Linking token detection at a single computing platform with a user identification to unlock content in virtual space instances presented via multiple computing platforms

ABSTRACT

Token detection at a single computing platform may be linked with a user identification to unlock content and/or effectuate modifications in virtual space instances presented via multiple computing platforms, in accordance with one or more implementations. Exemplary implementations may enhance consistency in a user&#39;s experiences of a virtual space across multiple computing platforms.

FIELD OF THE DISCLOSURE

This disclosure relates to linking token detection at a single computingplatform with a user identification to unlock content and/or effectuatemodifications in virtual space instances presented via multiplecomputing platforms.

BACKGROUND

Conventionally, unlocking content and/or effectuating modifications in avirtual space may be limited to a single instance of the virtual spaceconfigured for presentation via a specific type of computing platform.As such, a user's experience may be inconsistent when the user accessesdifferent instances of the virtual space via different types ofcomputing platforms. For example, certain unlocked content and/ormodifications may be realized in an instance of the virtual spacepresented via a game console, but not in an instance of the virtualspace presented via a mobile device.

SUMMARY

One aspect of the disclosure relates to a system configured to linktoken detection at a single computing platform with a useridentification to unlock content and/or effectuate modifications invirtual space instances presented via multiple computing platforms, inaccordance with one or more implementations. Exemplary implementationsmay enhance consistency in a user's experiences of a virtual spaceacross multiple computing platforms. By way of non-limiting example, aphysical token may be detected at a stationary computing platform tounlock content and/or effectuate modifications in an instance of thevirtual space presented via the stationary computing platform. Thedetection of the token may be linked to a user identification (user ID)of the user such that, when the user accesses a different instance ofthe virtual space via a mobile computing platform using his user ID, theunlocked content and/or modifications are realized in the instancepresented via the mobile computing platform. A given token may be astandalone physical object. In some implementations, the given token maybe configured to depict a given character and/or a given virtual item.

The system may include one or more virtual space platforms. The virtualspace platform(s) may be configured to execute one or more computerprogram modules. The computer program modules may include one or more ofa user module, a space module, a token detection module, a user IDlinking module, a content unlocking module, a space modification module,a virtual item repository module, and/or other modules. The user modulemay be configured to access and/or manage one or more useridentifications, user profiles, and/or user information associated withusers of the system. The space module may be configured to implement oneor more instances of the virtual space executed by the computer modulesto determine views of the virtual space.

The token detection module may be configured to detect tokens based onsignals received from a token reader. A given token may be a standalonephysical object. The given token may be associated with a givencharacter and/or a given virtual item. The given virtual item may beassociated with the given character. In some implementations, the givenvirtual item may be associated with the given character based on a themeshared by the given virtual item and the given character. Examples ofthe given token may include one or more of a toy figurine, a toyaccessory, a coin, and/or other form factors suitable to be tokens asdescribed herein. Individual tokens may be configured to be detectableby token reader. The token reader may be configured to provide signalsassociated with individual tokens.

The user ID linking module may be configured to associate detection ofindividual tokens with individual user identifications. For example,detection of a first token may be associated with a first useridentification responsive to a first signal being received from a tokenreader communicatively coupled with a first computing platform withwhich the first user accesses an instance of the virtual space. In someimplementations, a user profile may be modified to indicate that one ormore tokens have been detected in connection with the correspondinguser.

The content unlocking module may be configured to unlock content in thevirtual space responsive to individual tokens being detected. Thecontent may include one or more of a character, a virtual item, and/orother content. Previously locked content may become accessible in thevirtual space responsive to being unlocked. That is, until certaincontent is unlocked, it may not be accessible and/or available in thevirtual space. The content may include first content configured to beunlocked responsive to the association between the detection of thefirst token and the first user identification. The unlocked firstcontent may be accessible in both the first instance via the firstcomputing platform as well as a second instance of the virtual space viaa second computing platform. According to some implementations, wherethe instances of the virtual space further include a third instanceassociated with the first user identification, the third instance beingconfigured for presentation via a third computing platform, the unlockedfirst content may be accessible in the third instance via the thirdcomputing platform.

According to some implementations, the content unlocking module may beconfigured to unlock content responsive to a performance of one or moregame mechanisms associated with the virtual space in conjunction withtoken detection. A game mechanism may include an action, a mission, aquest, a task, and/or other game mechanism. In some implementations,unlocking certain content may require both a given token being detectedand a given game mechanism being performed.

In some implementations, certain content may be unlocked responsive totwo or more tokens (e.g., a first token and a second token) beingdetected. The two or more tokens may be detected by the same tokenreader and/or by token readers associated with different virtual spaceplatforms. The content may embody a combination of content associatedwith the two or more detected tokens.

The space modification module may be configured to effectuatemodifications in the virtual space responsive to individual tokens beingdetected. The modifications may include one or more of a modification toa character, a modification to a virtual item, a modification to one ormore aspects of the virtual space, and/or other modifications. Themodification to the character may include a modification to one or moreof a behavior of the character, an ability of the character, anappearance of the character, a relationship of the character, and/orother modifications to the character. The modification to the virtualitem may include a modification to one or more of a function of thevirtual item, an effectiveness of the virtual item, an appearance of thevirtual item, and/or other modifications of the virtual item.

The one or more aspects of the virtual space may include one or more ofobjectives associated with the virtual space, an environment of thevirtual space, a theme of the virtual space, and/or other aspects of thevirtual space. Generally speaking, a given objective may be a purpose orgoal that efforts or actions within the virtual space are intended toattain or accomplish. By way of non-limiting example, an objective mayinclude a set of actions that must be performed by a user character inorder to advance to a next level of gameplay in the virtual space.

The environment may be an aggregate of surroundings and conditions ofthe virtual space. By way on non-limiting example, the surroundings ofthe virtual space may include one or more of the appearance of thevirtual space, a color scheme of the virtual space, a sound and/orsoundtrack associated with the virtual space, and/or other aspects ofthe surroundings of the virtual space. The conditions of the virtualspace may include one or more of laws of nature (e.g., gravity) of thevirtual space, weather depicted in the virtual space, and/or otheraspects of the conditions of the virtual space. Modifying theenvironment may include modifying one or both of the surroundings or theconditions of the virtual space.

The theme of the virtual space may be a unifying subject associated withthe virtual space. A given character may be one of a given plurality ofcharacters associated with a given theme. Modifying the theme of thevirtual space based on the given theme may include incorporating one ormore attributes of the given theme in the theme of the virtual space.Examples of such attributes may include one or more of objects, designs,symbols, color schemes, music, and/or other attributes that identify agiven theme.

The modifications may include a first modification configured to be maderesponsive to the association between the detection of the first tokenand the first user identification. The first modification may beobservable in both the first instance via the first computing platformand the second instance via the second computing platform. According tosome implementations, where the instances of the virtual space furtherinclude a third instance associated with the first user identification,the third instance being configured for presentation via a thirdcomputing platform, the first modification may be observable in thethird instance via the third computing platform.

The virtual item repository module may be configured to provide avirtual item repository within the virtual space. The virtual itemrepository may be configured to facilitate access by a plurality ofcharacters to a plurality of virtual items. The plurality of charactersmay include the first character and the plurality of virtual items mayinclude the first virtual item. The first virtual item may be accessiblevia the virtual item repository in both the first instance via the firstcomputing platform and the second instance via the second computingplatform. Where the plurality of characters includes a second character,the first virtual item may be accessible to the second character via thevirtual item repository.

In some implementations, the virtual item repository may be visuallyrepresented at a location within one or more instances of the virtualspace. By way of non-limiting example, the virtual item repository maybe visually represented as a toy box within the virtual space. In someimplementations, a given character may be required to be locatedproximally with the visual representation of the virtual item repositoryin order to access individual ones of the plurality of virtual items.For example, the given character may be required to stand next to,enter, and/or otherwise be located proximally with the visualrepresentation of the virtual item repository in order to access a givenvirtual item.

According to some implementations, individual ones of the plurality ofvirtual items made accessible by the virtual item repository may beaccessible to a given character via an inventory associated with thegiven character. The inventory may be accessible via a menu and/or otherinterface associated with the virtual space.

Accessibility of virtual items via the virtual item repository may varyaccording to different implementations. In some implementations, thevirtual item repository may be configured such that a given virtual itemis accessed by two or more characters at a given time. In someimplementations, the virtual item repository may be configured such thata given virtual item is accessed by one single character at a giventime. The one single character may be required to relinquish the givenvirtual item in order for the given virtual item to be accessed byanother character.

These and other features, and characteristics of the present technology,as well as the methods of operation and functions of the relatedelements of structure and the combination of parts and economies ofmanufacture, will become more apparent upon consideration of thefollowing description and the appended claims with reference to theaccompanying drawings, all of which form a part of this specification,wherein like reference numerals designate corresponding parts in thevarious figures. It is to be expressly understood, however, that thedrawings are for the purpose of illustration and description only andare not intended as a definition of the limits of the invention. As usedin the specification and in the claims, the singular form of “a”, “an”,and “the” include plural referents unless the context clearly dictatesotherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system configured to link token detection at asingle computing platform with a user identification to unlock contentand/or effectuate modifications in virtual space instances presented viamultiple computing platforms, in accordance with one or moreimplementations.

FIG. 2 illustrates a method for linking token detection at a singlecomputing platform with a user identification to unlock content invirtual space instances presented via multiple computing platforms, inaccordance with one or more implementations.

FIG. 3 illustrates a method for linking token detection at a singlecomputing platform with a user identification to effectuatemodifications in virtual space instances presented via multiplecomputing platforms, in accordance with one or more implementations.

DETAILED DESCRIPTION

FIG. 1 illustrates a system 100 configured to link token detection at asingle computing platform with a user identification to unlock contentand/or effectuate modifications in virtual space instances presented viamultiple computing platforms, in accordance with one or moreimplementations. Exemplary implementations may enhance consistency in auser's experiences of a virtual space across multiple computingplatforms. By way of non-limiting example, a physical token may bedetected at a stationary computing platform to unlock content and/oreffectuate modifications in an instance of the virtual space presentedvia the stationary computing platform. The detection of the token may belinked to a user identification (user ID) of the user such that, whenthe user accesses a different instance of the virtual space via a mobilecomputing platform using his user ID, the unlocked content and/ormodifications are realized in the instance presented via the mobilecomputing platform.

A given token may be a standalone physical object. In someimplementations, the given token may be configured to depict a givencharacter and/or a given virtual item. By way of non-limiting example,the given character may be Captain Jack Sparrow, the fictional characterand protagonist of the Pirates of the Caribbean film series. The givenvirtual item may be an accessory associated with Captain Jack Sparrow,such as a sword. The given token may be a toy figurine embodying theappearance of Captain Jack Sparrow and/or the sword.

The system 100 may include one or more virtual space platforms 102. Insome implementations, virtual space platform(s) 102 may be one or moreservers (e.g., server(s) 104) configured to communicate with one or moreclient computing platform (e.g., client computing platforms 106)according to a client/server architecture. According to someimplementations, virtual space platform(s) 102 may be one or more clientcomputing platforms (e.g., client computing platforms 106). In someimplementations, virtual space platform(s) 102 may communicate withother virtual space platform(s) 102 according to a peer-to-peerarchitecture. The users may access system 100 and/or the virtual spacevia the virtual space platform(s) 102 and/or client computingplatform(s) 106.

The virtual space platform(s) 102 may be configured to execute one ormore computer program modules. The computer program modules may includeone or more of a user module 108, a space module 110, a token detectionmodule 112, a user ID linking module 114, a content unlocking module116, a space modification module 118, a virtual item repository module120, and/or other modules.

The user module 108 may be configured to access and/or manage one ormore user identifications, user profiles, and/or user informationassociated with users of system 100. The one or more one or more useridentifications, user profiles, and/or user information may includeinformation stored by virtual space platform(s) 102 and/or other storagelocations. The one or more user identifications, user profiles, and/oruser information may include, for example, information identifying users(e.g., a username or handle, a number, an identifier, and/or otheridentifying information) within the virtual space, security logininformation (e.g., a login code or password), virtual space accountinformation, subscription information, virtual currency accountinformation (e.g., related to currency held in credit for a user),relationship information (e.g., information related to relationshipsbetween users in the virtual space), virtual space usage information,demographic information associated with users, interaction history amongusers in the virtual space, information stated by users, purchaseinformation of users, browsing history of users, a client computingplatform identification associated with a user, a phone numberassociated with a user, and/or other information related to users.

The space module 110 may be configured to implement one or moreinstances of the virtual space executed by the computer modules todetermine views of the virtual space. In some implementations, the viewsmay then be communicated (e.g., via streaming, via object/position data,and/or other information) from server(s) 104 to client computingplatform(s) 106 for presentation to users. The one or more instances ofthe virtual space may include a first instance and a second instance.Both the first instance and the second instance may be associated with asingle user identification. The first instance may be configured forpresentation via a first computing platform (e.g., a first clientcomputing platform 106) and the second instance may be configured forpresentation via a second computing platform (e.g., a second clientcomputing platform 106). The view determined and presented to a givenuser may correspond to a user character being controlled by the givenuser. The view determined and presented to the given user may correspondto a location in the virtual space (e.g., the location from which theview is taken, the location the view depicts, and/or other locations), azoom ratio, a dimensionality of objects, a point-of-view, and/or viewparameters. One or more of the view parameters may be selectable by theuser.

The instance of the virtual space may comprise a simulated space that isaccessible by users via virtual space platform(s) 102 and/or clients(e.g., client computing platform(s) 106) that present the views of thevirtual space to a user. The simulated space may have a topography,express ongoing real-time interaction by one or more users, and/orinclude one or more objects positioned within the topography that arecapable of locomotion within the topography. In some instances, thetopography may be a 2-dimensional topography. In other instances, thetopography may be a 3-dimensional topography. The topography may includedimensions of the space, and/or surface features of a surface or objectsthat are “native” to the space. In some instances, the topography maydescribe a surface (e.g., a ground surface) that runs through at least asubstantial portion of the space. In some instances, the topography maydescribe a volume with one or more bodies positioned therein (e.g., asimulation of gravity-deprived space with one or more celestial bodiespositioned therein). The instance executed by the computer modules maybe synchronous, asynchronous, and/or semi-synchronous.

The above description of the manner in which views of the virtual spaceare determined by space module 110 is not intended to be limiting. Thespace module 110 may be configured to express the virtual space in amore limited, or richer, manner. For example, views determined for thevirtual space may be selected from a limited set of graphics depictingan event in a given place within the virtual space. The views mayinclude additional content (e.g., text, audio, pre-stored video content,and/or other content) that describes particulars of the current state ofthe place, beyond the relatively generic graphics. For example, a viewmay include a generic battle graphic with a textual description of theopponents to be confronted. Other expressions of individual placeswithin the virtual space are contemplated.

Within the instance(s) of the virtual space executed by space module110, users may control characters, objects, simulated physical phenomena(e.g., wind, rain, earthquakes, and/or other phenomena), and/or otherelements within the virtual space to interact with the virtual spaceand/or each other. The user characters may include avatars. As usedherein, the term “user character” may refer to an object (or group ofobjects) present in the virtual space that represents an individualuser. The user character may be controlled by the user with which it isassociated. The user controlled element(s) may move through and interactwith the virtual space (e.g., non-user characters in the virtual space,other objects in the virtual space). The user controlled elementscontrolled by and/or associated with a given user may be created and/orcustomized by the given user. The user may have an “inventory” ofvirtual goods and/or currency that the user can use (e.g., bymanipulation of a user character or other user controlled element,and/or other items) within the virtual space.

The users may participate in the instance of the virtual space bycontrolling one or more of the available user controlled elements in thevirtual space. Control may be exercised through control inputs and/orcommands input by the users through virtual space platform(s) 102 and/orclients (e.g., client computing platform(s) 106). The users may interactwith each other through communications exchanged within the virtualspace. Such communications may include one or more of textual chat,instant messages, private messages, voice communications, and/or othercommunications. Communications may be received and entered by the usersvia their respective virtual space platform(s) 102 and/or client(s)(e.g., client computing platform(s) 106). Communications may be routedto and from the appropriate users through virtual space platform(s) 102(e.g., through space module 110).

The token detection module 112 may be configured to detect tokens basedon signals received from a token reader 122. A given token (e.g., token124) may be a standalone physical object. The given token may beassociated with a given character and/or a given virtual item. The givenvirtual item may be associated with the given character. In someimplementations, the given virtual item may be associated with the givencharacter based on a theme shared by the given virtual item and thegiven character. By way of non-limiting example, the given character maybe Buzz Lightyear, the fictional character and deuteragonist of the ToyStory film series. The given virtual item may be the handheld “Blaster”used by Buzz Lightyear in the Toy Story film series. The character BuzzLightyear and the virtual item Blaster share the theme of the Toy Storyfilm series. In some implementations, the given token may be configuredto depict the given character and/or the given virtual item. Examples ofthe given token may include one or more of a toy figurine, a toyaccessory, a coin, and/or other form factors suitable to be tokens asdescribed herein.

Individual tokens may be configured to be detectable by token reader122. In some implementations, detection of a given token may be based ona shape of a portion of the given token. In some implementations, agiven token may be detectable based on a given signal conveyinginformation associated with the given token. Detection of a given tokenmay be facilitated by electronics embedded within or otherwise includedin the given token. For example, the given token may include aradio-frequency identification (RFID) chip configured to emitradio-frequency electromagnetic fields responsive to the given tokenbeing disposed in a proximity of token reader 122. As another example,the given token may include an integrated circuit configured to transferinformation associated with the given token responsive to the giventoken being placed in contact with a portion of token reader 122.

According to some implementations, virtual space content associated withvirtual items and/or other virtual space content may be stored at alocation other than one or more of the tokens. That is, a given tokenmay not store virtual space content. A given token may store informationused to detect the given token. A given token may not store informationother than what may be used to detect the given token. Virtual spacecontent may be information used by space module 110 to affect viewsand/or gameplay of the virtual space. Such virtual space content may bestored by the virtual space platform(s) and/or by one or more othercomponents of system 100.

The token reader 122 may be configured to provide signals associatedwith individual tokens. For example, a given signal associated with agiven token may convey information associated with the given token. Insome implementations, token reader 122 may be configured to provide afirst signal responsive to one or more of (1) a first token abutting aportion of the token reader, (2) the first token being disposed in aproximity of the token reader, and/or other actions configured tofacilitate detection of the first token. According to someimplementations, token reader 122 may be a peripheral device configuredto be communicatively coupled with one or more components of system 100.In some implementations, token reader 122 may be integrated so as toform a singular device with a component of system 100 (e.g., a givenvirtual space platform 102). According to some implementations, one ormore of the client computing platform(s) 106 may be communicativelycoupled with a token reader 122, while one or more of the clientcomputing platform(s) 106 may not be communicatively coupled with and/orotherwise associated with a token reader 122. For example, a stationaryclient computing platform may have an integrated token reader, while amobile client computing platform may not have a token reader associatedtherewith.

The user ID linking module 114 may be configured to associate detectionof individual tokens with individual user identifications. For example,detection of a first token may be associated with a first useridentification responsive to a first signal being received from a tokenreader 122 communicatively coupled with a first computing platform(e.g., a client computing platform 106) with which the first useraccesses an instance of the virtual space. In some implementations, auser profile may be modified to indicate that one or more tokens havebeen detected in connection with the corresponding user.

The content unlocking module 116 may be configured to unlock content inthe virtual space responsive to individual tokens being detected. Thecontent may include one or more of a character, a virtual item, and/orother content. Previously locked content may become accessible in thevirtual space responsive to being unlocked. That is, until certaincontent is unlocked, it may not be accessible and/or available in thevirtual space. The content may include first content configured to beunlocked responsive to the association between the detection of thefirst token and the first user identification. The unlocked firstcontent may be accessible in both the first instance via the firstcomputing platform as well as a second instance of the virtual space viaa second computing platform (e.g., a second client computing platform106). According to some implementations, where the instances of thevirtual space further include a third instance associated with the firstuser identification, the third instance being configured forpresentation via a third computing platform (e.g., a third clientcomputing platform 106), the unlocked first content may be accessible inthe third instance via the third computing platform.

According to some implementations, content unlocking module 116 may beconfigured to unlock content responsive to a performance of one or moregame mechanisms associated with the virtual space in conjunction withtoken detection. A game mechanism may include an action, a mission, aquest, a task, and/or other game mechanism. In some implementations,unlocking certain content may require both a given token being detectedand a given game mechanism being performed.

In some implementations, certain content may be unlocked responsive totwo or more tokens (e.g., a first token and a second token) beingdetected. The two or more tokens may be detected by the same tokenreader 122 and/or by token readers 122 associated with different virtualspace platforms 102. The content may embody a combination of contentassociated with the two or more detected tokens. By way of non-limitingexample, the content unlocked responsive to two or more tokens beingdetected may include an accessory that combines certain features of thesword and the Blaster.

The space modification module 118 may be configured to effectuatemodifications in the virtual space responsive to individual tokens beingdetected. The modifications may include one or more of a modification toa character, a modification to a virtual item, a modification to one ormore aspects of the virtual space, and/or other modifications. Themodification to the character may include a modification to one or moreof a behavior of the character, an ability of the character, anappearance of the character, a relationship of the character, and/orother modifications to the character. The modification to the virtualitem may include a modification to one or more of a function of thevirtual item, an effectiveness of the virtual item, an appearance of thevirtual item, and/or other modifications of the virtual item.

The one or more aspects of the virtual space may include one or more ofobjectives associated with the virtual space, an environment of thevirtual space, a theme of the virtual space, and/or other aspects of thevirtual space. Generally speaking, a given objective may be a purpose orgoal that efforts or actions within the virtual space are intended toattain or accomplish. By way of non-limiting example, an objective mayinclude a set of actions that must be performed by a user character inorder to advance to a next level of gameplay in the virtual space.

The environment may be an aggregate of surroundings and conditions ofthe virtual space. By way on non-limiting example, the surroundings ofthe virtual space may include one or more of the appearance of thevirtual space, a color scheme of the virtual space, a sound and/orsoundtrack associated with the virtual space, and/or other aspects ofthe surroundings of the virtual space. The conditions of the virtualspace may include one or more of laws of nature (e.g., gravity) of thevirtual space, weather depicted in the virtual space, and/or otheraspects of the conditions of the virtual space. Modifying theenvironment may include modifying one or both of the surroundings or theconditions of the virtual space.

The theme of the virtual space may be a unifying subject associated withthe virtual space. A given character may be one of a given plurality ofcharacters associated with a given theme. By way of non-limitingexample, where the first character is Captain Jack Sparrow and thesecond character is Buzz Lightyear, the first theme may relate toPirates of the Caribbean and the second theme may relate to Toy Story.Modifying the theme of the virtual space based on the given theme mayinclude incorporating one or more attributes of the given theme in thetheme of the virtual space. Examples of such attributes may include oneor more of objects, designs, symbols, color schemes, music, and/or otherattributes that identify a given theme.

The modifications may include a first modification configured to be maderesponsive to the association between the detection of the first tokenand the first user identification. The first modification may beobservable in both the first instance via the first computing platformand the second instance via the second computing platform. According tosome implementations, where the instances of the virtual space furtherinclude a third instance associated with the first user identification,the third instance being configured for presentation via a thirdcomputing platform (e.g., a third computing platform 106), the firstmodification may be observable in the third instance via the thirdcomputing platform.

The virtual item repository module 120 may be configured to provide avirtual item repository within the virtual space. The virtual itemrepository may be configured to facilitate access by a plurality ofcharacters to a plurality of virtual items. The plurality of charactersmay include the first character and the plurality of virtual items mayinclude the first virtual item. The first virtual item may be accessiblevia the virtual item repository in both the first instance via the firstcomputing platform and the second instance via the second computingplatform. Where the plurality of characters includes a second character,the first virtual item may be accessible to the second character via thevirtual item repository.

In some implementations, the virtual item repository may be visuallyrepresented at a location within one or more instances of the virtualspace. By way of non-limiting example, the virtual item repository maybe visually represented as a toy box within the virtual space. In someimplementations, a given character may be required to be locatedproximally with the visual representation of the virtual item repositoryin order to access individual ones of the plurality of virtual items.For example, the given character may be required to stand next to,enter, and/or otherwise be located proximally with the visualrepresentation of the virtual item repository in order to access a givenvirtual item.

According to some implementations, individual ones of the plurality ofvirtual items made accessible by the virtual item repository may beaccessible to a given character via an inventory associated with thegiven character. The inventory may be accessible via a menu and/or otherinterface associated with the virtual space.

Accessibility of virtual items via the virtual item repository may varyaccording to different implementations. In some implementations, thevirtual item repository may be configured such that a given virtual itemis accessed by two or more characters at a given time. In someimplementations, the virtual item repository may be configured such thata given virtual item is accessed by one single character at a giventime. The one single character may be required to relinquish the givenvirtual item in order for the given virtual item to be accessed byanother character.

In some implementations, two or more components of system 100 (e.g.,virtual space platform(s) 102, server(s) 104, client computingplatform(s) 106, token reader 122, and/or external resources 126) may beoperatively linked via one or more electronic communication links. Forexample, such electronic communication links may be established, atleast in part, via a network such as the Internet and/or other networks.It will be appreciated that this is not intended to be limiting, andthat the scope of this disclosure includes implementations in which twoor more components of system 100 may be operatively linked via someother communication media.

A given server 104 may include one or more processors configured toexecute computer program modules. The computer program modules may beconfigured to enable an expert or user associated with the given server104 to interface with system 100 and/or external resources 126, and/orprovide other functionality attributed herein to server(s) 104.

A given client computing platform 106 may include one or more processorsconfigured to execute computer program modules. The computer programmodules may be configured to enable an expert or user associated withthe given client computing platform 106 to interface with system 100and/or external resources 126, and/or provide other functionalityattributed herein to client computing platform(s) 106. By way ofnon-limiting example, the given client computing platform 106 mayinclude one or more of a desktop computer, a laptop computer, a handheldcomputer, a NetBook, a Smartphone, a gaming console, and/or othercomputing platforms.

The external resources 126 may include sources of information, hostsand/or providers of virtual environments outside of system 100, externalentities participating with system 100, and/or other resources. In someimplementations, some or all of the functionality attributed herein toexternal resources 126 may be provided by resources included in system100.

The virtual space platform(s) 102 may include electronic storage 128,one or more processors 130, and/or other components. The virtual spaceplatform(s) 102 may include communication lines, or ports to enable theexchange of information with a network and/or other computing platforms.Illustration of virtual space platform(s) 102 in FIG. 1 is not intendedto be limiting. The virtual space platform(s) 102 may include aplurality of hardware, software, and/or firmware components operatingtogether to provide the functionality attributed herein to virtual spaceplatform(s) 102. For example, virtual space platform(s) 102 may beimplemented by a cloud of computing platforms operating together asvirtual space platform(s) 102.

Electronic storage 128 may comprise electronic storage media thatelectronically stores information. The electronic storage media ofelectronic storage 128 may include one or both of system storage that isprovided integrally (i.e., substantially non-removable) with virtualspace platform(s) 102 and/or removable storage that is removablyconnectable to virtual space platform(s) 102 via, for example, a port(e.g., a USB port, a firewire port, etc.) or a drive (e.g., a diskdrive, etc.). Electronic storage 128 may include one or more ofoptically readable storage media (e.g., optical disks, etc.),magnetically readable storage media (e.g., magnetic tape, magnetic harddrive, floppy drive, etc.), electrical charge-based storage media (e.g.,EEPROM, RAM, etc.), solid-state storage media (e.g., flash drive, etc.),and/or other electronically readable storage media. The electronicstorage 128 may include one or more virtual storage resources (e.g.,cloud storage, a virtual private network, and/or other virtual storageresources). Electronic storage 128 may store software algorithms,information determined by processor(s) 130, information received fromone or more other components of system 100, and/or other informationthat enables virtual space platform(s) 102 to function as describedherein.

The processor(s) 130 may be configured to provide information processingcapabilities in virtual space platform(s) 102. As such, processor(s) 130may include one or more of a digital processor, an analog processor, adigital circuit designed to process information, an analog circuitdesigned to process information, a state machine, and/or othermechanisms for electronically processing information. Althoughprocessor(s) 130 is shown in FIG. 1 as a single entity, this is forillustrative purposes only. In some implementations, processor(s) 130may include a plurality of processing units. These processing units maybe physically located within the same device, or processor(s) 130 mayrepresent processing functionality of a plurality of devices operatingin coordination. The processor(s) 130 may be configured to executemodules 108, 110, 112, 114, 116, 118, 120, and/or other modules. Theprocessor(s) 130 may be configured to execute modules 108, 110, 112,114, 116, 118, 120, and/or other modules by software; hardware;firmware; some combination of software, hardware, and/or firmware;and/or other mechanisms for configuring processing capabilities onprocessor(s) 130.

It should be appreciated that although modules 108, 110, 112, 114, 116,118, and 120 are illustrated in FIG. 1 as being co-located within asingle processing unit, in implementations in which processor(s) 130includes multiple processing units, one or more of modules 108, 110,112, 114, 116, 118, and/or 120 may be located remotely from the othermodules. The description of the functionality provided by the differentmodules 108, 110, 112, 114, 116, 118, and/or 120 described herein is forillustrative purposes, and is not intended to be limiting, as any ofmodules 108, 110, 112, 114, 116, 118, and/or 120 may provide more orless functionality than is described. For example, one or more ofmodules 108, 110, 112, 114, 116, 118, and/or 120 may be eliminated, andsome or all of its functionality may be provided by other ones ofmodules 108, 110, 112, 114, 116, 118, and/or 120. As another example,processor(s) 130 may be configured to execute one or more additionalmodules that may perform some or all of the functionality attributedbelow to one of modules 108, 110, 112, 114, 116, 118, and/or 120.

FIG. 2 illustrates a method 200 and FIG. 3 illustrates a method 300, inaccordance with one or more implementations. The operations of method200 and/or method 300 presented below are intended to be illustrative.In some implementations, method 200 and/or method 300 may beaccomplished with one or more additional operations not described,and/or without one or more of the operations discussed. Additionally,the order in which the operations of method 200 and/or method 300 arerespectively illustrated in FIG. 2 and/or FIG. 3 and described below isnot intended to be limiting.

In some implementations, method 200 and/or method 300 may be implementedin one or more processing devices (e.g., a digital processor, an analogprocessor, a digital circuit designed to process information, an analogcircuit designed to process information, a state machine, and/or othermechanisms for electronically processing information). The one or moreprocessing devices may include one or more devices executing some or allof the operations of method 200 and/or method 300 in response toinstructions stored electronically on an electronic storage medium. Theone or more processing devices may include one or more devicesconfigured through hardware, firmware, and/or software to bespecifically designed for execution of one or more of the operations ofmethod 200 and/or method 300.

The method 200, illustrated in FIG. 2, is for linking token detection ata single computing platform with a user identification to unlock contentin virtual space instances presented via multiple computing platforms,in accordance with one or more implementations.

At an operation 202, user identifications associated with users of thesystem may be managed. The user identifications may include a first useridentification associated with a first user. Operation 202 may beperformed by a user module that is the same as or similar to user module108, in accordance with one or more implementations.

At an operation 204, instances of a virtual space may be implemented todetermine views of the virtual space. The instances of the virtual spacemay include a first instance and a second instance. Both the firstinstance and the second instance may be associated with the first useridentification. The first instance may be configured for presentationvia a first computing platform and the second instance may be configuredfor presentation via a second computing platform. Operation 204 may beperformed by a space module that is the same as or similar to spacemodule 110, in accordance with one or more implementations.

At an operation 206, one or more tokens may be detected based on signalsreceived from a token reader. The token reader may be communicativelycoupled with the first computing platform. A given token may be astandalone physical object. The one or more tokens may include a firsttoken. The first token may be detectable based on a first signalconveying information associated with the first token. Operation 206 maybe performed by a token detection module that is the same as or similarto token detection module 112, in accordance with one or moreimplementations.

At an operation 208, detection of individual tokens may be associatedwith individual user identifications. Detection of the first token maybe associated with the first user identification responsive to the firstsignal being received from the token reader communicatively coupled withthe first computing platform. Operation 208 may be performed by a userID linking module that is the same as or similar to user ID linkingmodule 114, in accordance with one or more implementations.

At an operation 210, content may be unlocked in the virtual spaceresponsive to individual tokens being detected. Previously lockedcontent may become accessible in the virtual space responsive to beingunlocked. The content may include first content configured to beunlocked responsive to the association between the detection of thefirst token and the first user identification. The unlocked firstcontent may be accessible in both the first instance via the firstcomputing platform and the second instance via the second computingplatform. The first content may include one or both of (1) a firstcharacter or (2) a first virtual item. Operation 210 may be performed bya content unlocking module that is the same as or similar to contentunlocking module 116, in accordance with one or more implementations.

The method 300, illustrated in FIG. 3, is for linking token detection ata single computing platform with a user identification to effectuatemodifications in virtual space instances presented via multiplecomputing platforms, in accordance with one or more implementations.

At an operation 302, user identifications associated with users of thesystem may be managed. The user identifications may include a first useridentification associated with a first user. Operation 302 may beperformed by a user module that is the same as or similar to user module108, in accordance with one or more implementations.

At an operation 304, instances of a virtual space may be implemented todetermine views of the virtual space. The instances of the virtual spacemay include a first instance and a second instance. Both the firstinstance and the second instance may be associated with the first useridentification. The first instance may be configured for presentationvia a first computing platform and the second instance may be configuredfor presentation via a second computing platform. Operation 304 may beperformed by a space module that is the same as or similar to spacemodule 110, in accordance with one or more implementations.

At an operation 306, one or more tokens may be detected based on signalsreceived from a token reader. The token reader may be communicativelycoupled with the first computing platform. A given token may be astandalone physical object. The one or more tokens may include a firsttoken. The first token may be detectable based on a first signalconveying information associated with the first token. Operation 306 maybe performed by a token detection module that is the same as or similarto token detection module 112, in accordance with one or moreimplementations.

At an operation 308, detection of individual tokens may be associatedwith individual user identifications. Detection of the first token maybe associated with the first user identification responsive to the firstsignal being received from the token reader communicatively coupled withthe first computing platform. Operation 308 may be performed by a userID linking module that is the same as or similar to user ID linkingmodule 114, in accordance with one or more implementations.

At an operation 310, modifications may be effectuated in the virtualspace responsive to individual tokens being detected. The modificationsmay include a first modification configured to be made responsive to theassociation between the detection of the first token and the first useridentification. The first modification may be observable in both thefirst instance via the first computing platform and the second instancevia the second computing platform. The first modification may includeone or more of (1) a modification to a first character, (2) amodification to a first virtual item, or (3) a modification to one ormore aspects of the virtual space. Operation 310 may be performed by aspace modification module that is the same as or similar to spacemodification module 118, in accordance with one or more implementations.

Although the present technology has been described in detail for thepurpose of illustration based on what is currently considered to be themost practical and preferred implementations, it is to be understoodthat such detail is solely for that purpose and that the technology isnot limited to the disclosed implementations, but, on the contrary, isintended to cover modifications and equivalent arrangements that arewithin the spirit and scope of the appended claims. For example, it isto be understood that the present technology contemplates that, to theextent possible, one or more features of any implementation can becombined with one or more features of any other implementation.

1. A system configured to link token detection at a single computingplatform with a user identification to unlock content in virtual spaceinstances presented via multiple computing platforms, the systemcomprising: one or more processors configured to execute computerprogram modules, the computer program modules comprising: a user moduleconfigured to manage user identifications associated with users of thesystem, the user identifications including a first user identificationassociated with a first user; a space module configured to implementinstances of a virtual space to determine views of the virtual space,the instances of the virtual space including a first instance and asecond instance, both the first instance and the second instance beingassociated with the first user identification, the first instance beingaccessible by the first user via a first computing platform responsiveto the first user identification being provided by the first user viathe first computing platform, the second instance being accessible bythe first user via a second computing platform responsive to the firstuser identification being provided by the first user via the secondcomputing platform; a token detection module configured to detect tokensbased on signals received from a token reader, the token reader beingcommunicatively coupled with the first computing platform, a given tokenbeing a standalone physical object, the tokens including a first tokenand a second token, the first token being detectable based on a firstsignal conveying information associated with the first token, the secondtoken being detectable based on a second signal conveying informationassociated with the second token; a user ID linking module configured toassociate individual tokens with individual user identifications, thefirst token and the second token being associated with the first useridentification responsive to the first token and the second token beingdetected by the token detection module via the first signal and thesecond signal received from the token reader communicatively coupledwith the first computing platform; and a content unlocking moduleconfigured to unlock content in multiple instances of the virtual spacepresented via multiple computing platforms associated with a single userresponsive to individual tokens being detected, previously lockedcontent becoming accessible in the virtual space responsive to beingunlocked, the content including first content configured to be unlockedresponsive to the association between the first token and the first useridentification, the content further including second content configuredto be unlocked responsive to the association between the second tokenand the first user identification, the unlocked first content and theunlocked second content being accessible in instances of the virtualspace associated with the first user identification including both thefirst instance via the first computing platform and the second instancevia the second computing platform, the first content including one orboth of (1) a first character or (2) a first virtual item, the secondcontent including one or both of (1) a second character or (2) a secondvirtual item; wherein the first content remains unlocked after the firsttoken is detected via the first signal received from the token readercommunicatively coupled with the first computing platform such thatfuture detection of the first token is unnecessary to access the firstcontent in both the first instance via the first computing platform andthe second instance via the second computing platform; and wherein thesecond content remains unlocked after the second token is detected viathe second signal received from the token reader communicatively coupledwith the first computing platform such that future detection of thesecond token is unnecessary to access the second content in both thefirst instance via the first computing platform and the second instancevia the second computing platform.
 2. The system of claim 1, wherein theinstances of the virtual space further include a third instanceassociated with the first user identification, the third instance beingconfigured for presentation via a third computing platform, and whereinthe unlocked first content is accessible in the third instance via thethird computing platform.
 3. The system of claim 1, wherein the firstcomputing platform is a stationary computing platform and the secondcomputing platform is a mobile computing platform.
 4. The system ofclaim 1, wherein the first token is configured to depict one or both ofthe first character or the first virtual item.
 5. The system of claim 1,further comprising a virtual item repository module configured toprovide a virtual item repository within the virtual space, the virtualitem repository being configured to facilitate access by a plurality ofcharacters to a plurality of virtual items, the plurality of charactersincluding the first character and the plurality of virtual itemsincluding the first virtual item.
 6. The system of claim 5, wherein thefirst virtual item is accessible via the virtual item repository in boththe first instance via the first computing platform and the secondinstance via the second computing platform.
 7. The system of claim 5,wherein the plurality of characters includes a second character and thefirst virtual item is accessible to the second character via the virtualitem repository.
 8. The system of claim 5, wherein the virtual itemrepository is visually represented at a location within one or moreinstances of the virtual space.
 9. The system of claim 1, wherein thecontent unlocking module is further configured to unlock contentresponsive to a performance of one or more game mechanisms associatedwith the virtual space in conjunction with token detection. 10.(canceled)
 11. A computer-implemented method to link token detection ata single computing platform with a user identification to unlock contentin virtual space instances presented via multiple computing platforms,the method being performed by one or more processors configured toexecute computer program modules, the method comprising: managing useridentifications associated with users of the system, the useridentifications including a first user identification associated with afirst user; implementing instances of a virtual space to determine viewsof the virtual space, the instances of the virtual space including afirst instance and a second instance, both the first instance and thesecond instance being associated with the first user identification, thefirst instance being accessible by the first user via a first computingplatform responsive to the first user identification being provided bythe first user via the first computing platform, the second instancebeing accessible by the first user via a second computing platformresponsive to the first user identification being provided by the firstuser via the second computing platform; detecting tokens based onsignals received from a token reader, the token reader beingcommunicatively coupled with the first computing platform, a given tokenbeing a standalone physical object, the tokens including a first tokenand a second token, the first token being detectable based on a firstsignal conveying information associated with the first token, the secondtoken being detectable based on a second signal conveying informationassociated with the second token; associating individual tokens withindividual user identifications, the first token and the second tokenbeing associated with the first user identification responsive to thefirst token and the second token being detected via the first signal andthe second signal received from the token reader communicatively coupledwith the first computing platform; and unlocking content in multipleinstances of the virtual space presented via multiple computingplatforms associated with a single user responsive to individual tokensbeing detected, previously locked content becoming accessible in thevirtual space responsive to being unlocked, the content including firstcontent configured to be unlocked responsive to the association betweenthe first token and the first user identification, the content furtherincluding second content configured to be unlocked responsive to theassociation between the second token and the first user identification,the unlocked first content and the unlocked second content beingaccessible in instances of the virtual space associated with the firstuser identification including both the first instance via the firstcomputing platform and the second instance via the second computingplatform, the first content including one or both of (1) a firstcharacter or (2) a first virtual item, the second content including oneor both of (1) a second character or (2) a second virtual item; whereinthe first content remains unlocked after the first token is detected viathe first signal received from the token reader communicatively coupledwith the first computing platform such that future detection of thefirst token is unnecessary to access the first content in both the firstinstance via the first computing platform and the second instance viathe second computing platform; and wherein the second content remainsunlocked after the second token is detected via the second signalreceived from the token reader communicatively coupled with the firstcomputing platform such that future detection of the second token isunnecessary to access the second content in both the first instance viathe first computing platform and the second instance via the secondcomputing platform.
 12. The method of claim 11, wherein the instances ofthe virtual space further include a third instance associated with thefirst user identification, the third instance being configured forpresentation via a third computing platform, and wherein the unlockedfirst content is accessible in the third instance via the thirdcomputing platform.
 13. The method of claim 11, wherein the firstcomputing platform is a stationary computing platform and the secondcomputing platform is a mobile computing platform.
 14. The method ofclaim 11, wherein the first token is configured to depict one or both ofthe first character or the first virtual item.
 15. The method of claim11, further comprising providing a virtual item repository within thevirtual space, the virtual item repository being configured tofacilitate access by a plurality of characters to a plurality of virtualitems, the plurality of characters including the first character and theplurality of virtual items including the first virtual item.
 16. Themethod of claim 15, wherein the first virtual item is accessible via thevirtual item repository in both the first instance via the firstcomputing platform and the second instance via the second computingplatform.
 17. The method of claim 15, wherein the plurality ofcharacters includes a second character and the first virtual item isaccessible to the second character via the virtual item repository. 18.The method of claim 15, wherein the virtual item repository is visuallyrepresented at a location within one or more instances of the virtualspace.
 19. The method of claim 11, further comprising unlocking contentresponsive to a performance of one or more game mechanisms associatedwith the virtual space in conjunction with token detection. 20.(canceled)