Method and system for splitting virtual universes into distinct entities

ABSTRACT

Systems and methods for allowing an administrator or program to select a region or set of avatars in a virtual universe grid for splitting into another, separate and distinct virtual universe grid. If a region is selected, all of the avatars and virtual universe resources associated with the region are locked, their data is retrieved, and another separate virtual universe grid is commanded to create and insert the avatars and resources in it. If avatars are selected, all of the resources, scripts, histories, and information regarding the selected avatars are retrieved, and the avatars are locked in the source universe. Then, another, separate virtual universe grid is commanded to create universe user identifiers for the avatars, and they are inserted into the separate VU grid. Cleanup includes deleting the region and/or avatars from the first (source) virtual universe grid.

CROSS-REFERENCE TO RELATED APPLICATIONS CLAIMING BENEFIT UNDER 35 U.S.C.120

None.

FEDERALLY SPONSORED RESEARCH AND DEVELOPMENT STATEMENT

This invention was not developed in conjunction with any Federallysponsored contract.

MICROFICHE APPENDIX

Not applicable.

INCORPORATION BY REFERENCE

None.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to cross-platform schedulingtechnologies for “Virtual World” systems, Massively Multiplayer OnlineRole Playing systems, and the like.

2. Background of the Invention

Whereas the determination of a publication, technology, or product asprior art relative to the present invention requires analysis of certaindates and events not disclosed herein, no statements made within thisBackground of the Invention shall constitute an admission by theApplicants of prior art unless the term “Prior Art” is specificallystated. Otherwise, all statements provided within this Backgroundsection are “other information” related to or useful for understandingthe invention.

“Virtual Worlds”, also sometimes referred to as “Massively Multi-PlayerOnline Role Playing Games” (“MMPorg”) systems, are well known in the artfor their ability to allow users, or “players”, to assume a virtualidentity, and to interact through that identity with the system's logicas well as with other users or players through their own virtualidentities. Some of the presently available Virtual World systems andproducts include, but are not limited to, Second Life™, MindArk PE AB'sIntropia™, and Makena Technologies' There<dot>com™, where<dot>represents the period or dot character “.”.

By configuring the virtual identity, a user is enabled to create apersona of his or her liking, and to interact within the virtual worldand the other users, who are also represented by their own virtualavatars and identities. Most Virtual Worlds allow the user to select orcreate a three-dimensional representation of his or her virtualidentity, referred to as an avatar. Avatars can be realistic in theirappearance, or can be a fantasy creature. Other characteristics, such asmovement speed and restrictions, communications abilities, andinteraction limitations or abilities, can be defined for a user'svirtual identity.

While these types of virtual worlds began as gaming and role playingproducts, they have now evolved into useful platforms for otherpurposes. One such purpose is an evolution of online meetings, onlineconferences, and online training or education.

Previous products directed towards these purposes were based onpresenting the real voice and/or real image of each “attendee” to anonline meeting, either through sharing of still photos of each attendee,or through use of webcams to transmit live images. Communications wereenabled through simultaneous use of telephone lines, or through use ofvoice-over-Internet-Protocol (“VoIP”) and/or text messaging.

While these systems offer many advantages, such as saving travel costs,allowing quicker dissemination of information, and fosteringnear-face-to-face relationships, one draw back of such online meetingsis that there is little or no sensation of community during the onlineconference—each attendee still feels as if he or she is using a computeralone to converse with the other attendees.

With the evolution of Virtual World's into this manner of usage, many ofthese issues are resolved because there is a greater sense of communityor social interaction as the experience is much more complete andrealistic. Each attendee feels much more immersed in the meeting virtualenvironment, including the virtual meeting room or space, and eachattendee has a greater sensation of the other attendees' presencebecause each attendee has a virtual position within the group ofattendees, which cannot be had from a standard web meeting.

Further, the facilities issue is alleviated through hosting meetings,training, and conferences in Virtual World's. Rather than rentingexpensive meeting facilities, and providing expensive real displayfixtures and furniture, a company can configure a virtual meeting in avirtual world which has all of the “appearance” factors as desired at afraction of the costs of a corresponding real-world meeting space. Evenbetter, the virtual meeting space can be reconfigured as needed, such asexpanding the space when a larger-than-expected attendee group “signsup” to attend.

Since many original virtual worlds did not restrict where players could“go” within the world, except for restrictions placed on certain levelsor privileges for each player, in order to host business-to-businessfunctions, some modifications to the virtual world systems were made.

Chief among these modifications were definitions and controls put inplace to allow definition of “private virtual worlds”, where one or moreusers could control which other users could “enter” the private virtualworld. This allows a company such as IBM to create multiple privatevirtual worlds within a virtual world system, such as Second Life, forthe purposes of employee training, customer meetings, etc., without theconcern for third-parties accessing sensitive or confidentialinformation.

SUMMARY OF THE INVENTION

A system and method for allowing an administrator or program to select aregion or set of avatars in a virtual universe grid for splitting intoanother, separate and distinct virtual universe grid is provided. If aregion is selected, all of the avatars and virtual universe resourcesassociated with the region are locked, their data is retrieved, andanother separate virtual universe grid is commanded to create and insertthe avatars and resources in it. If avatars are selected, all of theresources, scripts, histories, and information regarding the selectedavatars are retrieved, and the avatars are locked in the sourceuniverse. Then, another, separate virtual universe grid is commanded tocreate universe user identifiers for the avatars, and they are insertedinto the separate VU grid. Cleanup includes deleting the region and/oravatars from the first (source) virtual universe grid.

BRIEF DESCRIPTION OF THE DRAWINGS

The following detailed description when taken in conjunction with thefigures presented herein provide a complete disclosure of the invention.

FIGS. 1 a and 1 b set forth high level phases of processes according tothe present invention.

FIGS. 2 a and 2 b show a generalized computing platform architecture,and a generalized organization of software and firmware of such acomputing platform architecture.

FIG. 3 a sets forth a logical process to deploy software to a client inwhich the deployed software embodies the methods and processes of thepresent and related inventions.

FIG. 3 b sets forth a logical process to integrate software to othersoftware programs in which the integrated software embodies the methodsand processes of the present and related inventions.

FIG. 3 c sets forth a logical process to execute software on behalf of aclient in an on-demand computing system, in which the executed softwareembodies the methods and processes of the present and relatedinventions.

FIG. 3 d sets forth a logical process to deploy software to a client viaa virtual private network, in which the deployed software embodies themethods and processes of the present and related inventions.

FIGS. 4 a, 4 b and 4 c, illustrate computer readable media of variousremovable and fixed types, signal transceivers, andparallel-to-serial-to-parallel signal circuits.

FIG. 5 illustrates arrangements of systems and networks used in order tointeract with a virtual world server.

FIG. 6 provides additional information regarding primary components orfunctional sub-systems of a virtual world server.

FIG. 7 depicts interactions between various types of users and majorfunctional portions of a virtual world server.

FIG. 8 illustrates a hypothetical three-dimensional view of a “world”scenario in which a virtual meeting, presentation, or conference isbeing held.

FIG. 9 shows a multi-virtual-world arrangement of systems in which theuser can command a split of a first virtual world into two or moredistinct virtual worlds.

FIGS. 9 a and 9 b set forth alternative detailed logical processesaccording to the present invention.

DETAILED DESCRIPTIONS OF EXEMPLARY EMBODIMENTS OF THE INVENTION

The inventors of the present invention have recognized and solvedproblems previously unrecognized by others in the art of managingvirtual world resources, especially in the context of splitting a firstvirtual world into two or more virtual worlds.

Suitable Computing Platform

Whereas at least one embodiment of the present invention incorporates,uses, or operates on, with, or through one or more computing platforms,and whereas many devices, even purpose-specific devices, are actuallybased upon computing platforms of one type or another, it is useful todescribe a suitable computing platform, its characteristics, and itscapabilities.

Therefore, it is useful to review a generalized architecture of acomputing platform which may span the range of implementation, from ahigh-end web or enterprise server platform, to a personal computer, to aportable PDA or wireless phone.

In one embodiment of the invention, the functionality including thepreviously described logical processes are performed in part or whollyby software executed by a computer, such as personal computers, webservers, web browsers, or even an appropriately capable portablecomputing platform, such as personal digital assistant (“PDA”),web-enabled wireless telephone, or other type of personal informationmanagement (“PIM”) device. In alternate embodiments, some or all of thefunctionality of the invention are realized in other logical forms, suchas circuitry.

Turning to FIG. 2 a, a generalized architecture is presented including acentral processing unit (21) (“CPU”), which is typically comprised of amicroprocessor (22) associated with random access memory (“RAM”) (24)and read-only memory (“ROM”) (25). Often, the CPU (21) is also providedwith cache memory (23) and programmable FlashROM (26). The interface(27) between the microprocessor (22) and the various types of CPU memoryis often referred to as a “local bus”, but also may be a more generic orindustry standard bus.

Many computing platforms are also provided with one or more storagedrives (29), such as hard-disk drives (“HDD”), floppy disk drives,compact disc drives (CD, CD-R, CD-RW, DVD, DVD-R, etc.), and proprietarydisk and tape drives (e.g., Iomega Zip™ and Jaz™, Addonics SuperDisk™,etc.). Additionally, some storage drives may be accessible over acomputer network.

Many computing platforms are provided with one or more communicationinterfaces (210), according to the function intended of the computingplatform. For example, a personal computer is often provided with a highspeed serial port (RS-232, RS-422, etc.), an enhanced parallel port(“EPP”), and one or more universal serial bus (“USB”) ports. Thecomputing platform may also be provided with a local area network(“LAN”) interface, such as an Ethernet card, and other high-speedinterfaces such as the High Performance Serial Bus IEEE-1394.

Computing platforms such as wireless telephones and wireless networkedPDA's may also be provided with a radio frequency (“RF”) interface withantenna, as well. In some cases, the computing platform may be providedwith an infrared data arrangement (“IrDA”) interface, too.

Computing platforms are often equipped with one or more internalexpansion slots (211), such as Industry Standard Architecture (“ISA”),Enhanced Industry Standard Architecture (“EISA”), Peripheral ComponentInterconnect (“PCI”), or proprietary interface slots for the addition ofother hardware, such as sound cards, memory boards, and graphicsaccelerators.

Additionally, many units, such as laptop computers and PDA's, areprovided with one or more external expansion slots (212) allowing theuser the ability to easily install and remove hardware expansiondevices, such as PCMCIA cards, SmartMedia cards, and various proprietarymodules such as removable hard drives, CD drives, and floppy drives.

Often, the storage drives (29), communication interfaces (210), internalexpansion slots (211) and external expansion slots (212) areinterconnected with the CPU (21) via a standard or industry open busarchitecture (28), such as ISA, EISA, or PCI. In many cases, the bus(28) may be of a proprietary design.

A computing platform is usually provided with one or more user inputdevices, such as a keyboard or a keypad (216), and mouse or pointerdevice (217), and/or a touch-screen display (218). In the case of apersonal computer, a full size keyboard is often provided along with amouse or pointer device, such as a track ball or TrackPoint™. In thecase of a web-enabled wireless telephone, a simple keypad may beprovided with one or more function-specific keys. In the case of a PDA,a touch-screen (218) is usually provided, often with handwritingrecognition capabilities.

Additionally, a microphone (219), such as the microphone of aweb-enabled wireless telephone or the microphone of a personal computer,is supplied with the computing platform. This microphone may be used forsimply reporting audio and voice signals, and it may also be used forentering user choices, such as voice navigation of web sites orauto-dialing telephone numbers, using voice recognition capabilities.

Many computing platforms are also equipped with a camera device (2100),such as a still digital camera or full motion video digital camera.

One or more user output devices, such as a display (213), are alsoprovided with most computing platforms. The display (213) may take manyforms, including a Cathode Ray Tube (“CRT”), a Thin Flat Transistor(“TFT”) array, or a simple set of light emitting diodes (“LED”) orliquid crystal display (“LCD”) indicators.

One or more speakers (214) and/or annunciators (215) are oftenassociated with computing platforms, too. The speakers (214) may be usedto reproduce audio and music, such as the speaker of a wirelesstelephone or the speakers of a personal computer. Annunciators (215) maytake the form of simple beep emitters or buzzers, commonly found oncertain devices such as PDAs and PIMs.

These user input and output devices may be directly interconnected (28′,28″) to the CPU (21) via a proprietary bus structure and/or interfaces,or they may be interconnected through one or more industry open busessuch as ISA, EISA, PCI, etc. The computing platform is also providedwith one or more software and firmware (2101) programs to implement thedesired functionality of the computing platforms.

Turning to now FIG. 2 b, more detail is given of a generalizedorganization of software and firmware (2101) on this range of computingplatforms. One or more operating system (“OS”) native applicationprograms (223) may be provided on the computing platform, such as wordprocessors, spreadsheets, contact management utilities, address book,calendar, email client, presentation, financial and bookkeepingprograms.

Additionally, one or more “portable” or device-independent programs(224) may be provided, which must be interpreted by an OS-nativeplatform-specific interpreter (225), such as Java™ scripts and programs.

Often, computing platforms are also provided with a form of web browseror micro-browser (226), which may also include one or more extensions tothe browser such as browser plug-ins (227).

The computing device is often provided with an operating system (220),such as Microsoft Windows™, UNIX, IBM OS/2™, IBM AIX™, open sourceLINUX, Apple's MAC OS™, or other platform specific operating systems.Smaller devices such as PDA's and wireless telephones may be equippedwith other forms of operating systems such as real-time operatingsystems (“RTOS”) or Palm Computing's PalmOS™.

A set of basic input and output functions (“BIOS”) and hardware devicedrivers (221) are often provided to allow the operating system (220) andprograms to interface to and control the specific hardware functionsprovided with the computing platform.

Additionally, one or more embedded firmware programs (222) are commonlyprovided with many computing platforms, which are executed by onboard or“embedded” microprocessors as part of the peripheral device, such as amicro controller or a hard drive, a communication processor, networkinterface card, or sound or graphics card.

As such. FIGS. 2 a and 2 b describe in a general sense the varioushardware components, software and firmware programs of a wide variety ofcomputing platforms, including but not limited to personal computers,PDAs, PIMs, web-enabled telephones, and other appliances such as WebTV™units. As such, we now turn our attention to disclosure of the presentinvention relative to the processes and methods preferably implementedas software and firmware on such a computing platform. It will bereadily recognized by those skilled in the art that the followingmethods and processes may be alternatively realized as hardwarefunctions, in part or in whole, without departing from the spirit andscope of the invention.

Computer-Readable Media Embodiments

In another embodiment of the invention, logical processes according tothe invention and described herein are encoded on or in one or morecomputer-readable media. Some computer-readable media are read-only(e.g. they must be initially programmed using a different device thanthat which is ultimately used to read the data from the media), some arewrite-only (e.g. from the data encoders perspective they can only beencoded, but not read simultaneously), or read-write. Still some othermedia are write-once, read-many-times.

Some media are relatively fixed in their mounting mechanisms, whileothers are removable, or even transmittable. All computer-readable mediaform two types of systems when encoded with data and/or computersoftware: (a) when removed from a drive or reading mechanism, they arememory devices which generate useful data-driven outputs when stimulatedwith appropriate electromagnetic, electronic, and/or optical signals;and (b) when installed in a drive or reading device, they form a datarepository system accessible by a computer.

FIG. 4 a illustrates some computer readable media including a computerhard drive (40) having one or more magnetically encoded platters ordisks (41), which may be read, written, or both, by one or more heads(42). Such hard drives are typically semi-permanently mounted into acomplete drive unit, which may then be integrated into a configurablecomputer system such as a Personal Computer, Server Computer, or thelike.

Similarly, another form of computer readable media is a flexible,removable “floppy disk” (43), which is inserted into a drive whichhouses an access head. The floppy disk typically includes a flexible,magnetically encodable disk which is accessible by the drive headthrough a window (45) in a sliding cover (44).

A Compact Disk (“CD”) (46) is usually a plastic disk which is encodedusing an optical and/or magneto-optical process, and then is read usinggenerally an optical process. Some CD's are read-only (“CD-ROM”), andare mass produced prior to distribution and use by reading-types ofdrives. Other CD's are writable (e.g. “CD-RW”, “CD-R”), either once ormany time. Digital Versatile Disks (“DVD”) are advanced versions of CD'swhich often include double-sided encoding of data, and even multiplelayer encoding of data. Like a floppy disk, a CD or DVD is a removablemedia.

Another common type of removable media are several types of removablecircuit-based (e.g. solid state) memory devices, such as Compact Flash(“CF”) (47), Secure Data (“SD”), Sony's Memory Stick, Universal SerialBus (“USB”) FlashDrives and “Thumbdrives” (49), and others. Thesedevices are typically plastic housings which incorporate a digitalmemory chip, such as a battery-backed random access chip (“RAM”), or aFlash Read-Only Memory (“FlashROM”). Available to the external portionof the media is one or more electronic connectors (48, 400) for engaginga connector, such as a CF drive slot or a USB slot. Devices such as aUSB FlashDrive are accessed using a serial data methodology, where otherdevices such as the CF are accessed using a parallel methodology. Thesedevices often offer faster access times than disk-based media, as wellas increased reliability and decreased susceptibility to mechanicalshock and vibration. Often, they provide less storage capability thancomparably priced disk-based media.

Yet another type of computer readable media device is a memory module(403), often referred to as a SIMM or DIMM. Similar to the CF, SD, andFlashDrives, these modules incorporate one or more memory devices (402),such as Dynamic RAM (“DRAM”), mounted on a circuit board (401) havingone or more electronic connectors for engaging and interfacing toanother circuit, such as a Personal Computer motherboard. These types ofmemory modules are not usually encased in an outer housing, as they areintended for installation by trained technicians, and are generallyprotected by a larger outer housing such as a Personal Computer chassis.

Turning now to FIG. 4 b, another embodiment option (405) of the presentinvention is shown in which a computer-readable signal is encoded withsoftware, data, or both, which implement logical processes according tothe invention. FIG. 4 b is generalized to represent the functionality ofwireless, wired, electro-optical, and optical signaling systems. Forexample, the system shown in FIG. 4 b can be realized in a mannersuitable for wireless transmission over Radio Frequencies (“RF”), aswell as over optical signals, such as InfraRed Data Arrangement(“IrDA”). The system of FIG. 4 b may also be realized in another mannerto serve as a data transmitter, data receiver, or data transceiver for aUSB system, such as a drive to read the aforementioned USB FlashDrive,or to access the serially-stored data on a disk, such as a CD or harddrive platter.

In general, a microprocessor or microcontroller (406) reads, writes, orboth, data to/from storage for data, program, or both (407). A datainterface (409), optionally including a digital-to-analog converter,cooperates with an optional protocol stack (408), to send, receive, ortransceive data between the system front-end (410) and themicroprocessor (406). The protocol stack is adapted to the signal typebeing sent, received, or transceived. For example, in a Local AreaNetwork (“LAN”) embodiment, the protocol stack may implementTransmission Control Protocol/Internet Protocol (“TCP/IP”). In acomputer-to-computer or computer-to-peripheral embodiment, the protocolstack may implement all or portions of USB, “FireWire”, RS-232,Point-to-Point Protocol (“PPP”), etc.

The system's front-end, or analog front-end, is adapted to the signaltype being modulated, demodulate, or transcoded. For example, in anRF-based (413) system, the analog front-end comprises various localoscillators, modulators, demodulators, etc., which implement signalingformats such as Frequency Modulation (“FM”), Amplitude Modulation(“AM”), Phase Modulation (“PM”), Pulse Code Modulation (“PCM”), etc.Such an RF-based embodiment typically includes an antenna (414) fortransmitting, receiving, or transceiving electro-magnetic signals viaopen air, water, earth, or via RF wave guides and coaxial cable. Somecommon open air transmission standards are BlueTooth, Global Servicesfor Mobile Communications (“GSM”), Time Division Multiple Access(“TDMA”), Advanced Mobile Phone Service (“AMPS”), and Wireless Fidelity(“Wi-Fi”).

In another example embodiment, the analog front-end may be adapted tosending, receiving, or transceiving signals via an optical interface(415), such as laser-based optical interfaces (e.g. Wavelength DivisionMultiplexed, SONET, etc.), or Infra Red Data Arrangement (“IrDA”)interfaces (416). Similarly, the analog front-end may be adapted tosending, receiving, or transceiving signals via cable (412) using acable interface, which also includes embodiments such as USB, Ethernet,LAN, twisted-pair, coax, Plain-old Telephone Service (“POTS”), etc.

Signals transmitted, received, or transceived, as well as data encodedon disks or in memory devices, may be encoded to protect it fromunauthorized decoding and use. Other types of encoding may be employedto allow for error detection, and in some cases, correction, such as byaddition of parity bits or Cyclic Redundancy Codes (“CRC”). Still othertypes of encoding may be employed to allow directing or “routing” ofdata to the correct destination, such as packet and frame-basedprotocols.

FIG. 4 c illustrates conversion systems which convert parallel data toand from serial data. Parallel data is most often directly usable bymicroprocessors, often formatted in 8-bit wide bytes, 16-bit wide words,32-bit wide double words, etc. Parallel data can represent executable orinterpretable software, or it may represent data values, for use by acomputer. Data is often serialized in order to transmit it over a media,such as a RF or optical channel, or to record it onto a media, such as adisk. As such, many computer-readable media systems include circuits,software, or both, to perform data serialization and re-parallelization.

Parallel data (421) can be represented as the flow of data signalsaligned in time, such that parallel data unit (byte, word, d-word, etc.)(422, 423, 424) is transmitted with each bit D₀-D_(n) being on a bus orsignal carrier simultaneously, where the “width” of the data unit isn−1. In some systems. D₀ is used to represent the least significant bit(“LSB”), and in other systems, it represents the most significant bit(“MSB”). Data is serialized (421) by sending one bit at a time, suchthat each data unit (422, 423, 424) is sent in serial fashion, one afteranother, typically according to a protocol.

As such, the parallel data stored in computer memory (407, 407′) isoften accessed by a microprocessor or Parallel-to-Serial Converter (425,425′) via a parallel bus (421), and exchanged (e.g. transmitted,received, or transceived) via a serial bus (421′). Received serial datais converted back into parallel data before storing it in computermemory, usually. The serial bus (421′) generalized in FIG. 4 c may be awired bus, such as USB or Firewire, or a wireless communications medium,such as an RF or optical channel, as previously discussed.

In these manners, various embodiments of the invention may be realizedby encoding software, data, or both, according to the logical processesof the invention, into one or more computer-readable mediums, therebyyielding a product of manufacture and a system which, when properlyread, received, or decoded, yields useful programming instructions,data, or both, including, but not limited to, the computer-readablemedia types described in the foregoing paragraphs.

General Arrangements of Virtual Worlds

Turning to FIG. 5, a general arrangement of components, networks, andusers of a virtual world is shown. A virtual world server (18) isinterconnected through a data network (51), such as the Internet or anintranet, or a telephone network (52), such as a public switchedtelephone network (“PSTN”) or a digital telephone network (e.g. digitalcellular, Integrated Services Digital Network, Digital Subscriber Line,etc.). Many virtual world server's are interconnected to a combinationor data and telephone networks, whereas the convergence of the two typesof networks have rendered some networks difficult to clearly distinguishas exclusively data or telephone. For example, Voice over Internet(“VoIP”) protocol has allowed telephone calls to be carried bytraditionally data-only networks. And, Modulate-Demodulate (“modem”)devices have long since allowed data communications over telephonelines. Further, traditionally content oriented networks, such as cabletelevision networks, have also been adapted to carry digitized telephonecalls and data connections to the Internet.

Of particular popularity in recent years are various types of wirelessnetworks, from cellular telephone networks, to shorter range networks,such as “WiFi” and Blue Tooth networks, some of which use “towers” (507)and others of which use wireless access points (506) to interconnect awireless device to a wired network.

In the arrangement of FIG. 5, users (501-505) access the Virtual Worldserver (18) though the various networks (51, 52) using terminal devicessuch as a personal computer (“PC”) with a local area network (“LAN”)interface, a wireless terminal such as a cellular telephone or “WiFi”equipped laptop PC, or even a PC with a telephone or cable modem.

Major Functions of a Virtual World Server

FIG. 6 shows some of the major or primary functions of a Virtual Worldserver (18) which is interconnected to one or more user's via theirterminals (60) through one or more networks (51, 52). This depiction isa generalization of a virtual world environment, whereas specificvirtual world platforms are, to date, typically proprietary in nature.As such, FIG. 6 is presented for reference only, and for the ease ofunderstanding the present invention. It is within the skill of those inthe art to adapt, configure, and implement the invention, as describedherein, within a specific, proprietary virtual world environment.

Within the Virtual World server (18), there are a number of applicationprograms (65) running, which utilize or game data (61), Virtual Worldresources (63), user account information (62) and profile (64). Suchapplication programs, and extensions thereto, are often provided ordeveloped in programming languages such as C or Python.

The Virtual World server (18) has integrated into it one or moremicroprocessors, memory devices and sub-systems, and communicationsbandwidth or capabilities (66).

Most virtual world servers can maintain and operate more than one“virtual worlds” simultaneously (67). In each of the virtual world'sscenarios or sub-worlds (69), user's can use a different or the sameavatars (68) to represent themselves.

Underlying Mechanisms of Interaction

FIG. 7 illustrates a generalized arrangement of a virtual world systemwhich allows the users to interact with each other and with thescenarios created by and maintained by the Virtual World server. Thisdepiction is a generalization of a virtual world interaction scheme,whereas specific virtual world platforms are, to date, typicallyproprietary in nature. As such. FIG. 7 is presented for reference only,and for the ease of understanding the present invention. It is withinthe skill of those in the art to adapt, configure, and implement theinvention, as described herein, within a specific, proprietary virtualworld environment.

In many scenarios, the users are divided into two or more classes ofuser, such as a presenter (70) and attendees (71). Each class of usermay have greater or fewer capabilities within the world, such as apresenter being allowed to share a desktop presentation file with theattendees, but the attendees not being able to share their own desktopapplications with other attendees.

In such an arrangement, the primary method of interaction between usersand the applications of the Virtual World server is through a variety ofmessaging capabilities (34), such as VoIP, text messaging (“SMS”),instant messaging (e.g. America Online's Instant Messenger or Lotus'SameTime), electronic mail, telephone audio, internet cameraaudio/video, application programming interfaces (“API”), shared desktoptechnologies, and the like.

For example, during a Virtual World conference or presentation, the realpresenter (70) may communicate (75, 75′) with the real attendees (71)via their virtual presences (e.g. avatars) of the virtual scenario.Further, the real presenter (70) may also communicate (77) with ascenario manager portion (73) of the Virtual World server to accomplishsuch functions as reserving resources necessary to create and maintainthe virtual scenario, freezing the scenario, and controlling attendanceto the scenario. The real presenter may also communicate (76) withportions of the Virtual World “engine” (72) to accomplish otheradministrative functions, as may be necessary.

Illustrative Virtual Scenario

Many virtual worlds provide a three-dimensional visual simulation ofeach sub-world or scenario, accompanied by appropriate text and/oraudio, in order to provide a believable, but not necessarily“realistic”, rendering of the scenario to the users. For example, in“fantasy” scenarios, avatars of users may be animals, hypotheticalcreatures, etc., and the landscape of the scenario may be another plantor a future civilization.

However, in many business-to-business scenarios, such as corporatemeetings or training sessions, the scenarios are more realistic in theirappearance, albeit still virtual.

Turning to FIG. 8, an example depiction of such a realistic scenario isprovided, in which the avatar (81′) for the real meeting facilitator isshown along side a virtual presentation screen (82) as if thefacilitator were in a real meeting room with walls (83, 84, 85), and afloor area where the avatars (81′) of the meeting attendees are shown.

To enhance the experience, the virtual presentation screen may show aportion of the facilitator's actual terminal device's screen, such as aportion of a Microsoft Windows™ desktop interface, or may be filled withinformation provided to the Virtual World server from an applicationprogram, such as a mobile phone or PDA-based presentation program. Stillfurther to enhance the virtual conference experience, the virtual wallsare decorated according to the presenter's (or other administrator's)preferences, including coverings, skins, or lighting (88), and/or one ormore company logos (84).

In such a scenario, the presenter or administrator of the virtualconference schedules, reserves, or otherwise configures theseenvironment choices, including possibly restrictions as to which otherusers may be attendees. Such scheduling and reservation activities areusually performed in advance, and may need to be revised as the numberof virtual attendees becomes more and more certain closer to time of thevirtual conference.

For the purposes of this disclosure, the term “scheduling” of virtualworld “resources” will be used to refer to such activities as requestingin advance, configuring, enabling, disabling, limiting, enumerating,revising, or otherwise controlling virtual environment characteristics,attendee lists, attendee capabilities, etc.

Problem Recognized by the Inventors

The present invention solves a problem not recognized by those in theart, which is that shown in FIG. 9, in which multiple virtual worldplatforms and systems have evolved and been deployed, none of whichbeing capable of interacting with each other. In many ways, it could besaid that today's virtual worlds are “islands” to themselves due totheir technical limitations (e.g. proprietary design natures), and duein part to their previous market appeal (e.g. only to their own clientor user base).

Regions in a VU are independent of each other from an infrastructureperspective. For example, in Second Life, regions are often run on asingle core of a 2-CPU, 2-core Linux system (so each computer can runfour simulators). When the simulator software starts up, it joins a poolof similarly-configured systems waiting to be assigned a region to run.When a new region is created, its configuration (land layout, waterlayout, textures, etcetera) is stored in a database, and then randomlyassigned to one of the spare simulators in the pool.

In the near future, it is expected that it will become more common tohave different service providers for VU grid software. Recently, LindenLab open-sourced its client software that they use for Second Life,making this possibility much more likely. One problem with running VUgrids with different service providers is that currently, no connectionexists to the central asset server or login servers. The asset servercontains each avatar's inventory, and all the objects, scripts andtextures used in-world. This database may be strained with a largenumber of users (such as 18,000+ for Second Life).

Recently, Linden Labs demonstrated a “sim-in-a-box.” It contains all thehardware and software needed to run a single, stand-alone region, butwith no connections to the current Asset or Login server connections.With this, every user logging in would have to create a new accountagain for this stand-alone VU, and everyone would start with “noinventory,” that is, having to rebuild their avatar's inventory fromscratch.

The inventors have recognized a problem which is expected to arise inthe near future when VU users desire to split VUs for different serviceproviders and “sim-in-a-box” VUs. Splits will be desired for a number ofreasons. For example, a corporate divestiture of a business unit or needto restructure VUs along organizational lines, resulting in IT systemdivision; or a desire to split to decrease the total population of theVU (such as if degrading performance or experiential clutter had beenreported), may drive a need for a VU split.

In the near future, as companies that oversee virtual universes splitand merge (e.g. consolidate and undergo financial buy-outs), a need foraccomplishing such splitting and merging becomes apparent.

Overview of the Solution and Approach

Generally speaking, the methodology devised by the inventors to divideVirtual Universes by regions has two major phases, as shown in FIG. 1 a:

-   -   (a) split selected regions by “cutting” areas out at selected        destination region edges (10); and    -   (b) redistribute selected accounts, avatars, and their inventory        (11).

The term “cutting” refers to a three-dimensional geometrical division ofVU regions, as would be accomplished by identifying borders of land forremoval, and its process and is described in further detail in thefollowing paragraphs.

Alternatively, avatars can be selected (12), and their relatedhistories, scripts, and inventories inserted into a new VirtualUniverse, deleting their related data from the source universe (13).

As such, the invention allows selected regions, or even just a sub-setof the users in a parent VU, to be split off of the parent VU grid andplaced into one or more new VUs.

Implementation and Logical Processes

The following paragraphs are suitable for implementation as softwareexecuted by computers (e.g. servers, clients, or both), circuitrycoupled with electronic devices, or a combination of software andcircuitry.

While the examples provided herein will refer to Linden Labs'SecondLife™, it is within the skill in the art to adapt the invention torealize it in conjunction with a wide variety of virtual world systems,including but not limited to Sony's Everquest™, Terra ICT's Dreamville™,Dubit Limited's Dubit™, Voltweb Limited's TowerChat™, Lightmaker'sVirtual Ibiza™, Bongartz Dr Kozan GbR's Moove™, Sulake Corporation Oy'sHabbo Hotel, Playdo's Playdo™, Siliconmania's “whyrobbierocks<dot>com”™,Voodoo Chat, Adobe's Atmosphere™, Daimler Chrysler's MobileKids,Blizzard's World of Warcraft™, America's Army, Forterra Systems'products, Tate's agoraXchange™, Activeworlds, Coca Cola's Coke Studios™,Integrated Virtual Networks' Cybertown™, Walt Disney Internet Group'sToontown™, Disney Online's Virtual Magic Kingdom™, MadWolf Software's“The Manor”™, Muse Communications' “Muse”™, Electronic Arts' SimsOnline™, Tomo Software's Sora City™, There Incorporated's “There”™, TheDigital Space Commons' Traveler™, Halsoft's VPchat™, StratagemCorporation's VZones™, Numedeon's Whyville™, Worlds<dot>com™, and ThreeRings' “Yohoho! Puzzle Pirates”™.

These methods require a modification to VU grid software where anew-migration tool will be created and operate according to the stepsbelow. This migration tool may need to have connectivity andadministrator access to the VU grid to be split, and in particular haveread-write access to the VU's databases, depending on details of thedesign of the VU to which the invention is being coupled. This tool willact as a bridge where migration transactions can be initiated andconfirmed.

For reference, in the following details, the inventors talk aboutsplitting VU grid 2 out of VU grid 1. These methods may be performedwhen VU grid 1 is functioning or when it is offline. If the gridmigration is performed while a region is on-line, there may be someperiod of time when an avatar from VU grid 1 will have its region andland unavailable (or partially available) while it is placed into VUgrid 2. The inventors also describe the method in a preferredembodiment, which would be able to split VUs without suspending service.

For greater understanding of the invention, two methods or approachesare now described.

Method 1: “Split regions by cutting areas out at selected destinationregion edges”. This method describes how to technically split regions(land, buildings, and environment objects). This method is preferablyimplemented from the migration tool. Referring to FIG. 9 a, a firstmethod according to the present invention includes steps as follows:

-   A. Using a user interface (90), such as a remote interface via a web    browser, an administrator selects (91) region edges from VU grid 1    (92) that will be cut. That is, the coordinate lines at which an    avatar traveling from, for example, VU grid 1 region 1 into VU grid    region 2, will no longer be able to do the removal of the region at    those coordinate lines. This will preferably be done via a “cut and    paste” graphical representation of the regions, as downloaded and    rendered in map form by the migration tool, although other    implementations are likewise possible.-   B. The invention sends instructions to VU grid 1 to lock (92) the    region(s) to be split so that no new avatars may enter and no    modification may be made. The locking will preferably teleport    rather than disconnect any avatars who are in the region at the time    of the lock.-   C. The invention sends a select query to VU grid 1 to retrieve (93)    all of the regions' data (96).-   D. The invention then stores (94) the data retrieved in the previous    step into a temporary table (95).-   E. Next, the invention sends a delete query to VU grid 1 (92) to    delete (97) the data for the new region (Region 2) selected in the    previous step.-   F. The invention also invokes process to create (98) a new, blank VU    grid 2 (99).-   G. The invention then sends an insert query (98) to new VU grid 2    (99) using the VU grid 1 data (96) from the temporary table (95) to    place the avatars, resources, and context states into the new grid    for the second region, thereby leaving the first region (and its    resources, avatars, etc.) in VU grid 1 (92), and moving the second    region's resources into VU grid 2 (99).

If the administrator has cut 3 or more regions, this process (91-900) isrepeated (900) for each region, wherein the resources for each regionare selected (93), stored in a table (95), deleted from the first VUgrid (92), and inserted (900) into a new VU grid for each region.

Method 2: Split accounts, avatars, and their inventories. An alternativemethod according to the invention splits user accounts, their associatedavatars, and their inventories items into a separate VU grid. Referringto FIG. 9 b, a first method according to the present invention includessteps as follows:

-   A. An administrator or automated program (90) selects (910) avatars    from VU grid 1 (92) that will be split from VU grid 1 into VU grid    2. An automated program may identify users to split based on the    following steps:    -   1) If in an embodiment that is in combination with Method 1,        users who own land or buildings within regions that were        selected to be split in Method 1 step 1.    -   2) If in an embodiment that is in combination with Method 1,        users whose time within regions that were selected to be split        is greater than their time within regions that will remain.    -   3) Users who meet criteria of the VU grid owners, such as:        -   i) Users who have been relatively active or inactive in            relation to other users, such as measured by login time or            transactions within a specified date range;        -   ii) Users who have been relatively reputable or disreputable            in relation to other users, such as measured by any            reputation flags, reports, disciplinary actions logged in            the database, etc.;        -   iii) Users who have spent a lot or a little real world money            within the VU relative to other users;        -   iv) Users associated or not associated with a particular            group, such as all;        -   v) Users that meet any other measurable criteria.    -   4) If a specified number or percentage of users needed to be        split has been exceeded, remove from selection according to        administrator-specified exception rules, such as to back out        users that were selected in step A.3.iv, then A.3.iii, etc., and        then repeat this step.    -   5) If a specified number or percentage of users needed to be        split has been selected, continue, otherwise, modify criteria in        step 1.c according to administrator-specified exception rules,        such as to add additional criteria, or to relax thresholds of        1.c.i, etcetera, and then repeat this step. Note that it is        possible in step A for there to be no criteria and no specified        number or percentage of users needed to be split.-   B. The invention sends instructions to VU grid 1 (92) to lock (911)    the user account(s) so that no avatar or inventory modification may    be made. The locking will preferably include or be preceded by    notification to the users.-   C. The invention then sends (912) a select query to VU grid 1 (92)    to retrieve all of the account, avatar, and inventory data, for the    locked avatars. This includes any related data such as history and    scripts.-   D. The invention then stores (914) the data (913) retrieved in the    previous step into a temporary table (915).-   E. The invention generates (917) new UUIDs of all extracted VU grid    1 objects (avatars and all inventory items) using VU grid 2's UUID    generation routine.-   F. An insert query is sent (918) to VU grid 2 (99) using the VU grid    1 data from the temporary table. Instructions are also sent to VU    grid 2 to invoke any generation routines normally invoked upon user    or inventory creation, such as updating notice boards, web site    statistics, etc.

If more avatars are to be moved to separate VU grids, steps 910-918 arerepeated (919) for each avatars to be moved into each additional VUgrid.

Optionally, commands can be sent to VU grid 1 to delete the movedavatars (916) (delete the user data and all descendent objects such asavatars, inventory, history, scripts, etc.), as well as to log-off theuser account(s) to be moved who are currently logged in to VU grid 1.Also, instructions may be sent to VU grid 1 to invoke any routinesnormally invoked upon account deletion.

Preferably, a temporary table is inserted on VU grid 1 with the deletedor moved account IDs with their passwords, so that any user attemptingto re-login to VU grid 1 using one of these IDs and passwordcombinations can be notified of the relocation of the account(s). Thistemporary table may be purged at a desired time, such as after a singlelogin of each stored ID, or after a certain period of time.

Other Methods and Variations. The methods described above may be ordereddifferently, and steps may not be committed in the databases until otheror all steps have been completed. Such variations will be recognized bythose skilled in the art as failing within the scope and framework ofthe present invention.

Usage Example Scenarios

In the following scenarios, the first method would be useful:

(1) VU grid 1 owner realizes there is too much space relative to thepopulation, resulting in wasted server resources and reduced userinteraction. Fewer regions would condense the population and reduce thenumber of servers required. Note that in this case, the split regionsmight be purged rather than used to create VU grid 2.(2) VU grid 2 owner would like to pay for exclusive rights to selectregions of VU grid 1. Therefore, the regions must first be split.

In the following scenarios, the second method would be useful:

(1) The reason for a split is purely to decrease population density, andso splitting regions would not be desired. The users split from VU grid1 are to be abandoned or later merged into another VU grid.(2) Another VU grid provider has purchased a subset of VU grid 1'susers, and so they must first be split out of VU grid 1.

CONCLUSION

While certain examples and details of a preferred embodiment have beendisclosed, it will be recognized by those skilled in the art thatvariations in implementation such as use of different programmingmethodologies, computing platforms, and processing technologies, may beadopted without departing from the spirit and scope of the presentinvention. Therefore, the scope of the invention should be determined bythe following claims.

1. A method for splitting an existing virtual universe context bydesignating one or more regions to separate from the existing virtualuniverse comprising the steps of: providing a user interface throughwhich an administrator selects region edges within a first virtualuniverse grid; instructing said first virtual universe grid to lockavatars, resources, scripts, and other universe assets within orassociated with said selected region in order 10 prevent any avatarsentering or exiting said selected region, and in order to prevent anychanges to an environment within said selected region; retrievingcontext data for said selected region from said first virtual universegrid, storing said context data in a temporary table; commanding saidfirst virtual universe grid to delete all avatars, resources, scripts,and other universe assets within or associated with said selectedregion; invoking a creation operation in a second virtual universe gridto establish a second virtual universe grid which is new, empty orblank; and instructing said second virtual universe grid to insertavatars, resources, scripts, context states and other universe assetscorresponding to context data stored in said temporary table, therebyestablishing a virtual universe grid separate and distinct from saidfirst virtual universe grid, and replicating said selected region ofsaid first virtual universe grid.
 2. The method as set forth in claim 1wherein said user interface comprises a remote interface via a webbrowser.
 3. The method as set forth in claim 1 wherein said steps ofselecting region edges comprises a cut-and-paste graphical userinterface paradigm.
 4. The method as set forth in claim 3 wherein saidcut-and-paste paradigm comprises downloading and rendering a map formrepresentation of said first virtual universe to said user interface. 5.The method as set forth in claim 1 wherein said step of lockingcomprises automatically teleporting any avatars which are in saidselected region at a time of the lock.
 6. An article of manufacture forsplitting an existing virtual universe context by designating one ormore regions to separate from the existing virtual universe, the articlecomprising: a computer readable medium suitable for encoding computerprograms; and one or more computer programs encoded by said computerreadable medium configured to cause a processor to perform the steps of:(a) providing a user interface through which an administrator selectsregion edges within a first virtual universe grid; (b) instructing saidfirst virtual universe grid to lock avatars, resources, scripts, andother universe assets within or associated with said selected region inorder to prevent any avatars entering or exiting said selected region,and in order to prevent any changes to an environment within saidselected region; (c) retrieving context data for said selected regionfrom said first virtual universe grid, storing said context data in atemporary table; (d) commanding said first virtual universe grid todelete all avatars, resources, scripts, and other universe assets withinor associated with said selected region; (e) invoking a creationoperation in a second virtual universe grid to establish a secondvirtual universe grid which is new, empty or blank; and (f) instructingsaid second virtual universe grid to insert avatars, resources, scripts,context slates and other universe assets corresponding to context datastored in said temporary table, thereby establishing a virtual universegrid separate and distinct from said first virtual universe grid, andreplicating said selected region of said first virtual universe grid. 7.A system for splitting an existing virtual universe context bydesignating one or more regions to separate from the existing virtualuniverse comprising: a user interface portion of a virtual universesystem through which an administrator selects region edges within afirst virtual universe grid; an instruction sent by a controller portionof a virtual universe system to said first virtual universe grid to lockavatars, resources, scripts, and other universe assets within orassociated with said selected region in order to prevent any avatarsentering or exiting said selected region, and in order to prevent anychanges to an environment within said selected region; a portion ofcontext data for said selected region from said first virtual universegrid, retrieved and stored in a temporary table by said controllerportion; a command sent by said controller portion to said first virtualuniverse grid to delete all avatars, resources, scripts, and otheruniverse assets within or associated with said selected region; aninvocation initiated by said controller portion of a creation operationin a second virtual universe grid to establish a second virtual universegrid which is new, empty or blank; and an instruction sent by saidcontroller portion to said second virtual universe grid to insertavatars, resources, scripts, context states and other universe assetscorresponding to context data stored in said temporary table, therebyestablishing a virtual universe grid separate and distinct from saidfirst virtual universe grid, and replicating said selected region ofsaid first virtual universe grid.
 8. The system as set forth in claim 7wherein said user interface comprises a remote interface via a webbrowser.
 9. The system as set forth in claim 7 wherein said userinterface is configured to allow selecting region edges through aacut-and-paste graphical user interface paradigm.
 10. The system as setforth in claim 9 wherein said cut-and-paste paradigm comprises a mapform representation of said first virtual universe to said userinterface.
 11. The system as set forth in claim 7 wherein said lockinginstruction comprises an instruction to teleport any avatars which arein said selected region at a time of the lock.
 12. A method forsplitting an existing virtual universe context by designating one ormore avatars to be separated from the existing virtual universecomprising the steps of: selecting one or more avatars from a firstvirtual universe grid; instructing said first virtual universe grid tolock user accounts associated with said selected avatars in order toprevent avatar or inventory modification to said selected avatars;retrieving and storing account, avatar, and inventory data, for saidlocked avatars from said first virtual universe grid; commanding asecond virtual universe grid, distinct from said first virtual universegrid, to generate one or more new universe user identifierscorresponding to said stored data; and commanding said second virtualuniverse grid to insert said selected avatars into said second virtualuniverse grid.
 13. The method as set forth in claim 12 wherein said stepof commanding insertion of avatars further comprises commanding saidsecond virtual universe grid to perform an operation selected from thegroup of updating a notice board and updating a web site statistics. 14.The method as set forth in claim 12 wherein said step of selectingavatars comprises automatic selection of avatars based on a condition oranalysis selected from the group of selecting avatars which own land orbuildings within a designated virtual universe region, selecting avatarswhich have been located within a designated virtual universe region fora minimum period of time, avatars which have exceeded an activitythreshold, avatars which have failed to meet an activity threshold,avatars which have been designated as reputable, avatars which have beendesignated as disreputable, avatars for users who have expended aminimum amount of fees, and avatars associated with a group of avatars.15. The method as set forth in claim 12 wherein said step of retrievingaccount, avatar, and inventory data, for said locked avatars from saidfirst virtual universe grid comprises retrieving history and scriptsassociated with said locked avatars.
 16. A system for splitting anexisting virtual universe context by designating one or more avatars tobe separated from the existing virtual universe comprising: a userinterface portion of a virtual universe system configured to allow auser to select one or more avatars from a first virtual universe grid;an instruction issued by a controller portion of said first virtualuniverse grid to lock user accounts associated with said selectedavatars in order to prevent avatar or inventory modification to saidselected avatars; a block of account, avatar, and inventory data, forsaid locked avatars from said first virtual universe grid, retrieved andstored by said controller portion in a temporary table; a command sentfrom said controller portion to a second virtual universe grid, distinctfrom said first virtual universe grid, to generate one or more newuniverse user identifiers corresponding to said stored data; and acommand sent from said controller portion to said second virtualuniverse grid to insert said selected avatars into said second virtualuniverse grid.
 17. The system as set forth in claim 16 wherein saidinsertion command further comprises a command to said second virtualuniverse grid to perform an operation selected from the group ofupdating a notice board and updating a web site statistics.
 18. Thesystem as set forth in claim 16 wherein user interface is furtherconfigured to select avatars automatically based on a condition oranalysis selected from the group of selecting avatars which own land orbuildings within a designated virtual universe region, selecting avatarswhich have been located within a designated virtual universe region fora minimum period of time, avatars which have exceeded an activitythreshold, avatars which have failed to meet an activity threshold,avatars which have been designated as reputable, avatars which have beendesignated as disreputable, avatars for users who have expended aminimum amount of fees, and avatars associated with a group of avatars.19. The system as set forth in claim 16 wherein said retrieved account,avatar, and inventory data comprises retrieved history and scriptsassociated with said locked avatars.