Transposing virtual content between computing environments

ABSTRACT

A computerized method and processing system provides for transposing virtual content items between computing environments. The method and system includes receiving a transpose request to transpose a first item from the first computing environment to a second computing environment, including first item data relating to the first item. The method and system includes accessing a plurality of transpose rules relating to transposing the first item to the second computing environment and accessing environment data relating to the first computing environment and the second computing environment. The method and system includes determining a second item for utilization in the second computing environment, a virtual translation of the first item based on the transpose rules and the second computing environment data. The method and system includes transmitting an authorization command to the second computing environment to authorize utilization of the second item in the second computing environment.

COPYRIGHT NOTICE

A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.

FIELD OF INVENTION

The present invention relates to content management within computing environments and more specifically to transposing virtual item(s) between multiple computing environments.

BACKGROUND

With the continued growth of virtual worlds, online communities, and other virtual reality interactions, there is a growing demand for using online or virtual content in different computing environments.

Users create, earn, purchase, or otherwise acquire online content. This content can be extremely valuable. But the current siloed nature of virtual worlds and online communities means these items are stuck in the original environment.

Based on the user's investments in this content, there is a growing demand for portability of these virtual items between different computing environments. Many problems arise, including digital rights management issues, as well as portability of the item itself.

A virtual item in a first environment does not automatically translate or work in a second environment. For example, a first environment may be an online multiplayer game, the game being a futuristic military fighting campaign game. The user can own a specific weapon in the game, e.g. a proton gun. The user also accesses a second environment, for example a middle-ages clan-based game. Based on the silo-ed nature of environment, system designers and developers would look to restrict the user transporting the weapon from between the environments. For example, there are obvious thematic issues, not wanting a proton gun imported and used in a middle-ages clan-based game.

Currently, there are limited solutions for moving content between computing environments. For instance, U.S. Pat. No. 8,758,119 describes transferring a specific in-game assert between different players. This prior art solution is not about transporting the digital asset between environments, but rather sharing and having the same asset in two different games.

Another prior art technique is U.S. Publication No. 2021/0201591 describing a singular digital asset and how that asset is observable in the different environments. This approach does not transport or update an object or digital asset, but rather changes how the object is viewed based on the underlying immersive or augmented reality scene.

As such, there exists a need for processing solutions facilitating movement of online or virtual content across different environments, including accounting for the differences in these different environments.

BRIEF DESCRIPTION

The present invention is a computerized method and processing system for transposing virtual content items between computing environments. As used herein, computing environments are any immersive or complimentary processing/computing environments, including but not limited to augmented reality, virtual reality, gaming systems and platforms, online social environments and experiences, social media platforms, simulations, video games, virtual asset collections, virtual scholastic and training environments, virtual worlds, etc. The virtual content is any item or items with a virtual or computerized representation within the environment.

The method and system includes receiving a transpose request to transpose a first item from the first computing environment to a second computing environment, or a request from a second computing environment to transpose an item from the first. The transpose request includes, or returns, first item data, which is data that relates to the first item within the first computing environment. The data may include meta data describing the item, including features or uses of the item. The data may also include data relating to the first computing environment, including the type of environment, an environment genre, as well as other descriptors.

The method and system includes accessing one or more transpose rules, the rules relating to transposing the first item between computing environments. The transpose rules include instructions for analyzing the first item data.

The method and system includes accessing environment data relating to the second computing environment. The environment data includes data indicating information about the environment, including for example but not limited to the type of computing environment, an environment aesthetic, era, genre, setting or style, ownership or proprietary restrictions to the environment, etc.

Based on transpose rules and the environment data of the first and second environments, the method and system includes electronically determining at least one second item for utilization in the second computing environment. This second item is a virtual translation of the first item, but in a form usable in the second environment. Herein, the virtual translation is at least one of three possible types: finding a correlating item from the second environment; modifying the item from the second environment; and creating the second item for the second environment.

The method and system therein transmits an authorization command to the second computing environment to authorize utilization of the second item in the second computing environment. This authorization therein transposes the first item from the first computing environment into the second computing item as the second item.

Therein, the present method and system facilitates transposing virtual content items between different computing environments including accounting for content item details and computing environment factors.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates one embodiment of a computing environment providing for transposing virtual content items;

FIG. 2 illustrates another embodiment of a computing environment providing for transposing virtual content items;

FIG. 3 illustrates a flowchart of the steps of one embodiment of a method for transposing virtual items;

FIG. 4 illustrates sample data structures used for transposing virtual content items; and

FIGS. 5A-5E illustrate graphical representation of exemplary embodiments of electronically determining a second item for transposing virtual items.

A better understanding of the disclosed technology will be obtained from the following detailed description of the preferred embodiments taken in conjunction with the drawings and the attached claims.

DETAILED DESCRIPTION

Herein, the method and system allows a user to transpose a virtual item from a first environment to a second environment. As used herein, transpose differs from transporting, where transposing accounts for the specifics of the incoming computing environment. By way of example, a user may own a magical sword with unique powers in a fantasy-realm massive multi-player online game. The user switches games and joins a modern-day military campaign game with teams of online players competing in specific missions. The fantasy-realm magical sword does not fit into the military campaign game, therefore it would be incongruent to transport this item between games.

In this example, the method and system can translate the sword into a comparable item. For example, the sword can be translated as a machete, knife, or other slashing or stabbing item usable in the military campaign game.

FIG. 1 illustrates a processing system 100 whereby a user 102 can transpose virtual content items between computing environments. The system 100 includes the user 102, at least one computing device 104, a first environment processing engine 106, a second environment processing engine 108, a transpose engine 110 disposed therebetween, and at least one reference database 112.

The at least one computing device 104 can be one or more computing or processing devices facilitating connecting and engaging with computing environments. By way of example, but not expressly limiting, the computing device 104 can be a laptop computer, desktop computer, tablet computer, a gaming console, a mobile phone or other mobile device, virtual reality or augmented reality eyewear or headset, smart television, smart speaker, or any other suitable device as recognized by one skilled in the art.

The first environment processing engine 106 and the second environment processing engine 108 can be any suitable processing device or devices providing for an online, computerized, immersive, and/or otherwise engaging gaming or interactive experience for the user 102 via the computing device. The processing engines 106, 108 can provide for one or more engagements, including but not expressly limited to any immersive or complimentary processing/computing environments as recognized by one skilled in the art, including but not limited to augmented reality, virtual reality, gaming systems and platforms, online social environments and experiences, social media platforms, video games, virtual scholastic and training environments, virtual worlds, computer simulation computing environment(s), etc.

The transpose engine 110 is one or more processing devices or engines performing processing operations as noted herein in response to executable instructions. The transpose engine 110 can be a network-based, cloud-based, and/or locally-executed engine 110 performing processing operations to transpose the virtual items.

The database 112 can be one or more data storage devices having transpose rules stored therein. The database 112 can be local to the engine 110 and/or can be accessible via network communication, such as across Internet or cloud-based communications. The database 112 provides for transpose rules executed by the transpose engine 110 to transpose the virtual content items between environments created by the engines 106, 108, by way of example.

In the system 100, the user 102 engages the first environment processing engine 106. This engagement may be via any suitable means, including for example wired or wireless connectivity and local or network-based communication protocols. For example, if the first environment processing engine 106 is an online, server-based, game, a web browser or other local application may run on the computing device 104. In this embodiment, the user 102 plays the game on the computing device 104 by engaging the engine 106.

In the present method and system, the user 102 may therein transpose a virtual content item within the first environment to a second environment running on the second environment processing engine. The transpose request can originate from the second environment processing engine, the first environment processing engine, or an external computing device or engine. In one example, the second environment may also be an online, server-based game. The user 102 can engage the second environment via the same processing device 104, for example launching a separate application or launching the application via a hosting or gaming service, for example via a gaming platform such as a Steam® or any other suitable electronic platform.

Herein, the transpose engine 110 performs processing operations to transpose one or more virtual items from the first engine 106 for use in the second engine 108. As noted above, virtual items do not directly translate between engines for a variety of reasons including engine processing requirements, gameplay or environment constraints, thematic restrictions, developer restrictions, among others.

The transpose engine 110, in response to executable instructions stored in one or more non-transitory computer readable media, accesses the transpose rules of the database 112 to transpose content items. Where transposing the content item can be finding an appropriate/matching second environment item, creating a new item in the second environment by modifying an existing item from the second environment to match characteristics of the first item, and/or creating a new item in the second environment, different transpose rules can provide for different transposing operations.

Using the transpose rules, the engine 110 therein analyzes meta data or other data associated with the first item. Based on this analysis, the engine 110 can then assess the specifics of the first item. The engine 110 additionally determines or otherwise processes or reviews data associated with the first and/or second computing environment to assess the specifics of the second computing environment into which the item is being transposed.

Having knowledge of the specifics of the first item and specifics of the computing environments, the engine 110 computationally generates or determines one or more appropriate second items, where the second item is a translation of the first item usable in the second environment. In one embodiment, the engine 110 performs this operation based solely on the environment data relating to the second computing environment. In one embodiment, the engine performs this operation based on using the environment data for the first computing environment and the second computing environment.

In the first embodiment of finding the second item that correlates to the first item, the transpose rules can be correlation matching instructions. By way of example, the transpose rules can match specific environments to determine if a thematic match is pursuable. If the environments correlate with enough degree, the rules can then address the first item, including correlating meta data associated with the first item. For example, if the first item is a long-sword for a medieval world-building game, one correlation can be other suitable swords for correlated worlds such as a samurai sword for a Japanese feudal environment.

In the second embodiment of the modifying an existing item in the second environment, the transpose rules can be item recognition and modification rules. By way of example, the transpose rules can determine the first and second environments do not necessarily correlate, requiring some modification of an existing item in the second environment. For example, if the first environment is a medieval world-building game and the first item is a longbow, the second environment may be an alien-environment space-based shooting game. The longbow may not directly correlate to the second environment, but transpose rules can modify the item. For example, another long range projectile weapon can be identified, such as a shard rifle, which can server as the template to modify and create a new weapon. Modification can include transpose rules associated with the second environment operational features, for example understanding ammunition options, gravity or other environmental specifics, enemy weapons, etc.

In this second embodiment, an item can then be modified based on the transpose rules to match the essence or feel of the first item in the second environment. In the above example of a longbow, this item could be modified to being a long-range hypersonic shard shooting device.

In the third embodiment of creating the second item, the transpose rules can include operations similar to the first and second embodiment to determine a new item is to be created. Where a new second item is created, the transpose rules can operate similar to the second embodiment, whereby instead of modifying an item in the second environment, the rules provide for creating a new item. For example, the first environment may be a first-person vehicle racing game and the second environment may be a medieval world-building game. A supped-up motorcycle from the first environment does not thematically belong in the second environment. The transpose rules may also not seek to modify the motorcycle, for example the general concept of motorized vehicles still are outside the theme of the second environment. Therefore, in this embodiment, the transpose rules can include creating a completely unique second item, such as a riding horse. In one embodiment, the transpose rules may integrate visual cues, such as adding stickers and logos originally found on the motorcycle on the saddle of the horse. Where here, the second item is a completely new item and not a modification of the first item.

The engine 110, upon determining the second item, provides for authorizing use of the second item in the second computing environment.

FIG. 2 illustrates another embodiment of a computing system providing for transposing virtual content items. The system 140 includes a first environment 142 having an application programming interface (API) 144 therein, as well as a second environment 146 with an API 148 therein. Disposed therebetween, a server 150 engages a rules database 152.

In this embodiment, the server 150 may perform transpose engine 110 operations, the rules database 152 similar to the database 112 of FIG. 1 . The APIs 144 and 148 can directly communicate with the server 150. Transposing a virtual content item from the first environment 142 includes transmitting the content item data or a transpose instruction to the server 150 and transmitting instructions to the second environment 146 for authorizing use of the second (transposed) content item.

The rules database 152 can include any number of rules or conditions usable for transposing virtual content items. The database 152 can include rules relating to the specific environments, meta-data associated with the environments or content items, meta-data translation or interpretation rules, digital rights management rules, among other rules.

The systems 100 and 140 of FIGS. 1 and 2 can operate to perform the computerized method for transposing virtual content as noted in FIG. 3 . FIG. 3 illustrates one embodiment of a computerized method for transposing virtual content items between computing environments.

Step 200 is receiving a transpose request to transpose a first item from a first computing environment to a second computing environment. For example, the first computing environment can be processing environment 142 of FIG. 2 and the second computing environment can be processing environment 146 of FIG. 2 . In another example, the first computing environment may be a futuristic team-based military-style videogame and the second computing environment may be a middle-ages clan-based world building game.

The transpose request may be a data command requesting to make the first item available in the second computing environment. The first item can be any suitable in-game content item. In this example, a content item may be a high-powered gun that shoots laser bullets in the first computing environment.

The transpose request can come from any number of suitable sources. For example, in one embodiment the transpose request can originate from the user active within the first environment processing engine 106, e.g. the user seeking to export a content item. For example, in one embodiment the transpose request can originate from for the user active within the second environment processing engine 108, e.g. the user seeking to import a content item. For example, in one embodiment the transpose request can originate external to the processing engines 106 and/or 108, such as an external software application seeking to transpose items between environments, e.g. a user has a locker, electronic wallet, or other electronic database of items or authorizations for items that are capable of being transported.

The transpose request includes first item data relating to the first item. In this example, the first item data can be meta data describing features of the first item and may also include meta data describing the first processing environment, referred herein as environment data relating to the first computing environment.

FIG. 4 illustrates one exemplary embodiment of meta-data associated with the first item. In this example, the meta-data is a multi-field data structure with data fields relating to the high-powered gun. The data fields can include item features, gaming era, value or scarcity within the game, skill level to use the weapon, or any other suitable data fields. In one embodiment, meta-data can include branding or other meta-data identifying the item being associated with or owned by a third-party.

In FIG. 3 , step 202 is accessing environment data relating to the second computing environment. The access of the environment data can be via any suitable data access routine. For example, one embodiment may include directly accessing the second environment via the API contained therein. In another example, a separate content database may contain the environment data for the different embodiments. In another example, the environment data may be included with the data stored in the database 112 of FIG. 1 .

In one embodiment, the transpose rules may also include limitations or prohibitions against transposing content items. For example, some content items may be deemed proprietary and not authorized for transposing between environments. Therefore, transpose rules can include exclusions prohibiting transposing of virtual content items. These transpose rules can be specific to content items and/or specific to computing environments. For instance, a content item may be transposed between computing environments authored by the same company, but excluded from be transposed to a third-party's computing environment.

Step 204 is accessing a plurality of transpose rules relating to transposing the first item from the first computing environment to the second computing environment. In one embodiment, the transpose rules can be a plurality of if-then conditional statements or other logic for reviewing, interpreting, transforming, or otherwise processing the first item data.

Step 206 is electronically determining a second item for utilization in the second computing environment. Here, the determination of the second item is a virtual translation of the first item to be usable in the second computing environment, based on the transpose rules and the environment data of the first and second computing environment.

As noted above, the translating the first item for the second environment can be finding a second item, where the second item is an existing item, modifying the first item to create a new second item, or to create a completely new item as the second item.

Using the above example of the first item being a laser-shooting gun and the second computing environment being a middle-ages community-building game, the second computing environment has no thematic rational to use or process the first item. Therefore, the transpose rules provide for translating the first item into the second item accounting for the second computing environment, where the second item is an item already existing in the second computing environment.

In this example, the transpose rules can then translate, modify, or generate an appropriate item. For example the gun in the first computing environment may be translated to a longbow in the second computing environment. For example, the gun in the first computing environment may be modified to a thematic-appropriate wizard's staff in the second computing environment. For example, the gun in the first computing environment may be discarded and a new item altogether is generated for the second environment.

Step 208 is transmitting an authorization command, or other type of activation or validation command, to the second computing environment so the second content item can be used in the second computing environment. In one embodiment, authorization and/or validation may be performed using a third-party or external verification source or computer processing service.

By authorizing in the second computing environment, the user can therein use the transposed version of the first item while engaging the second computing environment. In this example, the user can therein use the longbow in the middle-ages community building game because the user owns the laser bullet gun in the futuristic game.

The proposed invention provides for a system and method for performing transformations of a virtual item, or group of items, across multiple virtual environments. Because of the processing method and system, items are no longer siloed in any one environment, but are usable across multiple environments.

For further exemplary illustration, FIGS. 5A-5E illustrate varying exemplary embodiments of electronically determining second items. In each embodiment, associated data is processed by the transpose engine 110 and transport rules from the database 112.

FIG. 5A illustrates the example of the first item being a longsword and the associated meta data. In the example, the meta data includes weapon type; damage; primary use; secondary use; power level, and first environment data. The transpose engine 110 can then determine transportable items for different environments, such as a battle axe for a middles ages, Viking environment; a katana for a feudal, Japanese environment; a khopesh for an ancient Egypt environment; and an energy sword for a dark future, sci-fi environment.

FIGS. 5B-5E illustrate further exemplary embodiments. Moreover, as noted in FIGS. 5A-5E, the items for transporting can vary and are not limited to weapons. For example, FIG. 5C is an example of clothing or decorative attire, FIG. 5D is an example of an in-game health unit, and FIG. 5E is an example of a vehicle or mode of transport. Moreover, these examples are not limiting but the item(s) for transpose can be any suitable in-game item as recognized by one skilled in the art.

The system, via processing operations, can supply to new environments metadata sufficient to allow the new environments to select from their own library of potential virtual items an object by which to have the original item represented in the new environment, as well as inform the system of the item selected in the new environment. Therein, the method and system can attach metadata related to the new environments representation to the original items metadata in the system.

In one embodiment, the method and system can supply to new environments an independent random number generation as part of the supplied metadata to assist with the selection of the object representation in the new environment. In this embodiment, the number assists in the second item translation, but the random generation operates consistently across environments.

In another example of the primary proposed invention, where an item can be uniquely identified, a cloud-based and/or local server-client or blockchain enabled system, which may or may not be a proprietary system, could store and record each transformation in each environment to create a bundle of transformations that are attached to a single virtual item. Therefore, the server 150 of FIG. 2 or the transpose engine 110 of FIG. 1 could communicate with distributed data store system(s), the ownership and transformations properly recorded. In one embodiment, this recordation can facilitate licensing and/or digital rights management functions. For example, in embodiments where user's or processing environments charge for transposing content, the record is usable for not only tracking the transactions, but a verifiable record for financial transactions associated therewith.

Concurrent with digital rights management, further embodiments may include financial transactions associated with the transposed content. For example, royalty payments may be required for transposing content. In another embodiment, a user may loan or rent content to another user, therefore including use fees or royalty payments for using proprietary content. The transpose engine 110 can further track this ownership information, including validating ownership prior to transmitting the authorization command.

In another example of the primary proposed invention, the system generates a unique global identifier for the object that persists independently of each other unique identifier used within each environment in which the object has been processed. Here, the method and system enables persistence across environments through an externally managed global identifier system, including managing the metadata of each representation of the item (and any sub-items bundled to it) with each game representation.

For example, in environment A, the system may identify the object as S00001 and environment A may identify the object as A98765. In environment B, the system would still identify the object as S00001, and environment B may identify the object as B88742. In environment C, the system still identifies the object as S00001, and environment C may identify the object as C5432, which includes bundled subitems C0054 and C0085.

In one embodiment, the original item may represent a collection of individual items (a “bundle”), each of which being able to be processed interpedently by the proposed system and method. For example, the first content item may not directly translate into a single second content item. Rather, the first content item may be translated into multiple items based on the second environment. Therefore, nothing herein expressly restricts the item transformation as being a direct one-to-one, rather the number of items in each environment can vary based on the specifics of the underlying environment.

In another example of the primary proposed invention, the item could be bundled with other items to create unique visual representations. By way of example, one item may include hat(s), shirt(s), pant(s), boots, etc., where a different item can be a “skin.” In this example, the translating of the bundled items from the first environment can be modified to create a skin for the second environment.

In another example of the primary proposed invention, items and environments can utilize a hierarchy of data elements to allow for multiple levels of abstraction in determining the most appropriate match for a proposed transformation.

In this embodiment, the system enables interoperability without removing individual design considerations implemented by the operator of each environment. In this embodiment, the system provides the information necessary for each environment to select a closest match representation using any suitable logic processing means. Here, the environment can then report the final selection back to the system for recording.

For example, the operator in environment A may allow for the virtual object to have 12 bullets, a range of 100 yards, realistic physics and configurable scopes and recoil options. In environment B, the object may have unlimited bullets based on energy availability, a range of 100,000 miles, no physic constraints, and no scope configurations. In environment C, the object may have 1 bullet, a range of 25 yards, realistic physics, and configurable bow and string options.

In another example of the primary proposed invention, the system and method could supply metadata related to the art style, temporal period, culture, etc. of the object to enable representation in new environments. In this embodiment, the meta data is usable as part of the transformation performed by the transpose engine 110 of FIG. 1 .

In another example of the primary proposed invention, an item may reference a collection of external assets used in the visual representation of the item that can then be resupplied to future environments in addition to the metadata.

In another example of the primary proposed invention, the system and method can receive updates from any of the attached environments related to changes to the item including, but not limited to, improvements, deteriorations, visual modifications, consumption, or destruction.

In another example of the primary proposed invention, each object exists agnostic of the current owner of the object.

In another example of the primary proposed invention, each object exists with the necessary information to identify the real-world owner of the object.

In another example of the primary proposed invention, while the item may be uniquely identified in the proposed system, the representation in any given environment may be either unique, or not, as determined by the environment when the item is processed by the new environment.

In another example of the primary proposed invention, the system would support the input and output of data for both the exporting group and the importing group to be able to supply the metadata associated with their own item systems to the proposed system.

In another example of the primary proposed invention, the system would support permissions that define the extent to which items can be transformed in any given environment.

In another example of the primary proposed invention, the system can supply metadata of an item intended for display to an end user in multiple languages.

In another example of the primary proposed invention, the system can supply a set of alternative terms to display to a consumer in relation to items.

The proposed system and method has a number of new inventive aspects, including an object can have an appropriate representation in each environment. For example: An original item generated in Environment A (based in modern times with humanoid avatars) as a “rifle” could have metadata of: “projectile weapon, long range, limited ammunition, modern era, offensive”.

When this item is presented to a new Environment B (based in the future and utilizing space ships), the proposed system would supply the metadata of: “projectile weapon, long range, limited ammunition, modern era, offensive” and Environment B may generate a representation of that item as a “laser rifle”.

Similarly in Environment C (based in the middle ages), the same item may be represented as a “longbow”.

For example: An original item generated in Environment A (based in modern times) as a “longcoat” could have metadata of: “outerwear, full body, stylish, dark blue, modern era.” When this item is presented to a new Environment B (based in the future and utilizing super hero tropes), the proposed system would supply the metadata of: “outerwear, full body, stylish, dark blue, modern era” and Environment B may generate a representation of that item as a “cape.” Similarly in environment C (with a medieval fantasy theme), the same item may be represented as a “hooded cloak.”

For example (no abstraction required matching): An original item generated in Environment A (based in modern times with humanoid avatars) as “boots” could have metadata of: “footwear, boots, utility, black, modern era.” When this item is presented to a new Environment B (medieval fantasy), the proposed system would supply metadata of “footwear, boots, utility, black, modern era” and Environment B may generate a representation of that item as “boot”—since this environment also has that direct corresponding concept of a similar item.

For example (abstraction required matching): An original item generated in Environment A (based in Egyptian mythology) as “Scimitar” could have metadata of: “melee weapon, bladed, Egyptian, utility, offensive.” When this item is presented to a new Environment B (Japanese Shogun era), the proposed system would supply metadata of “melee weapon, bladed, Egyptian, utility, offensive” and Environment B may generate a representation of that item as “Katana”—as this environment has no direct corresponding concept of a similar item, it works its way up the hierarchy from “Scimitar” (no match) to “One-handed bladed sword” and sees that Environment B has a matching entry for “Katana.”

When this item is presented to a new Environment C (Social chat construct), the proposed system would supply metadata of “melee weapon, bladed, Egyptian, utility, offensive” and Environment C may generate a representation of that item as an “Axe”—as this environment has no direct corresponding concept of a similar item, it works its way up the hierarchy from “Scimitar” (no match) to “One-handed bladed sword” (no match) to “One-handed bladed weapon” and sees that Environment C has a matching entry for “Axe.”

The system supports the definition of downstream revenue generation for item originators and/or IP rights holders at the time of transformation.

For example: an item is generated in Environment A that contains the metadata of IP License=True and License Holder=Warcraft and Transform Cost=$1.00. Any time this item is then attempted to be transformed in another environment, that environment would need to pay the License Holder $1.00. The present method and system, in one embodiment, supports the collection of these fees as part of an authorized transformation call to the system, either directly or via one or more third-party fee collection services, computerized platforms, or software modules.

The system can supply a set of alternative terms to display to a consumer in relation to items. For example: an item with the metadata of “Footwear: Boot” is submitted to the system for a transformation request. The system returns the additional metadata: “Alternates: Greaves, Shoe, Sandal, Thong, etc.”

In one embodiment, the transposing of the first item to a second item can be performed based solely on the second environment data. In embodiments where the first environment data is not available, unreadable, or otherwise not usable by the transpose engine, the engine can generate the second item based the available first item meta data and the second environment data. In another embodiment, if the first item meta data is not available from the first environment, this meta data can be user-generated data, crowd-sourced data, image or reference look-up data, by way of example.

In further embodiments, the transpose request does not have to originate from the second environment. In varying embodiments, the transpose request can originate from a third-party source or other engine accessing or requesting second environment data.

Additionally, the present method and system can operate with multiple item transpose operations in concurrent execution. The environment receiving the transposed item may received transposed items from multiple environments. For example, a user may transpose weapons from multiple different environments, such as building up an arsenal or armory in the second environment.

For example, the user may outfit a second environment character with multiple items, weapons, inventory items, etc., from different environments. In this example, the user may transpose these items in the second environment, including a first weapon from a first environment, a second weapon from third environment, an inventory item from a fourth environment, clothing from a fifth environment, and a mode of transportation from a sixth environment.

In further embodiments, the user may transport multiple items from the same environment. For example, the user may outfit the second environment character with two different weapons and a transportation mode from the first environment. In this example, the user may import clothing from a third environment, and so on.

The transpose request further allows the user to create a new persona or defined character. In this embodiment, the second environment character is associated with the one or more transposed items, such as a functional grouping operation. The user may transpose the persona or character to a new game or environment, thereby re-iterating the above-disclosed transpose operations for each of the individual operations. Whereby the present method and system can transpose an individual item, as we transposing multiple items by performing the transpose operations as to each individual item.

FIGS. 1 through 5 are conceptual illustrations allowing for an explanation of the present invention. Notably, the figures and examples above are not meant to limit the scope of the present invention to a single embodiment, as other embodiments are possible by way of interchange of some or all of the described or illustrated elements. Moreover, where certain elements of the present invention can be partially or fully implemented using known components, only those portions of such known components that are necessary for an understanding of the present invention are described, and detailed descriptions of other portions of such known components are omitted so as not to obscure the invention. Moreover, Applicant does not intend for any term in the specification or claims to be ascribed an uncommon or special meaning unless explicitly set forth as such. Further, the present invention encompasses present and future known equivalents to the known components referred to herein by way of illustration.

The foregoing description of the specific embodiments so fully reveals the general nature of the invention that others can, by applying knowledge within the skill of the relevant art(s) (including the contents of the documents cited and incorporated by reference herein), readily modify and/or adapt for various applications such specific embodiments, without undue experimentation, without departing from the general concept of the present invention. Such adaptations and modifications are therefore intended to be within the meaning and range of equivalents of the disclosed embodiments, based on the teaching and guidance presented herein. 

What is claimed is:
 1. A computerized method for transposing virtual content items between a plurality of computing environments, the computerized method comprising: transmitting, across a communication network, a first transpose request, the first transpose request being a communication request to transpose a first item from a first computing environment to make available for use in a second computing environment via a transpose engine, the first transpose request including first item data relating to the first item within the first computing environment, the first item owned by a user; accessing, via the transpose engine, a plurality of transpose rules relating to transposing the first item from the first computing environment to the second computing environment; accessing, via the transpose engine, environment data relating to both the first computing environment and the second computing environment; the transpose engine electronically generating a second item for utilization in the second computing environment, the second item being a translation of the first item based on: the plurality of transpose rules; the environment data of the first computing environment and the environment data of the second computing environment; the transpose engine recording ownership of the second item consistent with the ownership of the first item such that the user retains ownership of the first item and is assigned ownership of the second item; transmitting from the transpose engine a first authorization command to the second computing environment across the communication network to authorize utilization of the second item in the second computing environment, therein transposing the first item from the first computing environment into the second computing environment by creating the second item as the translation of the first item accounting for the second computing environment; transmitting, across the communication network, a second transpose request, the second transpose request being a communication request to transpose the first item or the second item to make available for use in a third computing environment; accessing environment data relating to the third computing environment; the transpose engine electronically generating a third item for utilization in the third computing environment, the third item being different from the first item and the second item and a translation based on the plurality of transpose rules and the environment data of the third computing environment; the transpose engine recording ownership of the third item such that the user retains ownership of the first item, the second item, and the third item; transmitting from the transpose engine a second authorization command to the third computing environment to authorize utilization of the third item in the third computing environment, therein transposing the third item into the third computing environment by creating the third item accounting for the third computing environment; and recording a bundle of transformations associated with the first item including the translation of the first item into the second item and the translation of the first item or the second item into the third item.
 2. The computerized method of claim 1, wherein the first computing environment is at least one of: a video game computing environment, a virtual world computing environment, an augmented reality computing environment, a social network computing environment, a business computing environment, an educational computing environment, and a computer simulation computing environment.
 3. The computerized method of claim 2, wherein the first computing environment is the same type of computing environment as one or more of the plurality of computing environments.
 4. The computerized method of claim 2, wherein the first computing environment is a different type of computing environment from one or more of the plurality of computing environments.
 5. The computerized method of claim 1, wherein the first item data is metadata relating to the first item and the first computing environment.
 6. The computerized method of claim 1, wherein the transpose request from the first computing environment is generated using a first application programming interface disposed therein.
 7. The computerized method of claim 6, wherein the authorization command is transmitted to a second application programming interface disposed in the second computing environment.
 8. The computerized method of claim 1 further comprising: determining digital rights associated with the first item within the first computing environment; and tracking the digital rights for the first item relative to the second item.
 9. The computerized method of claim 8, wherein tracking the digital rights includes tracking at least one royalty calculation for utilization of the second item in the second computing environment.
 10. The computerized method of claim 8, wherein tracking the digital rights includes: validating the ownership of the first item in the first computing system prior to transmitting the authorization command to the second computing environment.
 11. The computerized method of claim 1, wherein the translation of the first item includes at least one of: finding the second item that correlates to the first item, modifying the first item to generate the second item, and creating the second item.
 12. The computerized method of claim 1, wherein the transpose rules include rules relating to at least one of: computing environment artistic features, computing environment style, computing environment world, and computing environment era.
 13. The method of claim 1 further comprising: generating the second item based at least on the environment data relating to the second computing environment; and electronically transmitting the second item to the second computing environment.
 14. The method of claim 13 further comprising: generating the second item within the transpose engine; and electronically transmitting the second item from the transpose engine to the second computing environment across the communication network.
 15. A system for transposing virtual content items between computing environments, the system comprising: at least one memory device having executable instructions stored therein; a transpose rules database having transpose rules disposed therein; and a transpose engine including at least one processing device, in response to the executable instructions, operative to: receive, across a communication network, a first transpose request to transpose a first item from a first computing environment to make available for use in a second computing environment, the first transpose request including first item data relating to the first item within the first computing environment, the first item owned by a user; communicate with the transpose rule database and access a plurality of the transpose rules relating to transposing the first item from the first computing environment to the second computing environment; access environment data relating to the first computing environment and the second computing environment; electronically determine a second item for utilization in the second computing environment, the second item being different from the first item and a translation of the first item based on the plurality of transpose rules and the environment data of the first computing environment and the second computing environment the second item also owned by the user; transmit a first authorization command to the second computing environment, across the communication network, to authorize utilization of the second item in the second computing environment without impacting the ownership of the first item, to therein transpose the first item from the first computing environment into the second computing environment by creating the second item as the translation of the first item accounting for the second computing environment; receive, across the communication network, a second transpose request, the second transpose request being a communication request to transpose at least one of: the first item and the second item to make available for use in a third computing environment, the transpose request including at least one: the first item data and the second item data; access environment data relating to the third computing environment; electronically determine a third item for utilization in the second computing environment, the third item being different from the first item and the second item and a translation based on the plurality of transpose rules and the environment data of the third computing environment, the third item also owned by the user; transmit a second authorization command to the third computing environment, across the communication network, to authorize utilization of the third item in the third computing environment without impacting the ownership of the first item and the second item; and record a bundle of transformations associated with the first item including the translation of the first item into the second item and the translation of the first item or the second item into the third item.
 16. The system of claim 15, wherein the processing device is disposed within a server-based processing system in communication with the first computing environment and the second computing environment via at least one communication network.
 17. The system of claim 16 further comprising: a first application programming interface disposed within the first computing environment, wherein the transpose request is received by the processing device from the first application programming interface; and a second application programming interface disposed within the second computing environment, wherein the authorization command is transmitted by the processing device to the second application programming interface.
 18. The system of claim 15, wherein the first item data is metadata relating to the first item and the first computing environment.
 19. The system of claim 15, the processing device in response to the executable instructions, further operative to: determine digital rights associated with the first item within the computing environment; and track digital rights managements for the first item relative to the second item. 