Incorporating representational authenticity into virtual world interactions

ABSTRACT

A system that incorporates representational authenticity into virtual world interactions can include user representational authenticity data and a virtual world computing system. The user representational authenticity data can be used to describe the physical characteristics of a human user. The physical characteristics can be quantified utilizing standardized measurement techniques. The virtual world computing system can be configured to adjudicate the conduction of interactions performed by a virtual representation of the human user within the virtual world environment utilizing the user representational authenticity data.

BACKGROUND

The present invention relates to the field of virtual world computingand, more particularly, to incorporating representational authenticityinto virtual world interactions.

Virtual world environments are a popular form of social networkingapplications that provide users with the ability to interact with othersin a variety of settings. Users are allowed to create graphical virtualrepresentations of themselves that they utilize to interact with thevarious elements of the virtual world environment, such as stores,games, and the virtual representations of other uses. Many virtual worldenvironments provide users with a wide variety of graphical options tocustomize the appearance of their virtual representation, also referredto as an avatar.

However, the freedoms afforded users when creating avatars allows formisrepresentation. That is, the graphical appearance displayed by auser's avatar need not accurately reflect the user's actual appearance.The anonymity afforded by this dissociation between the user's virtualand actual appearance permits some users to conduct interactions withinthe virtual world under false pretenses. For example, cyber-predatorshave been known to create child-like avatars to interact with theavatars of real children.

Typical approaches to combat such misrepresentation have focused onuser-entered information, such as birth date, when creating an accountfor the virtual world environment. However, this information is easilyfaked by the user. This is also true of approaches that requiresubmission of a photograph to associate with the user account.Conventional virtual world environments are unable to validate and/orquantify the differences between a user's virtual and actualappearances.

BRIEF SUMMARY

One aspect of the present invention can include a system thatincorporates representational authenticity into virtual worldinteractions. Such a system can include user representationalauthenticity data and a virtual world computing system. The userrepresentational authenticity data can be used to describe the physicalcharacteristics of a human user. The physical characteristics can bequantified utilizing standardized measurement techniques. The virtualworld computing system can be configured to adjudicate the conduction ofinteractions performed by a virtual representation of the human userwithin the virtual world environment utilizing the user representationalauthenticity data.

Another aspect of the present invention can include a method thatutilizes representational authenticity data when handling virtual worldinteractions. Such a method can begin with the identification of aninteraction of a virtual representation of a human user within a virtualworld environment that utilizes representational authenticityrequirements, which can be based upon user representational authenticitydata. The user representational authenticity data can describequantifiable physical characteristics of the human user. The interactioncan be conducted with the virtual representation of another human userand/or a distinct location of the virtual world environment. The userrepresentational authenticity data associated with the human user canthen be accessed from a user profile. It can then be determined if theuser representational authenticity data satisfies the representationalauthenticity requirement. When the representational authenticityrequirements are satisfied, the interaction of the virtualrepresentation of the human user within the virtual world environmentcan be permitted.

Yet another aspect of the present invention can include a virtual worldenvironment that utilizes representational authenticity data whenhandling virtual world interactions. The virtual world environment caninclude user representational authenticity data, a virtual worldcomputing system, and a representational authenticity handler. The userrepresentational authenticity data can describe physical characteristicsof a human user that can be quantified utilizing standardizedmeasurement techniques. The virtual world computing system can beconfigured to present a virtual world environment in which a virtualrepresentation of the human user interacts with the virtualrepresentation of other human users and/or the virtual worldenvironment. The representational authenticity handler can be configuredto utilize the user representational authenticity data to determinewhich interactions the virtual representation of the human user isallowed to perform within the virtual world environment.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a schematic diagram illustrating a system that incorporatesrepresentational authenticity into interactions performed by virtualrepresentations in a virtual world environment in accordance withembodiments of the inventive arrangements disclosed herein.

FIG. 2 is a collection of graphical user interfaces (GUIs) that can beused for the configuration of user-level representation-basedinteraction rules in accordance with an embodiment of the inventivearrangements disclosed herein.

FIG. 3 is an illustration of a user interface for a virtual worldenvironment that utilizes representation authenticity in accordance withan embodiment of the inventive arrangements disclosed herein.

FIG. 4 is a flow chart of a method that describes the use of userrepresentational authenticity data in virtual world interactions inaccordance with embodiments of the inventive arrangements disclosedherein.

DETAILED DESCRIPTION

The present invention discloses a solution that incorporates userrepresentational authenticity into virtual interactions.Representational authenticity can define how closely a user's virtualrepresentation in the virtual world corresponds to the user's actualappearance. A user's representational authenticity can be represented bycorresponding user representational authenticity data, which can becollected and validated by a third-party agency and/or by automatedmechanisms. When the user attempts to perform various interactionswithin the virtual world environment, a representational authenticityhandler can utilize the user representational authenticity data todetermine how the interaction should proceed. That is, the interactionsthat a user attempts to perform can be allowed, modified, and/orrejected based upon the values of their user representationalauthenticity data. The conditions that define how interactions should behandled can be defined as representation-based interaction rules at theuser-level and/or world-level.

The present invention may be embodied as a method, system, or computerprogram product. Accordingly, the present invention may take the form ofan entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, the present invention may take the form of a computerprogram product on a computer-usable storage medium havingcomputer-usable program code embodied in the medium. In a preferredembodiment, the invention is implemented in software, which includes butis not limited to firmware, resident software, microcode, etc.

Furthermore, the invention can take the form of a computer programproduct accessible from a computer-usable or computer-readable mediumproviding program code for use by or in connection with a computer orany instruction execution system. For the purposes of this description,a computer-usable or computer readable medium can be any apparatus thatcan contain, store, communicate, propagate, or transport the program foruse by or in connection with the instruction execution system,apparatus, or device. The computer-usable medium may include apropagated data signal with the computer-usable program code embodiedtherewith, either in baseband or as part of a carrier wave. The computerusable program code may be transmitted using any appropriate medium,including but not limited to the Internet, wireline, optical fibercable, RF, etc.

Any suitable computer usable or computer readable medium may beutilized. The computer-usable or computer-readable medium may be, forexample but not limited to, an electronic, magnetic, optical,electromagnetic, infrared, or semiconductor system, apparatus, device,or propagation medium. Examples of a computer-readable medium include asemiconductor or solid state memory, magnetic tape, a removable computerdiskette, a random access memory (RAM), a read-only memory (ROM), anerasable programmable read-only memory (EPROM or Flash memory, a rigidmagnetic disk and an optical disk. Current examples of optical disksinclude compact disk-read only memory (CD-ROM), compact disk-read/write(CD-R/W) and DVD. Other computer-readable medium can include atransmission media, such as those supporting the Internet, an intranet,a personal area network (PAN), or a magnetic storage device.Transmission media can include an electrical connection having one ormore wires, an optical fiber, an optical storage device, and a definedsegment of the electromagnet spectrum through which digitally encodedcontent is wirelessly conveyed using a carrier wave.

Note that the computer-usable or computer-readable medium can eveninclude paper or another suitable medium upon which the program isprinted, as the program can be electronically captured, for instance,via optical scanning of the paper or other medium, then compiled,interpreted, or otherwise processed in a suitable manner, if necessary,and then stored in a computer memory.

Computer program code for carrying out operations of the presentinvention may be written in an object oriented programming language suchas Java, Smalltalk, C++ or the like. However, the computer program codefor carrying out operations of the present invention may also be writtenin conventional procedural programming languages, such as the “C”programming language or similar programming languages. The program codemay execute entirely on the user's computer, partly on the user'scomputer, as a stand-alone software package, partly on the user'scomputer and partly on a remote computer or entirely on the remotecomputer or server. In the latter scenario, the remote computer may beconnected to the user's computer through a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer (for example, through the Internet using an Internet ServiceProvider).

A data processing system suitable for storing and/or executing programcode will include at least one processor coupled directly or indirectlyto memory elements through a system bus. The memory elements can includelocal memory employed during actual execution of the program code, bulkstorage, and cache memories which provide temporary storage of at leastsome program code in order to reduce the number of times code must beretrieved from bulk storage during execution.

Input/output or I/O devices (including but not limited to keyboards,displays, pointing devices, etc.) can be coupled to the system eitherdirectly or through intervening I/O controllers.

Network adapters may also be coupled to the system to enable the dataprocessing system to become coupled to other data processing systems orremote printers or storage devices through intervening private or publicnetworks. Modems, cable modem and Ethernet cards are just a few of thecurrently available types of network adapters.

The present invention is described below with reference to flowchartillustrations and/or block diagrams of methods, apparatus (systems) andcomputer program products according to embodiments of the invention. Itwill be understood that each block of the flowchart illustrations and/orblock diagrams, and combinations of blocks in the flowchartillustrations and/or block diagrams, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce amachine, such that the instructions, which execute via the processor ofthe computer or other programmable data processing apparatus, createmeans for implementing the functions/acts specified in the flowchartand/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meanswhich implement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions which execute on the computer or other programmableapparatus provide steps for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

FIG. 1 is a schematic diagram illustrating a system 100 thatincorporates representational authenticity into interactions 125performed by virtual representations 120 in a virtual world environment150 in accordance with embodiments of the inventive arrangementsdisclosed herein. As used herein, the term “representationalauthenticity” is used to refer to how truthfully the user 105 representsthemselves with their virtual representation 120 within the virtualworld environment 150.

In system 100, the user 105 can utilize a virtual representation 120 ofthemselves, also referred to as an avatar, to perform interactions 125within the virtual world environment 150 using a virtual world interface115. SECOND LIFE is one example of a virtual world interface. Otherexamples of interface 115 can include, but are not limited to interfacesof massively multiplayer online role-playing games (MMORPGs), GAIAONLINE, WEEWORLD, FRENZOO, MEEZ, and the like. The client device 110 canrepresent a variety of electronic computing devices capable of runningthe virtual world interface 115 and communicating with the virtual worldenvironment 150 over the network 185. Computing device 110 can include aprocessor, non-volatile memory, volatile memory, and bus, as well asnetwork adaptors and input/output peripherals. The virtual worldinterface 115 can be a software application configured to provide theuser 105 with the means to perform various functions within the virtualworld environment 150.

As is typical in a virtual world environment 150, the virtual worldinterface 115 can allow a virtual representation 120 of the human user105 to interact with other elements presented within the virtual world.The virtual representation 120 can be a graphical figure created andcontrolled by the user 105 within the virtual world environment 150. Forexample, the user 105 can use their virtual representation 120 to sit ata virtual table in a virtual library to read a virtual book.

The virtual world interactions 125 can represent the operations and/oractions that occur within the virtual world environment 150. Theseinteractions 125 can occur between virtual representations 120 and/orelements of the virtual world environment 150, such as a sign or chair.Unlike a conventional virtual world environment 150, the interactions125 of system 100 can include one or more representational authenticityrequirements 127.

A representational authenticity requirement 127 can represent acondition that can influence how the interaction 125 is performed basedupon its evaluation. Representational authenticity requirements 127 canbe captured within the virtual world environment 150 asrepresentation-based interaction rules 170 and 175. Therepresentation-based interaction rules 170 and 175 can be configured ateither the world or user level, respectively. For example, a user 105can utilize the virtual world interface 115 to create a user-levelrepresentation-based interaction rule 175 to ignore chat requests fromother users 105 who do not meet specific representational authenticityconditions.

It should be emphasized that not all interactions 125 conducted withinthe virtual world environment 150 are required to have representationalauthenticity requirements 127. For example, entry to a virtual librarymay not have representational authenticity requirements 127; all users105 can enter the library. However, the children's reading area of thelibrary can have representational authenticity requirements 127 based onage; only users 105 who meet the age requirement can enter thechildren's reading area.

Evaluation of the representational authenticity requirements 127 and,therefore, the representation-based interaction rules 170 and 175 canutilize user representational authenticity data 145 associated with theusers 105 involved in the interaction 125. The user representationalauthenticity data 145 can represent data elements that quantify certainphysical characteristics of the user 105. Examples of userrepresentational authenticity data 145 can include, but are not limitedto, height, weight, eye color, date of birth, body measurements, haircolor, tattoos, body-piercings, and the like.

The user representational authenticity data 145 can be captured in thedata store 140 of a data collection agency 130. The data collectionagency 130 can be a third-party organization contracted by the corporateentity controlling the virtual world environment 150 to collect andverify user representational authenticity data 145. Collection of theuser representational authenticity data 145 can utilize standardizedmeasurement techniques and can require the user 105 to presentthemselves, in-person, at the data collection agency 130 with additionalofficial identification documents.

In one embodiment, the agency 130 can be entirely automated, such aswhen a photo submitted by a user is automatically compared using videoanalysis techniques to characteristics of the avatar. Furtherauthentication can occur, such as by IP location tracking a user toensure that a named user or a user having asserted characteristics isactually geographically located at a residence in which the device 110is located. Any authentication technique can be utilized, whereauthentication information used by agency 130 can remain confidential.

It should be emphasized that the embodiment of the present inventiondiffers from the data collection and/or usage practices of currentvirtual world environments 150 due to the validation of the userrepresentational authenticity data 145 by the data collection agency130. That is, because the user 105 is required to submit themselves andidentification documents to the data collection agency 130, thecollected user representational authenticity data 145 can be determinedto have a higher level of trust than similar data elements collected bymore anonymous methods, such as a generic Web page.

For example, a user 105 can be required to provide a copy of their birthcertificate and photo identification to verify their age. Thus, a parentcan feel more confident that their child 105 will only be exposed toother users 105 in the children's area of the library who have beenverified as children, regardless of the graphical appearance of theirvirtual representation 120.

Additionally, the type and/or amount of user representationalauthenticity data 145 collected for a user 105 can be graduated. Forexample, a user 105 can elect to have data elements categorized as“Basic”, such as height and weight, whereas additional data elements,such as body fat percentage and MYERS-BRIGG personality profile, can becollected for a user 105 purchasing an “Advanced” collection package. Itshould be noted that the actual collection of user representationalauthenticity data 145 is not a focus for this embodiment of the presentinvention.

The various levels of user representational authenticity data 145collected can affect the user's 105 ability to interact within thevirtual world environment 150. That is, a user 105 missing certaindetailed user representational authenticity data 145 can beautomatically discounted by the user-level representation-basedinteraction rules 175 of other users 105. For example, because User Bob105 did not opt to have his body fat percentage measured, User Jane's105 user-level representation-based interaction rule 175 for ignoringothers whose body fat percentage is greater than 40% will automaticallyreject User Bob's 105 chat requests.

Additionally, the user representational authenticity data 145 can beused as the basis for creating the user's 105 virtual representation 120within the virtual world environment 150. The virtual world environment150 can include an option that can apply the values of the userrepresentational authenticity data 145 to the user's 105 existingvirtual representation 120. For example, the height of the virtualrepresentation 120 within the virtual world environment 150 can beadjusted to match the actual height of the user 105.

The data store 140 containing the user representational authenticitydata 145 can be associated with a data server 135 of the data collectionagency 130. The user representational authenticity data 145 can beelectronically transmitted to the virtual world environment 150 from thedata server 135 of the data collection agency 130 utilizing standardelectronic communication protocols. The virtual world environment 150can store the user representational authenticity data 145 within theuser profile data 165 associated with the user 105.

The virtual world environment 150 can represent the hardware andsoftware components necessary to simulate a virtual world in which users105 can participate via various interactions 125. The virtual worldenvironment 150 can include a variety of such standard components, suchas servers (not shown), in various configurations. It should be notedthat it is assumed that the virtual world environment 150 contains suchstandard components to support operation of the virtual world, and, thatsuch standard components are configured in such a manner to interfacewith the components of the embodiment of the present invention.

In addition to the standard components, the virtual world environment150 can include a representational authenticity handler 155 and a datastore 160 that can contain user profile data 165 and world-levelrepresentation-based interaction rules 170. The representationalauthenticity handler 155 can represent a software application configuredto manage the execution of interactions 125 having representationalauthenticity requirements 127. The representational authenticity handler155 can utilize the user representational authenticity data 145 for theuser 105 to evaluate the representational authenticity requirements 127for the interaction 125 and, based on the evaluation, determine how theinteraction 125 should be conducted.

Building upon the previous examples, the interaction 125 for enteringthe children's reading area of the library can have a representationalauthenticity requirement 127 requiring a maximum age of twelve to enter.The representational authenticity handler 155 can check the userrepresentational authenticity data 145 for all users 105 attempting toenter the children's reading area. The virtual representation 120 ofusers 105 determined to be older than twelve based on the age containedin their user representational authenticity data 145 can be deniedaccess to the children's reading area

Additionally, the representational authenticity handler 155 can utilizea preset algorithm upon the user representational authenticity data 145to calculate a user representational authenticity score 180. The userrepresentational authenticity score 180 can numerically quantify thedegree of representational authenticity between the user's 105 collecteduser representational authenticity data 145 and their virtualrepresentation 120.

For example, users 105 who do not desire to apply representationalauthenticity concepts to their virtual representation 120 and,therefore, have no user representational authenticity data 145, wouldhave a user representational authenticity score 180 of zero or“unknown”. Thus, users 105 interacting with such a user 105 would beaware that the presented virtual representation 120 may bear noresemblance to the actual user 105.

The virtual world environment 150 can be configured to allow a user's105 user representational authenticity score 180 to be displayed toother users 105. Additionally, the user representational authenticityscore 180 can be utilized as a representational authenticity requirement127 for representation-based interaction rules 170 and 175.

The world-level representation-based interaction rules 170 can representrepresentational authenticity requirements 127 defined for elements ofthe virtual world. The age representational authenticity requirement 127for the children's reading area of the library can be an example of aworld-level representation-based interaction rules 170 because this ruleis applied to all users 105 who attempt to interact with this specificelement of the virtual world. Creation and/or modification ofworld-level representation-based interaction rules 170 can be limited toadministrators of the virtual world environment 150.

The user profile data 165 can correspond to the data kept by the virtualworld environment 150 that is specific to a user 105. In addition tocontaining standard user configuration data, the user profile data 165can also store the user representational authenticity data 145, theuser-level representation-based interaction rules 175, and the userrepresentational authenticity score 180 of the user 105.

The user representational authenticity data 145 can be a copy of theuser representational authenticity data 145 collected by the datacollection agency 130. The user profile data 165 for a user 105 caninclude multiple sets of user representational authenticity data 145,with each set of user representational authenticity data 145representing a separate data collection session. That is, a user 105 canhave user representational authenticity data 145 collected over timethat can document their physical changes in appearance.

For example, members of a weight loss support group in the virtual worldcan sign-up to have their user representational authenticity data 145collected every two months so the group members can see changes in eachother's virtual representations 120. The virtual world environment 150can include options that can be configured to allow users 105 to see avisual progression of the changes captured in the user representationalauthenticity data 145.

The user-level representation-based interaction rules 175 can representuser-configurable options allowed within the virtual world environment150 for the use and/or presentation of a user's 105 userrepresentational authenticity data 145. The user representationalauthenticity score 180 stored in the user profile data 165 cancorrespond to the value calculated by the representational authenticityhandler 155.

Network 185 can include any hardware/software/and firmware necessary toconvey data encoded within carrier waves. Data can be contained withinanalog or digital signals and conveyed though data or voice channels.Network 185 can include local components and data pathways necessary forcommunications to be exchanged among computing device components andbetween integrated device components and peripheral devices. Network 185can also include network equipment, such as routers, data lines, hubs,and intermediary servers which together form a data network, such as theInternet. Network 185 can also include circuit-based communicationcomponents and mobile communication components, such as telephonyswitches, modems, cellular communication towers, and the like. Network185 can include line based and/or wireless communication pathways.

As used herein, presented data stores 140 and 160 can be a physical orvirtual storage space configured to store digital information. Datastores 140 and 160 can be physically implemented within any type ofhardware including, but not limited to, a magnetic disk, an opticaldisk, a semiconductor memory, a digitally encoded plastic memory, aholographic memory, or any other recording medium. Data stores 140 and160 can be a stand-alone storage unit as well as a storage unit formedfrom a plurality of physical devices. Additionally, information can bestored within data stores 140 and 160 in a variety of manners. Forexample, information can be stored within a database structure or can bestored within one or more files of a file storage system, where eachfile may or may not be indexed for information searching purposes.Further, data stores 140 and/or 160 can utilize one or more encryptionmechanisms to protect stored information from unauthorized access.

FIG. 2 is a collection 200 of graphical user interfaces (GUIs) 205 and250 that can be used for the configuration of user-levelrepresentation-based interaction rules in accordance with embodiments ofthe inventive arrangements disclosed herein. GUIs 205 and 250 can beutilized within the context of system 100 or any other system thatincorporates the use of representational authenticity for the conductionof interactions within a virtual world environment.

It is important to note that the GUIs 205 and 250 of collection 200 arefor illustrative purposes only, and are not intended to present acomprehensive implementation of this aspect of the present invention.

GUIs 205 and 250 of collection 200 can represent views of the virtualworld interface 115 that can allow user-configuration of the user-levelrepresentation-based interaction rules 175 of system 100. As shown inthis example, GUI 205 illustrates the avatar tab 210 of the interfacewhere a user can define rules 215 representing the user's preferencesfor displaying their virtual representation 215 or avatar.

Each rule 215 shown in GUI 205 can be thought of as a graphicalrepresentation of a conditional statement of the general format “ifthese authenticity requirements 225 are met, display this virtualrepresentation 220”. The virtual representations 220 can be created bythe user and/or created by the virtual world environment based upon theuser's collected user representational authenticity data.

The authenticity requirements 225 can represent the user-definedconditions for presenting the corresponding virtual representation 220in the virtual world environment. The authenticity requirements 225 canutilize known elements and/or properties of user representationalauthenticity data, such as height, age, and user representationalauthenticity score. Additionally, the GUI 205 can be configured to allowthe use of BOOLEAN logic when defining authenticity requirements 225.

In this example, rule ‘1’ 215 can be interpreted as stating that otherusers in the virtual world environment who have an authenticity scoreless than or equal to thirty OR an authenticity score having a value of“Not Available” will view the user as a male barbarian avatar 220. Rule‘2’ 215 can allow other users whose authenticity score is greater thanthirty AND less than or equal to seventy to view the user as a femaleavatar carrying ice skates 220.

Thus, a user can tailor the appearance of their avatar 220 based uponthe level of representation authenticity of other users. This can allowa user to present a more accurate virtual representation 220 ofthemselves in situations where other users are presenting themselves ata comparable level of authenticity. Additionally, this means ofconfiguration can also the user to present a more anonymous or guardedvirtual representation 220 to those having little or an unknown level ofrepresentation authenticity.

Additionally, the avatar tab 210 of GUI 205 can include action commands230 to allow the user to perform specified actions, such as adding orediting a rule 215. The action commands 230 can be presented to the userfor selection in a variety of ways, including, but not limited to, GUIbuttons, context menu items, pop-up windows, menu commands, and thelike.

GUI 250 can illustrate the general tab 255 of the interface where a usercan configure options 260 representing the user's preferences regardingfor the general handling of their user representational authenticitydata. As shown in this example, the options 260 presented in GUI 250have been configured to provide other users with authenticity data on an“On Demand” basis with a data level of basic and its currency. Theuser's authenticity score is always shown to other users. Additionally,the user wishes to always request the authenticity data of other usersas well as ignoring other users who have authenticity scores less thanor equal to twenty.

The general tab 255 of GUI 250 can also include a save button 265 forcapturing changes to the options 260 as well as a cancel button 270 forundoing unsaved changes to the options 260.

FIG. 3 is an illustration of a user interface 300 for a virtual worldenvironment that utilizes representation authenticity in accordance withembodiments of the inventive arrangements disclosed herein. The userinterface 300 can be utilized within the context of system 100 and/or inconjunction with the GUIs 205 and 250 of collection 200.

The virtual world user interface 300 can provide the user 305 with thefunctionalities for participating in the presented graphical virtualworld, such as the navigation buttons 335 for moving through the virtualworld. The user 305 can interact with the avatars 310 of other users 305and or virtual world locations 315, such as the coffee house shown inthis example.

In addition to the basic presentation of the virtual world, the userinterface 300 can be configured to present elements specific to the useof user representational authenticity data. As shown in this example,each avatar 310 shown in the user interface 300 can have the value fortheir user representational authenticity score 330 presented in a bubblefloating above their head.

It should be noted that the presentation of a user's 305 userrepresentational authenticity score 330 can vary based upon theimplementation within the virtual world environment and/or thepreferences defined by a user's 305 user-level representation-basedinteraction rules.

The virtual world location 315 can include a visual indicator 320 thatcan denote the existence of entry requirements 325 for the location 315.The entry requirements 325 can correspond to one or more world-levelrepresentation-based interaction rules defined for the virtual worldlocation 315. The user 305 can then perform an action to access theentry requirements 325.

In this example, a star is used as the visual indicator 320 and hoveringover the star 320 with the mouse pointer presents a list of the entryrequirements 325. Only users 305 whose user representationalauthenticity data indicates an age greater than or equal to eighteen andwhose calculated user representational authenticity score 330 is greaterthan or equal to forty-five are allowed to enter the coffee house 315.It can then be logically follow that the avatars 310 already inside thecoffee house 315 meet the entry requirements 325.

Further, the barbarian avatar 310 with a user representationalauthenticity score 330 of sixteen cannot gain entry to the coffee house315. The gray avatar 310 with the user representational authenticityscore 330 of seventy-four, however, can only gain entry if they havebeen verified to eighteen years of age or older.

FIG. 4 is a flow chart of a method 400 that describes the use of userrepresentational authenticity data in virtual world interactions inaccordance with an embodiment of the inventive arrangements disclosedherein. Method 400 can be performed in the context of system 100 and/orutilizing the graphical user interfaces (GUIs) 205, 250, and 300 ofFIGS. 2 and 3.

Method 400 can begin with step 405 where the virtual world environmentcan receive user representational authenticity data. The received userrepresentational authenticity data can be stored in the user profile forthe associated user in step 410. In step 415, a user representationalauthenticity score can be calculated for the virtual representation ofthe user. Step 415 can be automatically performed by therepresentational authenticity handler of the virtual world environment.

The virtual representation of the user can be optionally adjusted toconform to the user representational authenticity data in step 420. Instep 425, the occurrence of an interaction having representationalauthenticity requirements can be detected.

The necessary user representational authenticity data can beinterrogated in step 430. In step 435, it can be determined if therepresentational authenticity requirements have been satisfied. When therepresentational authenticity requirements have been satisfied, theinteraction can be permitted to continue in step 440.

When the representational authenticity requirements have not beensatisfied, step 445 can execute where continuation of the interactioncan stopped. The user can be optionally presented with an interactionrejection notice in step 450.

The diagrams in FIGS. 1-4 illustrate the architecture, functionality,and operation of possible implementations of systems, methods, andcomputer program products according to various embodiments of thepresent invention. In this regard, each block in the flowchart or blockdiagrams may represent a module, segment, or portion of code, whichcomprises one or more executable instructions for implementing thespecified logical function(s). It should also be noted that, in somealternative implementations, the functions noted in the block may occurout of the order noted in the figures. For example, two blocks shown insuccession may, in fact, be executed substantially concurrently, or theblocks may sometimes be executed in the reverse order, depending uponthe functionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts, or combinations of special purpose hardware andcomputer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a,” “an,” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiment was chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

1. A system that incorporates representational authenticity into virtualworld interactions comprising: a plurality of user representationalauthenticity data describing one or more physical characteristics of ahuman user, wherein said one or more physical characteristics arequantifiable utilizing standardized measurement techniques; and avirtual world computing system configured to adjudicate conduction ofinteractions performed by a virtual representation of the human userwithin a virtual world environment utilizing the plurality of userrepresentational authenticity data.
 2. The system of claim 1, whereinthe plurality of user representational authenticity data is collected bya third-party agency external to the virtual world computing system,wherein said human user physically presents themselves and at least oneitem of identification at the third-party agency.
 3. The system of claim1, wherein the virtual world computing system further comprises: aplurality of user-level representation-based interaction rulesdescribing user-defined preferences to be used by the virtual worldcomputing system when utilizing the plurality of user representationalauthenticity data for interactions within the virtual world environment;a plurality of world-level representation-based interaction rulesdefining representational authenticity requirements for specifiedlocations within the virtual world environment, wherein a failure by theplurality of user representational authenticity data to satisfy aworld-level representation-based interaction rule for a specifiedlocation restricts access to said specified location; and arepresentational authenticity handler configured to manage interactionsconducted by the virtual representation of the human user within thevirtual world environment that requires use of the plurality of userrepresentational authenticity data and at least one of the plurality ofuser-level representation-based interaction rules and the plurality ofworld-level authenticity-based interaction rules.
 4. The system of claim3, wherein the representational authenticity handler calculates arepresentational authenticity score for each virtual representation ofthe human user, wherein said representational authenticity score definesa degree of resemblance between the virtual representation and the humanuser, and, wherein the representational authenticity score is utilizedas a conditional parameter for at least one of a user-levelrepresentation-based interaction rule and a world-levelrepresentation-based interaction rule.
 5. The system of claim 4, whereinthe representational authenticity score is visually presented forviewing by other users within the virtual world environment.
 6. Thesystem of claim 3, wherein the representational authenticity handlercreates the virtual representation of the human user within the virtualworld environment based upon the plurality of user representationalauthenticity data.
 7. The system of claim 3, wherein the plurality ofuser-level representation-based interaction rules influences at leastone of access privileges to the plurality of user representationalauthenticity data, presentation of the virtual representation of thehuman user, transmission of the plurality of user representationalauthenticity data to other human users, and requesting userrepresentational authenticity data from other human users.
 8. The systemof claim 3, wherein functions of the representational authenticityhandler are provided as a service within the virtual world environment,wherein said virtual world environment utilizes a service-orientedarchitecture (SOA).
 9. The system of claim 1, wherein the plurality ofuser representational authenticity data comprises at least one of aheight, a weight, an eye color, a hair color, a type and location ofbody embellishments, an age, and a set of physical body measurements.10. The system of claim 1, wherein the plurality of userrepresentational authenticity data is stored within the virtual worldcomputing system as an element of a user profile associated with thehuman user.
 11. A method that utilizes representational authenticitydata when handling virtual world interactions comprising: identifying aninteraction of a virtual representation of a human user within a virtualworld environment, wherein said interaction utilizes at least onerepresentational authenticity requirement based upon userrepresentational authenticity data, wherein the user representationalauthenticity data describes one or more quantifiable physicalcharacteristic of the human user, and, wherein the interaction isconducted with at least one of the virtual representation of a secondaryhuman user and a distinct location of the virtual world environment;accessing the user representational authenticity data associated withthe human user, wherein said user representational authenticity data isstored in a user profile within the virtual world environment;determining satisfaction of the at least one representationalauthenticity requirement by the user representational authenticity data;and when the at least one representational authenticity requirement issatisfied, permitting conduction of the interaction by the virtualrepresentation of the human user within the virtual world environment.12. The method of claim 11, further comprising: when the at least onerepresentational authenticity requirement is unsatisfied, prohibitingconduction of the interaction by the virtual representation of the humanuser within the virtual world environment.
 13. The method of claim 11,further comprising: presenting an interaction rejection notice to thehuman user within an interface of the virtual world environment, whereinsaid interaction rejection notice provides noncompliance information forthe interaction.
 14. The method of claim 10, wherein the accessing ofuser representational authenticity data and determination ofrepresentational authenticity requirement satisfaction is performed by arepresentational authenticity handler component of the virtual worldenvironment.
 15. The method of claim 11, further comprising: receivingthe user representational authenticity data for the human user from athird-party agency, wherein said user representational authenticity datais verified during an in-person meeting between the third-party agencyand the human user; and storing the received user representationalauthenticity data in the user profile associated with the human user.16. The method of claim 11, wherein the at least one representationalauthenticity requirement is defined as at least one of a world-levelrepresentation-based interaction rule of the virtual world environmentand a user-level representation-based interaction rule of the humanuser.
 17. A virtual world environment that utilizes representationalauthenticity data when handling virtual world interactions comprising: aplurality of user representational authenticity data describing one ormore physical characteristics of a human user, wherein said one or morephysical characteristics are quantifiable utilizing standardizedmeasurement techniques; a virtual world computing system configured topresent a virtual world environment in which a virtual representation ofthe human user interacts with at least one of the virtual representationof a secondary human user and the virtual world environment; and arepresentational authenticity handler configured to utilize theplurality of user representational authenticity data to determine whichinteractions the virtual representation of the human user is allowed toperform within the virtual world environment.
 18. The virtual worldenvironment of claim 17, wherein the representational authenticityhandler further comprises: a plurality of user-levelrepresentation-based interaction rules describing user-definedpreferences for utilizing the plurality of user representationalauthenticity data when the virtual representation of the human userperforms interactions within the virtual world environment; and a userinterface configured to permit user-configuration of the plurality ofuser-level representation-based interaction rules for use by therepresentational authenticity handler.
 19. The virtual world environmentof claim 17, wherein the virtual world computing system furthercomprises: a plurality of world-level representation-based interactionrules defining representational authenticity requirements for specifiedlocations within the virtual world environment, wherein a failure by theplurality of user representational authenticity data to satisfy aworld-level representation-based interaction rule for a specifiedlocation restricts access to said specified location for the virtualrepresentation of the human user.
 20. The virtual world environment ofclaim 17, wherein the representational authenticity handler calculates arepresentational authenticity score for each virtual representation ofthe human user contained within the virtual world computing system,wherein said representational authenticity score defines a degree ofresemblance between the virtual representation and the human user.