, and 114 are communicativelyconnected to network 102. These client systems 110, 112, and 114 may be,for example, personal computers or network computers. Client systems110, 112, and 114 are each operated by a messaging system user and actas clients to server system 104 in this example. Messaging server 104 isconfigured to control a messaging session between client messagingsystems 110, 112, and 114 being operated by users engaged inpeer-to-peer network communications via a network 102. In exemplaryembodiments, messaging system 100 can include additional servers,clients, and other devices not shown in FIG. 1.

Network 102 may comprise the Internet, in which the network includes aworldwide collection of networks and gateways that use the TransmissionControl Protocol/Internet Protocol (TCP/IP) suite of protocols tocommunicate with one another. At the heart of the Internet is a backboneof high-speed data communication lines between major nodes or hostcomputers, consisting of thousands of commercial, government,educational and other computer systems that route data and messages. Ofcourse, network system 100 also may be implemented as any of a number ofdifferent types of networks, or combinations thereof, such as, forexample, an intranet, a local area network (LAN), or a wide area network(WAN). The client/server environment can be implemented within anysuitable network architecture. FIG. 1 is thus intended as a non-limitingexample, and not as an architectural constraint for implementingexemplary embodiments of the present invention.

In the present exemplary embodiment, to access messaging system 100 tobegin a messaging session, a client system establishes a connection tomessaging server 104 via network 102. Once a connection to messagingserver 104 has been established, the connected client system maydirectly or indirectly transmit data to and access content from themessaging server. A user accessing messaging server 104 through theconnected client system can then able to use a messaging clientapplication to, for example, view whether particular users are online,view whether users may receive messages, exchange messages withparticular message recipients, participate in group chat rooms, tradefiles such as pictures, invitations or documents, find other messagerecipients with similar interests, get customized information such asnews and stock quotes, and search the Web.

In a typical scenario within messaging system 100, a client senderenters a message for a messaging session by operating a messaging clientapplication at a client messaging system such as client system 110. Themessage entry is transmitted to messaging server 104 via network 102.Messaging server 104 then distributes the message entry to a clientmessaging system such as client system 112 being operated by theintended client recipient participating in the messaging session vianetwork 102. A messaging client application being used at therecipient's client system renders the message and other informationserved by messaging server 104. To transfer data, messaging server canemploy one or more standard proprietary messaging protocols. Themessaging client applications provide a user interface through whichclient senders and recipients can access messaging server 104 to sendand receive messages. In exemplary embodiments, a separate messagingclient application can be installed on each client system for operationby the user of that client system. Alternatively, a single messagingapplication can be provided as a Web messaging application in a standardformat such as HTML/XHTML that may be supported and accessed by Webbrowsers installed on each client system via network 102. In exemplaryembodiments, messaging server 104 can be configured to provide the Webmessaging application.

As thus described, in exemplary embodiments, the electronic messagessent between a sender client system and recipient client system can berouted through messaging server 104. In alternative exemplaryembodiments, the electronic messages sent between a sender client systemand recipient client system can be routed through a third party server(not shown), and, in some cases, can also be routed through messagingserver 104. In yet other alternative exemplary embodiments, theelectronic messages can be sent directly between a sender client systemand recipient client system.

It should be noted that the term “user” is used herein to refer to onewho uses a computer system, such as one of client systems 110, 112, and114. When initially connecting to messaging system 100, client systemusers may need to login to the messaging system by authenticatingthemselves for the purposes of accounting, security, logging, and/orresource management through a user interface provided by the messagingclient application being operated at the user's client messaging system.For purposes of authentication, a user can have an account (a useraccount) and a username (also sometimes called a username, handle, ornickname), and in most cases also a password. The information for eachuser account can be maintained by messaging server 104 in storage 106.

It should also be noted that the terms “client” and “server” are usedherein to refer to a computer's general role as a requester of data (theclient) or provider of data (the server). Further, the terms “sender”and “recipient” are used to refer to a client system user's general roleas a sender of a message during a messaging session (the sender) or as areceiver of a message during a messaging session (the recipient).Additionally, each of client messaging systems 110, 112, and 114 andmessaging server 104 may function as both a “client” and a “server” andmay be implemented utilizing a computer system such as data processingsystem 200, described below with reference to FIG. 2. Further, users ofeach of client messaging systems 110, 112, and 114 may function as botha “sender” and a “recipient” and typically act as both during a typicalmessaging session. Still further, while exemplary embodiments aredescribed herein with emphasis upon messaging server 104 controlling amessaging session between client messaging systems 110, 112, and 114engaged in peer-to-peer network communications via a network 104,alternative exemplary embodiments can be implemented to be performed orpartially performed within client messaging systems 110, 112, and 114.Furthermore, other types of messaging systems may be utilized toimplement exemplary embodiments.

The use of graphical avatar images to provide proxy representations forusers has been gradually introduced in electronic messaging systems. Anavatar can provide a mechanism for enabling a non-textual identificationof a user associated with the avatar. As will now be described,exemplary embodiments of the present invention can be implemented withinelectronic messaging systems, such as messaging system 100 of FIG. 1,that are configured to display graphical avatars on client systems toprovide a representation of the participants in communication sessionsto one another. Exemplary embodiments can be implemented to provide amechanism for performing an anthroponomastic analysis of the usernamesor usernames of users to determine probable genders for the users andfor displaying avatars having genders that correspond to the determinegenders for the users to represent the users during their electronicmessaging communications with other users.

Referring now to FIG. 2, a messaging system server 200 implementing anexemplary embodiment of the present invention is illustrated. Messagingserver 200 may be implemented, for example, as messaging server 104within messaging system 100 of FIG. 1. As illustrated in FIG. 2,messaging server 200 can comprise multiple controller components anddatabases located within a single server system or within multipleserver systems, where the multiple server systems are integrated with oraccessible by users of messaging client systems in a messaging systemvia a network. Messaging server 200 includes a messaging controllercomponent 210 that is configured to control the distribution of messagecommunications for the messaging system provided by the messagingserver. In the present exemplary embodiment, messaging controller 210will be described with respect to message communications such as instantmessaging. In alternative exemplary embodiments, messaging controller210 may control other types of available electronic communications suchas e-mail messaging or chat room messaging.

In the present exemplary embodiment, messaging controller 210distributes instant messaging communications between sender andrecipient users of messaging client systems in a channel opened by themessaging controller for the messaging session. Communicating users areeach represented by an identifier, such as a username, and a graphicalavatar that is displayed to other users in a user interface provided bythe messaging client application being operated by each user at thatuser's client system. Messaging controller 210 can be configured todistribute the identifier and the avatar of each user to other usersengaged in communications sessions with that user. Messagecommunications transferred between users as controlled by messagingcontroller 210 can be stored in a transferred messages database 220 fora specified period of time, and all the entries for a specific instantmessaging session can be catalogued together within the messagesdatabase.

Messaging server 200 also includes a user account controller component230, a user account database 240, a username analysis controller 250,and an anthroponomastic information database 260. User accountcontroller 230 is configured to register user accounts for new users ofthe messaging system, to control authentication of registered userslogging into the messaging system, and to maintain identifiers and otherattributes for each user account in user account database 240. Duringregistration of a particular user, user account controller 230determines a username for the user and stores the username in useraccount database 240. The identifiers and other attributes maintained inuser account database 240 for a particular user account can include theusername or screen name, a password, the avatar representation, andother information about the particular user assigned the account. Theother information about a particular user may include, for example, apersonal profile, which may include information about the user's name,regional areas of origin, national language, company association,memberships, and personal characteristics.

In the present exemplary embodiment, username analysis controller 250 isconfigured to perform an anthroponomastic analysis of the username orscreen name of each newly registered user to determine a probable genderfor the user and to assign a gender-based avatar representation for theuser that will be displayed in the user interfaces of other users duringinstant messaging communications with the newly registered user.Anthroponymy is the study of the names of human beings. Thus, exemplaryembodiments are particularly well-suited for use in situations where anew user specifies his or her full name or given name as his or herusername. To perform analysis of usernames, username analysis controller250 is configured to access data anthroponomastic information database260, which can store information such as, for example, an expansive listof names compiled from those used in many different cultures cataloguedaccording to gender (that is, male, female, or unisex), a list of rulesfor associating a username not included in the list of names with aparticular culture, and a list of rules derived from naming conventionsthat are employed in many different cultures catalogued culturally,linguistically, nationally, regionally, and/or according to otherrelevant anthroponomastic criteria.

When a new user registers with the messaging system, username analysiscontroller 250 is configured to perform an anthroponomastic analysis ofthe new user's username to determine a probable gender for the user.Such an analysis can, for instance, first involve accessing the list ofnames in anthroponomastic information database 260 to attempt to find amatch. If a match for the username is found in the list of names,username analysis controller 250 can assign the user with the genderassociated with the name in anthroponomastic information database 260.The assigned gender can be male, female, or unisex. If no match is foundin the list of names, username analysis controller 250 can be configuredaccess the list of rules in anthroponomastic information database 260 toattempt to identify a particular culture with which the name is commonlyassociated (for example, many terms used for names may havecharacteristics that may be used to identify a cultural origin for theterm) and the list of rules derived from naming conventions for theidentified culture to attempt to determine a gender to assign to thename. A naming convention is a collection of rules followed by a set ofnames. Naming conventions can be used to deduce useful rules based onthe character sequence of known names and knowledge of the rulesfollowed in the known names.

For example, where the newly registered user's username is not found inthe list of names in anthroponomastic information database 260 but isidentified using the list of cultural rules as being a Hindu name,username analysis controller 250 can use the list of rules derived fromnaming conventions for the Hindu culture stored in the anthroponomasticinformation database to attempt to associate a probable gender with theusername. According to Hindu naming conventions, a first name that endswith the letter ‘i’ is more likely to be a female name. Thus, for anewly registered user having the username ‘Amodini’, username analysiscontroller 250 would assign that user with a probable gender of female.Similarly, where the newly registered user's username is not found inthe list of names in anthroponomastic information database 260 but isidentified as being a Chinese name, username analysis controller 250 canuse the list of rules derived from naming conventions for the Chineseculture stored in the anthroponomastic information database to attemptto associate a gender with the username. According to Chinese namingconventions, the family name is placed before the given name, in reverseof the regular order of English names. Furthermore, according to Chinesenaming conventions, given names resonant of qualities that are perceivedto be either masculine or feminine are frequently given, with malesbeing linked with strength and firmness, and females with beauty andflowers. Females also are commonly given names that repeat a character.Thus, for a newly registered user having a username of ‘Xiuxiu’ or‘Lili’, username analysis controller 250 would assign that user with aprobable gender of female. In certain situations, username analysiscontroller 250 may be unable to determine a probable gender for ausername after accessing the list names, the list of cultural rules, andthe list of rules derived from naming conventions, in which case theusername analysis controller can assign a neutral gender to the user.

Based on the probable gender determined for the user, username analysiscontroller 250 can then assign a gender-based avatar to the user basedupon the determined gender. Thus, if the probable gender for the user'susername is determined to be female, the user will be assigned with afemale avatar. If the probable gender for the user's username isdetermined to be male, the user will be assigned with a male avatar.Finally, if the probable gender for the user's username is determined tobe neutral (that is, either the name is unknown and name analysiscontroller 250 is unable to determine a probable gender based uponinformation in the list of cultural rules and the list of rules derivedfrom naming conventions in anthroponomastic information database 260, orthe name is a unisex one that is commonly given to both males andfemales, such as Pat, which may indicate a full name of Patrick orPatricia) the user will be assigned with generic, genderless humanfigure image as his or her avatar. Of course, some unisex names arehomophones, pronounced the same for both genders but spelleddifferently. A common example of this is English names in which a final‘y’ is used for the masculine form and a final ‘i’ or ‘ie’ is used forthe feminine form (for example, the names Terry and Teri). In thesesituations, username analysis controller 250 can be configured toutilize naming conventions to assign a male or female gender-basedavatar to a user specifying a unisex homophone as a username instead ofa genderless avatar. After assigning an avatar representation to aparticular user, username analysis controller 250 can be configured todirect user account controller 230 to store the avatar representationassigned to the user in the user profile data maintained for the user inuser account database 240.

In exemplary embodiments, once username analysis controller 250 has madea determination of a probable gender for a particular user and assigneda gender-based avatar or a neutral gender avatar to the user, messagingserver 200 can be further configured to provide the user with the optionof overriding the assigned avatar by selecting a different avatarrepresentation. For example, when username analysis controller 250 hasassigned a neutral gender avatar to a particular user, messaging server200 can be further configured to provide an indication to the user ofsuch assignment and provide the user with the option of selecting anappropriate gender-based avatar to replace the neutral gender avatar asthe user's avatar representation in communication sessions within themessaging system. In another example, when username analysis controller250 has assigned a gender-based (that is, male or female) avatar to aparticular user, messaging server 200 can be further configured toprovide an indication to the user of such assignment and provide theuser with the option of selecting a neutral gender avatar to replace thegender-based avatar as the user's avatar representation if theparticular user does not wish to so indicate his or her gender to otherusers in communication sessions within the messaging system. When a userhas opted to override the assigned avatar by selecting a differentavatar representation, username analysis controller 250 can beconfigured to direct user account controller 230 to store the avatarrepresentation selected by the user, rather than the assigned avatar, inthe user profile data maintained for the user in user account database240.

Because each messaging system user's data is stored in user accountdatabase 240, when a first user accesses the messaging system, messagingserver 200 can retrieve the accessing user's profile data from thedatabase and to provide the user's gender-based avatar representation incommunications with other users accessing the messaging system. Thefirst user's avatar then can be displayed in a window provided withinthe user interface of the messaging client application being used byother users engaged in a communications session with the first user.Thus, the user's gender-based avatar can be used to represent the userto other users in a communications session. In exemplary embodiments,the first user's avatar may also be displayed in a window or menu optionthat provides a “buddy”, colleague, or associate list, or other list ofregular contacts, within the user interfaces of messaging clientapplication being used by other users to provide an option for the otherusers to communicate with or check the status of the first user.

Referring now to FIG. 3, a sample messaging session window 300 providedwithin a graphical user interface of a messaging client applicationbeing used to access a messaging system implementing an exemplaryembodiment of the present invention is illustrated. Messaging sessionwindow 300 may be viewed by a first user of the messaging clientapplication who is connected to the messaging system to engage incommunications sessions with a second user connected to the messagingsystem. Messaging session window 300 includes a message composition area310 for composing messages to be sent to the second user during thecommunications session and a message history text box 320 for displayinga transcript of the message communications session between the first andsecond users. Each of the messages sent to, or received from, the seconduser can be listed in chronological order in message history text box320, with each listed message providing an indication of which user sentthe message.

Messaging session window 300 also includes a set of feature controls 330and a “send” control button 340. Feature controls 330 can be accessed bythe first user to control features such as message encryption,conversation logging, conversation forwarding to a differentcommunications mode, font size and color control, and spell checking,among others. Send control button 340 can be accessed by the first userto trigger sending of a message typed into instant message compositionarea 310. Messaging session window 300 also includes a window menu 350providing a set of client application controls that can be accessed bythe first user, and a set of contact or “buddy” controls 360 that can beaccessed by the user to maintain a list of messaging contacts, viewwhich messaging contacts are available to communicate with using themessaging system, and switch from the current messaging session toanother messaging session with another user in the first user's contactlist.

In accordance with an exemplary embodiment of the present invention,messaging session window 300 also includes a current contact area 370that displays a representation of the second user with whom the firstuser is currently engaged in a messaging session. As illustrated, therepresentation includes a username 375 specified by the second user anda graphical image of a gender-based avatar 380 assigned by the messagingsystem to represent the second user in messaging communications. Insample messaging session window 300, the username of the second user is“Amodini Visweswaran”, and the gender-based avatar assigned to thesecond user is an image of a female character. Gender-based avatar 380is female in the current example because “Amondini” has been determinedas having a probable gender of female by, for example, ananthroponomastic analysis component (such as username analysiscontroller 250 of the exemplary embodiment described with reference toFIG. 2) implemented within the messaging system server. The display ofgender-based avatar 380 in current contact area 370 enables the firstuser to determine the gender of the second user with whom the first useris communicating by perceiving the gender-based avatar being projected,rather than by assessing the username of the second user. Here, thegender-based avatar displayed is an avatar that only includes agraphical image of a face in a small square shaped area, which may bereferred to as a facial avatar or a head avatar. Of course, in otherexemplary embodiments, any other suitable type of avatar sufficient toconvey gender may be displayed in an area of any suitable shape andsize. For example, the gender-based avatar may include additional bodyparts.

As described herein, exemplary embodiments of the present invention canbe utilized to aid electronic messaging application users in identifyingthe gender of other users with which they are communicating. Exemplaryembodiments can thus enable electronic messaging application users tohave a greater social presence in messaging communications and tocommunicate across different cultures more easily without offendingother users. Exemplary embodiments can be particularly suitable, forexample, for implementation within instant messaging applications beingused by users as a business communications medium. By utilizing instantmessaging, business users can view each other's availability andinitiate a text conversation with colleagues or customers without therestrictions of time and space. Generally, when a user logs into aninstant messaging application for the purpose of businesscommunications, the username or screen name that identifies the accountfor the user to the user's contacts is that user's personal name (thatis, the true proper name given to that individual at birth or otherwiselegally identifying that individual). Thus, where two business contactswho have never met in person are engaged in an instant messagingsession, each contact will be provided with an indication to the othercontact's gender during the messaging session.

Exemplary embodiments of the present invention can be realized inhardware, software, or a combination of hardware and software. Exemplaryembodiments can be realized in a centralized fashion in one computersystem or in a distributed fashion where different elements are spreadacross several interconnected computer systems. Any kind of computersystem—or other apparatus adapted for carrying out the methods describedherein—is suited. A typical combination of hardware and software couldbe a general-purpose computer system with a computer program that, whenbeing loaded and executed, controls the computer system such that itcarries out the methods described herein.

Exemplary embodiments of the present invention can also be embedded in acomputer program product, which comprises all the features enabling theimplementation of the methods described herein, and which—when loaded ina computer system—is able to carry out these methods. Computer programmeans or computer program as used in the present invention indicates anyexpression, in any language, code or notation, of a set of instructionsintended to cause a system having an information processing capabilityto perform a particular function either directly or after either or bothof the following a) conversion to another language, code or, notation;and b) reproduction in a different material form.

A computer system in which exemplary embodiments can be implemented mayinclude, inter alia, one or more computers and at least a computerprogram product on a computer readable medium, allowing a computersystem to read data, instructions, messages or message packets, andother computer readable information from the computer readable medium.The computer readable medium may include non-volatile memory, such asROM, Flash memory, Disk drive memory, CD-ROM, and other permanentstorage. Additionally, a computer readable medium may include, forexample, volatile storage such as RAM, buffers, cache memory, andnetwork circuits. Furthermore, the computer readable medium may comprisecomputer readable information in a transitory state medium such as anetwork link and/or a network interface, including a wired network or awireless network that allows a computer system to read such computerreadable information.

FIG. 4 is a block diagram of an exemplary computer system 400 that canbe used for implementing exemplary embodiments of the present invention.Computer system 400 includes one or more processors, such as processor404. Processor 404 is connected to a communication infrastructure 402(for example, a communications bus, cross-over bar, or network). Varioussoftware embodiments are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson of ordinary skill in the relevant art(s) how to implement theinvention using other computer systems and/or computer architectures.

Exemplary computer system 400 can include a display interface 408 thatforwards graphics, text, and other data from the communicationinfrastructure 402 (or from a frame buffer not shown) for display on adisplay unit 410. Computer system 400 also includes a main memory 406,which can be random access memory (RAM), and may also include asecondary memory 412. Secondary memory 412 may include, for example, ahard disk drive 414 and/or a removable storage drive 416, representing afloppy disk drive, a magnetic tape drive, an optical disk drive, etc.Removable storage drive 416 reads from and/or writes to a removablestorage unit 418 in a manner well known to those having ordinary skillin the art. Removable storage unit 418, represents, for example, afloppy disk, magnetic tape, optical disk, etc. which is read by andwritten to by removable storage drive 416. As will be appreciated,removable storage unit 418 includes a computer usable storage mediumhaving stored therein computer software and/or data.

In exemplary embodiments, secondary memory 412 may include other similarmeans for allowing computer programs or other instructions to be loadedinto the computer system. Such means may include, for example, aremovable storage unit 422 and an interface 420. Examples of such mayinclude a program cartridge and cartridge interface (such as that foundin video game devices), a removable memory chip (such as an EPROM, orPROM) and associated socket, and other removable storage units 422 andinterfaces 420 which allow software and data to be transferred from theremovable storage unit 422 to computer system 400.

Computer system 400 may also include a communications interface 424.Communications interface 424 allows software and data to be transferredbetween the computer system and external devices. Examples ofcommunications interface 424 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface424 are in the form of signals which may be, for example, electronic,electromagnetic, optical, or other signals capable of being received bycommunications interface 424. These signals are provided tocommunications interface 424 via a communications path (that is,channel) 426. Channel 426 carries signals and may be implemented usingwire or cable, fiber optics, a phone line, a cellular phone link, an RFlink, and/or other communications channels.

In this document, the terms “computer program medium,” “computer usablemedium,” and “computer readable medium” are used to generally refer tomedia such as main memory 406 and secondary memory 412, removablestorage drive 416, a hard disk installed in hard disk drive 414, andsignals. These computer program products are means for providingsoftware to the computer system. The computer readable medium allows thecomputer system to read data, instructions, messages or message packets,and other computer readable information from the computer readablemedium. The computer readable medium, for example, may includenon-volatile memory, such as Floppy, ROM, Flash memory, Disk drivememory, CD-ROM, and other permanent storage. It can be used, forexample, to transport information, such as data and computerinstructions, between computer systems. Furthermore, the computerreadable medium may comprise computer readable information in atransitory state medium such as a network link and/or a networkinterface, including a wired network or a wireless network that allows acomputer system to read such computer readable information.

Computer programs (also called computer control logic) are stored inmain memory 406 and/or secondary memory 412. Computer programs may alsobe received via communications interface 424. Such computer programs,when executed, can enable the computer system to perform the features ofexemplary embodiments of the present invention as discussed herein. Inparticular, the computer programs, when executed, enable processor 404to perform the features of computer system 400. Accordingly, suchcomputer programs represent controllers of the computer system.

Although exemplary embodiments of the present invention have beendescribed in detail, it should be understood that various changes,substitutions and alternations could be made thereto without departingfrom spirit and scope of the inventions as defined by the appendedclaims. Variations described for exemplary embodiments of the presentinvention can be realized in any combination desirable for eachparticular application. Thus particular limitations, and/or embodimentenhancements described herein, which may have particular advantages to aparticular application, need not be used for all applications. Also, notall limitations need be implemented in methods, systems, and/orapparatuses including one or more concepts described with relation toexemplary embodiments of the present invention.

While exemplary embodiments of the present invention have beendescribed, it will be understood that those skilled in the art, both nowand in the future, may make various modifications without departing fromthe spirit and the scope of the present invention as set forth in thefollowing claims. These following claims should be construed to maintainthe proper protection for the present invention.

1. A method for displaying gender-based avatar representations of usersin instant messaging communications, the method comprising: receiving ausername for a first user having a first user account registered with aninstant messaging system; performing an anthroponomastic analysis of theusername to assign a probable gender for the first user, the probablegender being selected from male, female, and neutral; displaying acurrent contact area in a communication session window of a userinterface provided by an instant messaging application on a clientsystem operated by a second user having a second user account registeredwith the instant messaging system, the instant messaging applicationaccessing the instant messaging system to allow the second user toparticipate in instant messaging communication via the user interface;and displaying the username for the first user and a gender-based avatarrepresentation indicative of the probable gender for the first user inthe current contact area while the instant messaging application isaccessing the instant messaging system to allow the second user toparticipate in instant messaging communication with the first user viathe user interface.
 2. The method of claim 1, wherein the instantmessaging system includes an instant messaging server operativelycoupled to a network, wherein the instant messaging system receives theusername for the first user and performs the anthroponomastic analysisof the username to assign a probable gender for the first user, whereinthe instant messaging application establishes a connection with theinstant messaging server via the network to access the instant messagingsystem, and wherein the instant messaging server manages instantmessaging communication between the first and second users.
 3. Themethod of claim 2, further comprising transmitting the gender-basedavatar representation for the first user to the client system operatedby the second user via the network upon access of the instant messagingsystem by the instant messaging application to allow the second user toparticipate in instant messaging communication via the user interface,and displaying the username for the first user and the gender-basedavatar representation indicative of the probable gender for the firstuser in a buddy list area in the communication session window of theuser interface provided by the instant messaging application on theclient system operated by the second user, the buddy list area includinga list of users having accounts registered with the instant messagingsystem specified by the second user and permitting the second user toselect any user of the list of users to attempt to establish instantmessaging communication with the selected user via the user interface.4. The method of claim 2, further comprising accessing a first databasemaintained by the instant messaging server to perform theanthroponomastic analysis of the username to attempt to assign aprobable gender for the first user, assigning the probable gender forthe first user as neutral if the anthroponomastic analysis of theusername is not able to assign the probable gender as either male orfemale by accessing the first database, storing the gender-based avatarrepresentation indicative of the probable gender for the first user in asecond database maintained by the instant messaging server for storinguser account information, and transmitting the gender-based avatarrepresentation for the first user to the client system operated by thesecond user via the network upon access of the instant messaging systemby the instant messaging application to allow the second user toparticipate in instant messaging communication with the first user viathe user interface, and wherein the first database storing a list ofnames selected from a plurality of cultures, a gender associated witheach name of the list of names, a list of anthroponomastic rules forattempting to associate usernames that are not included in the list ofnames with a particular culture, and a plurality of sets of namingrules, each set of naming rules being derived from naming conventionsemployed in a corresponding culture of the plurality of cultures.
 5. Themethod of claim 1, further comprising displaying the gender-based avatarrepresentation indicative of the probable gender for the first user viathe user interface provided by the instant messaging application on aclient system operated by the first user, providing the first user withan option to select a different gender for the gender-based avatarrepresentation indicative of the probable gender for the first useraccount via the user interface provided by the instant messagingapplication on the client system operated by the first user, andreplacing the gender-based avatar representation indicative of theprobable gender for the first user in the second database with agender-based avatar representation indicative of the different gender ifselected by the first user.