Providing notification of spam avatars

ABSTRACT

Provided are approaches for monitoring activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A storing mechanism stores a “black list” and a black list score consisting of a list of spam avatar identifications (UUIDs) matching avatars that have been flagged as confirmed or suspected spam advertisers. Another mechanism allows the owner to redraw or otherwise re-render a distinguishing mark when an avatar has been detected as being a spam advertiser. Yet another mechanism signals to the owner of an offending avatar that they have been added to the black list or had a report filed against them. Another mechanism allows for a black listed avatar to be removed from the black list, and scores to be decreased and for the virtual universe and users to utilize the black list and score.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims the benefit of,co-pending and co-owned U.S. patent application Ser. No. 12/473,817,filed May 28, 2009, having attorney docket number END920080055US1, theentire contents of which are herein incorporated by reference.

BACKGROUND OF THE INVENTION

As the population of virtual universes (VUs) increases, and as thedensity and intensity of personal activities and commercial transactionsincrease, greater emphasis will be placed on advertising. Just as in thereal world, innovative and intrusive advertising activities will belaunched and widely distributed. Unlike the real world, advertising inVUs is much less constrained by the limiting laws of physics andeconomics. Surprising new advertising campaigns and mechanisms may bedeployed. One advertising mechanism marries unsolicited personalmessaging (“spam”) with the concept of automated computer controlledadvertising avatars that roam around the VU looking to communicate withpotential human avatars.

In some systems, advertisement avatars are automated. However, automatedavatars can create problems within a VU if abused, much the same as spamemail can cause problems in an email communication system, a.k.a.,“avatar-based VU spam”.

Avatar-based VU spam has the potential to literally impede or block auser's motion in a VU. Avatar-based VU spam has the potential to impedelifelike transactions (e.g., business, romance). Avatar-based VU spamhas the potential to devalue a user's virtual property. Avatar-based VUspam has the potential to make the VU run so slowly as to make itunusable (due to the CPU's need to run the spam avatars). Avatar-basedVU spam has the potential to block the avatar's line of sight.

It could be, however, that the spam avatar has been misidentified andthat the owner of the avatar may not even know that its avatar has beenso identified. There may be a need to notify the owner that the avatarhas been identified as a spam avatar, maybe based on a distinguishingmark on the avatar, and allow the avatar owner to make changes to theavatar so that the avatar is no longer identified as a spam avatar.

Therefore, there exists a need for a solution that solves at least oneof the deficiencies of the related art.

SUMMARY OF THE INVENTION

In general, aspects of the present invention provide systems and methodsfor identifying spam avatars used for spam unsolicited advertisingpurposes. A storing mechanism may store a “black list” and a black listscore consisting of a list of spam avatar identifications (UUIDs)matching avatars that have been flagged as confirmed or suspected spamadvertisers. Another mechanism allows the owner to redraw or otherwisere-render a distinguishing mark or other audible signature when anavatar has been detected as being a spam advertiser. Yet anothermechanism signals to the owner an offending avatar that they have beenadded to the black list or had a report filed against them, and a reasonas to why (the methods used to identify them). Another mechanism allowsfor a black listed avatar to be removed from the black list, and scoresto be decreased and for the virtual universe and users to utilize theblack list and score.

In one embodiment, the present invention comprises a method in a virtualuniverse system comprising: identifying, using at least one computingdevice, a spam avatar rendered and operating in a region of a virtualuniverse, the spam avatar rendered with a distinguishable mark thatmodifies only a portion of the appearance of the spam avatar todifferentiate the spam avatar from non-spam avatars; and allowing, usingthe at least one computing device, an owner of the spam avatar to removethe spam avatar from a black list of spam avatars by re-rendering thespam avatar with the distinguishable mark eliminated.

In yet another embodiment, the present invention comprises acomputer-readable storage device storing computer instructions, whichwhen executed, enables a computer system to identify and manage spamavatars, the computer instructions comprising: identifying a spam avatarrendered and operating in a region of a virtual universe, the spamavatar rendered with a distinguishable mark that modifies only a portionof the appearance of the spam avatar to differentiate the spam avatarfrom non-spam avatars; allowing the owner to remove the spam avatar froma black list of spam avatars by re-rendering the spam avatar with thedistinguishable mark eliminated.

In yet another embodiment, the present invention comprises A system in avirtual universe environment having avatars and spam avatars, theavatars and spam avatars having owners and identifications, the systemcomprising: a spam avatar identifier for identifying, based on adistinguishable mark, a spam avatar rendered and operating in a regionof a virtual universe, the spam avatar rendered with the distinguishablemark that modifies only a portion of the appearance of the spam avatarto differentiate the spam avatar from non-spam avatars; and amodification component for allowing an owner of the spam avatar toremove the spam avatar from a black list of spam avatars by re-renderingthe spam avatar with the distinguishable mark eliminated.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features of this invention will be more readilyunderstood from the following detailed description of the variousaspects of the invention taken in conjunction with the accompanyingdrawings in which:

FIG. 1 shows a data processing system suitable for implementing anembodiment of the present invention;

FIG. 2 shows a network, which would work with an embodiment of thepresent invention;

FIG. 3 illustrates a virtual universe showing aspects of the presentinvention;

FIG. 4 shows a virtual universe having one embodiment of the system ofthe present invention;

FIG. 5 illustrates one method of the present invention;

FIG. 6 illustrates another method of the present invention; and

FIG. 7 illustrates another method of the present invention.

The drawings are not necessarily to scale. The drawings are merelyschematic representations, not intended to portray specific parametersof the invention. The drawings are intended to depict only typicalembodiments of the invention, and therefore should not be considered aslimiting the scope of the invention.

DETAILED DESCRIPTION OF THE DRAWINGS

Aspects of the present invention provide a solution for identifying spamavatars used for spam unsolicited advertising purposes bydistinguishable marks, for notifying owners of such identified spamavatars, and for allowing the owners to modify the distinguishable marksof the identified spam avatars.

A computer avatar is a personalized graphic file or rendering thatrepresents a computer user. There are basically two types of avatars:those used at websites, such as on Web exchange boards, and those usedin gaming and virtual worlds. While Web users have static graphics filesas avatars, in virtual worlds, the avatar is a fully renderedinteractive character. A virtual world is an animated three-dimensionalworld created with computer graphics imagining (CGI) and other renderingsoftware. One of the hallmarks of a virtual world is that a user caninteract within the environment by virtue of an avatar, or acomputerized character that represents the user. The avatar manipulatesand interacts with objects in the virtual world by mouse movements andkeystrokes issued by the user. In simple terms, the avatar is a remotecontrolled character or proxy. Avatars in a virtual world or virtualuniverse (VU) have a wide range of business and social experiences, andsuch experiences are becoming more important as business and socialtransactions are becoming common in VUs such as Second Life®. SecondLife is a registered trademark of Linden Labs. In fact, thecharacteristics of an avatar play important social, business, and otherrelated roles in VU, such as Second Life. Second Life is a privatelyowned three-dimensional (3-D) virtual world, made publicly available in2003 by Linden Lab, and is created entirely by its membership. Membersassume an identity and take up residence in Second Life, creating acustomized avatar or personage to represent themselves. The avatar movesabout in the virtual world using mouse control and intuitive keyboardbuttons. The Second Life client program provides users (referred to asresidents) with tools to view, navigate, and modify the virtual worldand participate in its virtual economy. Social and business interactionsare important in Second Life, and these interactions include residentinteractions in both personal and business meetings.

A data processing system 100, such as system 102 shown in FIG. 1,suitable for storing and/or executing program code of the presentinvention will include a computer system 104 having at least oneprocessor (processing unit 106) coupled directly or indirectly to memoryelements through a system bus 112. The memory elements can include localmemory (RAM 130) employed during actual execution of the program code,bulk storage (storage 118), and cache memories (cache 132) which providetemporary storage of at least some program code in order to reduce thenumber of times code must be retrieved from bulk storage 118 duringexecution. Input/output or I/O devices (external devices 116) (includingbut not limited to keyboards, displays (Display 120), pointing devices,etc.) can be coupled to the system either directly or throughintervening I/O controllers (I/O Interface(s) 114).

Network adapters (network adapter 138) may also be coupled to the system200 to enable the data processing system (as shown in FIG. 2, dataprocessing unit 202) to become coupled through network connections(network connection 206, 208) to other data processing systems (dataprocessing unit 202, 204), remote printers (printer 212) and/or storagedevices (storage 214) through intervening private and/or public networks(network 210). (A computer network is composed of multiple computersconnected together using a telecommunication system for the purpose ofsharing data, resources and communication. For more information, seehttp://historyoftheinternet.org/). Modems, cable modem, and Ethernetcards are just a few of the currently available types of networkadapters.

The present invention comprises systems and methods of detecting,analyzing, and managing unsolicited advertisements to VU users throughunsolicited communication made by human and computer controlledadvertising avatars. Both the residents and owners of VUs would benefitfrom methods to reduce VU spam such as described herein.

Residents (such as in Second Life) are represented in the environment byan avatar. The basic avatar is humanoid in shape which may be customizedin a variety of ways:

A series of GUI controls, modifying every aspect of the basic mesh (bodyshape, skin, hair style etc.).

Creating clothing or buying clothes made by other Residents.

Attachments—3D objects intended to supplement or replace body structure,clothes or hair.

Animation Overriders (intended to supplement or replace the stock set ofanimations) using, for instance, a scripting language such as LindenScripting Language (LSL) to trigger animations stored in an animationfile format such as Biovision Hiearchy (BVH).

Sonic Overriders—using a scripting language such as LSL to triggersounds such as footsteps, or emotive cues such as laughing and crying.

The result can either be faithful to the original humanoid avatar, orcan result in a completely non-humanoid representation of the character.These customizations can be packaged up into a single outfit, withcommon applications of outfits.

As noted above, the VU environment provides an opportunity forcommercial vendors to market their wares and conduct other commerce withothers who are resident in the VU via avatars. Many times, thecommercial vendor will customize its avatar so that the avatar hasreadily distinguishable visual characteristics, audio characteristics orotherwise distinguishable by other of the avatar's assets. The purpose,of course, is to attract the attention of other avatars (potentialcustomers) or to send unsolicited information about a product or serviceand so on (“advertisement”) so that the commercial vendor's avatar(“spam avatar”) may receive business as a result of the advertisementfrom one or more recipients of the advertisement (“receiving avatars”).Like all other types of unsolicited marketing via any communicationmeans (e.g., telephone, fax, email, text messaging, etc.), all hereinreferred to as spam, it may be unwanted by one or more of the receivingavatars.

For the purpose of this invention, the term “spam or spam avatar” refersto the avatar advertising a service or product. Furthermore, the term“receiving avatar” refers to the avatar who receives unsolicitedinformation about a product or service.

A simple avatar system 300 for implementing the present invention isshown in FIG. 3 having a VU 301 having a VU Processing Unit 305, a VUmemory 306 for storing information about the VU 301 and activities andavatars within the VU 301, one or more spam avatars 302 (302 a, 302 b)and one or more receiving avatars 304 (304 a, 304 b). There can be anynumber of spam avatars 302 (302 a, 302 b) and receiving avatars 304 (304a, 304 b). The spam avatars 302 and the receiving avatars 304 cancommunicate with one another via a communication channel 310, amongstthemselves and with VU memory 306 or other assets (such as avatarattachments, vehicles, buildings, furniture, sculpture, or other items)in the VU 301 via communications channel 310. Both the spam avatars 302and the receiving avatars 304 are considered to be VU residents.

As noted above, there is a need for the receiving avatars to have theability to identify the spam avatars so that the receiving avatars mayblock the unsolicited communications from the spam avatars should thereceiving avatars so desire. There is a further need to notify owners ofavatars that their avatars have been black listed as spam avatars andallowing the owners to modify their avatars so that their avatars may beremoved from the black list. The present invention provides numeroussystems and methods for black listing spam avatars based upon avataridentifiers, notifying the black listed avatars and allowing the ownersto modifying the black listed avatars to remove them from the blacklist.

As shown in FIG. 3, the VU Memory Unit has an Identification StorageComponent 322 for storing the identifications or UUIDs of spam avatarsor suspected spam avatars and a Black List Storage Component 324 forstoring information about spam avatars or suspected avatars. Black ListStorage Component 324 further has a Black List Scores Component 326 forstoring black list information of spam avatars or suspected spamavatars. Each spam avatar may have a distinguishing mark, such asDistinguishing Marks 342. The Distinguishing Marks 342 may be an audibledistinguishing mark, a visual distinguishing mark, a movementdistinguishing mark or others. The system further has a ModificationComponent 324 for allowing an owner of a spam avatar or suspected spamavatar to modify the avatar.

Receiving avatars may choose which solicitations to accept or reject.For instance, a receiving avatar may choose to accept all solicitationsfrom all spam avatars, to accept solicitations from particular spamavatars and to reject all solicitations from all other spam avatars, orto reject all solicitations from all spam avatars.

As shown in FIG. 4, system 400 may have a virtual universe (VU) 401having a VU server 407. VU 401 may have spam avatars 402 a, 402 b havingspam avatar owners 426 a, 426 b who can change or control their avatars.The spam avatars 402 a, 402 b may have distinguishing marks whichidentify them as spam avatars or potential spam avatars. Thedistinguishing marks may be audible, visual, or even movement. VU 401may have a communication channel 410 so that avatars may communicatewith VU server 407. VU server 407 may have a VU processing unit 405 anda VU memory unit 406. VU server 407 may have a spam avatar modificationcomponent 408 for allowing an avatar owner to modify the owner's avatar.It may further have a spam avatar identification component 409 foridentifying spam avatars 402 a, 402 b. VU server 407 may further have anotification component 430 for notifying owners 426 a, 426 b that theiravatars have been identified as spam avatars or potential spam avatars.Notification component 430 may also have a methods used component 332which may provide, along with the notification to the owner of theavatar, the methods used to identify the spam avatar.

VU memory 406 may have an identification storage component 418 forstoring the identification (UUIDs) of spam or suspected spam avatars. Itmay further have a black list storage component 420 for storinginformation about black listed avatars. A black list is a list orregister of avatars which, for one reason or another, are being denied aparticular privilege, service, mobility, access or recognition. VUmemory 406 may further have a black list removal component 422 forallowing owners 426 a, 426 b to remove the owner's avatar from the blacklist. VU memory 406 may further have a black list score reductioncomponent 424 for allowing an owner 426 a, 426 b to reduce the owner'savatar blacklist score. A blacklist score of an avatar indicates themagnitude of the probability that the avatar is a spam avatar. VU memory406 may further have a black list score examination component 428 forallowing owners of avatars to examine the black list scores of theiravatars and have the black list scores reduced by the black list scorereduction component 424.

As shown in FIG. 5, a method 500 of the present invention begins at 502and continues to 504 where the avatar is identified as a spam avatar byits distinguishable mark—whether it be audible, visual movement orothers. At 505, the identification (UUID) of the spam avatar orsuspected spam avatar is stored. At 506, the owner of the spam avatar orsuspected spam avatar is notified that the spam avatar or suspected spamavatar has been identified by means of a distinguishable mark. At 507,the owner is allowed to change the distinguishable mark and ends at 508.

As shown in FIG. 6, method 600 begins at 602 where it is determinedwhether an avatar has a distinguishable mark at 604. If not, the methodends at 608. If so, it is determined whether it is an audible mark at605. If so, the owner is notified and allowed to modify or remove theaudible mark at 606. If not, the method ends at 608. If it is not anaudible mark, at 610, it determined whether it is a visualdistinguishable mark. If so, the owner is notified and allowed to modifyor remove the visual mark at 612 and method ends at 608. If not, at 618,it is determined whether the distinguishable mark is a movement markand, if not, the method ends at 608. If so, the owner of the avatar isnotified and is allowed to modify or remove the distinguishable mark.

As shown in FIG. 7, method 700 begins at 702, and at 704 the owner of anavatar is notified or signaled that its avatar has been added to a blacklist or a report has been filed against it. At 706, the owner of theidentified spam avatar is notified of the methods used to identify thespam avatar. At 707, the owner of the identified spam avatar is allowedto examine the black list. At 709, the owner of the identified spamavatar is allowed to decrease the black list score by modifying thedistinguishable mark. At 710, the owner of the identified spam avatar isallowed to remove the avatar from the black list by changing thedistinguishable mark.

It should be understood that the present invention is typicallycomputer-implemented via hardware and/or software. As such, clientsystems and/or servers will include computerized components as known inthe art. Such components typically include (among others), a processingunit, a memory, a bus, input/output (I/O) interfaces, external devices,etc. It should also be understood that although a specific embodimentinvolving 2D and 3D virtual renditions of physical resources which areautomatically created to replicate real-life environments, such ascomputer data centers and other trackable assets, has been depicted anddescribed, the present invention could be implemented in conjunctionwith any type of real-life environments having trackable assets.

While shown and described herein as a system and method for notifyingowners of spam identified avatars in a virtual universe and allowing theowners to make modifications, it is understood that the inventionfurther provides various alternative embodiments. Thecomputer-readable/useable medium includes a program code that implementseach of the various process steps of the invention. It is understoodthat the terms computer-readable medium or computer useable mediumcomprise one or more of any type of physical embodiment of the programcode. In particular, the computer-readable/useable medium can compriseprogram code embodied on one or more portable storage articles ofmanufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), onone or more data storage portions of a computing device, such as memoryand/or storage system (e.g., a fixed disk, a read-only memory, a randomaccess memory, a cache memory, etc.), and/or as a data signal (e.g., apropagated signal) traveling over a network (e.g., during awired/wireless electronic distribution of the program code).

In another embodiment, the invention provides a computer-implementedmethod for notifying owners of spam identified avatars in a virtualuniverse and allowing the owners to make modifications. In this case, acomputerized infrastructure can be provided and one or more systems forperforming the process steps of the invention can be obtained (e.g.,created, purchased, used, modified, etc.) and deployed to thecomputerized infrastructure. To this extent, the deployment of a systemcan comprise one or more of: (1) installing program code on a computingdevice, such as computer system from a computer-readable medium; (2)adding one or more computing devices to the computer infrastructure; and(3) incorporating and/or modifying one or more existing systems of thecomputer infrastructure to enable the computerized infrastructure toperform the process steps of the invention.

As used herein, it is understood that the terms “program code” and“computer program code” are synonymous and mean any expression, in anylanguage, code or notation, of a set of instructions intended to cause acomputing device having an information processing capability to performa particular function either directly or after either or both of thefollowing: (a) conversion to another language, code or notation; and/or(b) reproduction in a different material form. To this extent, programcode can be embodied as one or more of: an application/software program,component software/a library of functions, an operating system, a basicI/O system/driver for a particular computing and/or I/O device, and thelike.

A data processing system suitable for storing and/or executing programcode can be provided hereunder and can include at least one processorcommunicatively coupled, directly or indirectly, to memory element(s)through a system bus. The memory elements can include, but are notlimited to, local memory employed during actual execution of the programcode, bulk storage, and cache memories that provide temporary storage ofat least some program code in order to reduce the number of times codemust be retrieved from bulk storage during execution. Input/output ordevice devices (including, but not limited to, keyboards, displays,pointing devices, etc.) can be coupled to the system either directly orthrough intervening device controllers.

Network adapters also may be coupled to the system to enable the dataprocessing system to become coupled to other data processing systems,remote printers, storage devices, and/or the like, through anycombination of intervening private or public networks. Illustrativenetwork adapters include, but are not limited to, modems, cable modems,and Ethernet cards.

The foregoing description of various aspects of the invention has beenpresented for purposes of illustration and description. It is notintended to be exhaustive or to limit the invention to the precise formdisclosed, and, obviously, many modifications and variations arepossible. Such modifications and variations that may be apparent to aperson skilled in the art are intended to be included within the scopeof the invention as defined by the accompanying claims.

What is claimed is:
 1. A method in a virtual universe system comprising:identifying, using at least one computing device, a spam avatar renderedand operating in a region of a virtual universe, the spam avatarrendered with a distinguishable mark that modifies only a portion of theappearance of the spam avatar to differentiate the spam avatar fromnon-spam avatars; and allowing, using the at least one computing device,an owner of the spam avatar to remove the spam avatar from a black listof spam avatars by re-rendering the spam avatar with the distinguishablemark eliminated.
 2. The method as defined in claim 1 further comprisingnotifying, using the at least one computing device, the owner of thespam avatar that the spam avatar has been identified as a spam avatarbased on the distinguishable mark of the avatar rendered and operatingwithin the virtual universe.
 3. The method as defined in claim 2 whereinthe system has a black list storage unit for storing a black list andblack list scores, and the identified spam avatar has black list scoresassociated with the identified spam avatar, the method furthercomprising storing, using the at least one computing device, theidentification of the identified spam avatar on the black list andstoring the black list scores associated with the identified spam avatarin the black list storage unit.
 4. The method as defined in claim 3further comprising signaling, using the at least one computing device,to the owner of a spam avatar that they have been added to the blacklist or had a report filed against them.
 5. The method as defined inclaim 4 further comprising notifying, using the at least one computingdevice, the owner of the identified spam avatar of the methods used toidentify the identified spam avatar.
 6. The method as defined in claim 5further comprising allowing, using the at least one computing device,the owner of the identified spam avatar to remove the identified spamavatar from the black list and further allowing the owner of theidentified spam avatar to decrease the black list scores of theidentified spam avatar.
 7. The method as defined in claim 6 furthercomprising allowing, using the at least one computing device, owners ofother avatars to examine the black list and score of the identified spamavatar.
 8. A computer-readable storage device storing computerinstructions, which when executed, enables a computer system to identifyand manage spam avatars, the computer instructions comprising:identifying a spam avatar rendered and operating in a region of avirtual universe, the spam avatar rendered with a distinguishable markthat modifies only a portion of the appearance of the spam avatar todifferentiate the spam avatar from non-spam avatars; and allowing theowner to remove the spam avatar from a black list of spam avatars byre-rendering the spam avatar with the distinguishable mark eliminated.9. The computer-readable storage device of claim 8, the computerinstructions further comprising notifying the owner of the spam avatarthat the spam avatar has been identified as a spam avatar based on thedistinguishable mark of the avatar rendered and operating within thevirtual universe.
 10. The computer-readable storage device as defined inclaim 8 further comprising computer instructions for allowing the ownerof the identified spam avatar to modify the distinguishing mark when anavatar has been detected as being a spam advertiser.
 11. Thecomputer-readable storage device as defined in claim 8, wherein thedistinguishable mark comprises an audible signature, and wherein thecomputer instructions further comprise allowing the owner of theidentified spam avatar to re-render the audible signature.
 12. Thecomputer-readable storage device as defined in claim 8, the systemhaving a black list storage component and the identified spam avatarhaving black list scores, the computer instructions further comprisingstoring the identification of the identified spam avatar on the blacklist and storing the identified spam avatar black list scores.
 13. Asystem in a virtual universe environment having avatars and spamavatars, the avatars and spam avatars having owners and identifications,the system comprising: a spam avatar identifier for identifying, basedon a distinguishable mark, a spam avatar rendered and operating in aregion of a virtual universe, the spam avatar rendered with thedistinguishable mark that modifies only a portion of the appearance ofthe spam avatar to differentiate the spam avatar from non-spam avatars;and a modification component for allowing an owner of the spam avatar toremove the spam avatar from a black list of spam avatars by re-renderingthe spam avatar with the distinguishable mark eliminated.
 14. The systemas defined in claim 13 further comprising a notification component fornotifying the owner of the spam avatar that the spam avatar has beenidentified as a spam avatar based on the distinguishable mark of theavatar rendered and operating within the virtual universe; and
 15. Thesystem as defined in claim 13, wherein the distinguishable markcomprises an audible signature, and wherein the spam avatar identifieridentifies by audible signatures.
 16. The system as defined in claim 13,the system further comprising: a black list storage unit for storing ablack list and black list scores, wherein the identified spam avatar hasblack list scores associated with the identified spam avatar; and anidentification component for storing the identification of theidentified spam avatar on the black list and for storing the black listscores associated with the identified spam avatar in the black liststorage unit.
 17. The system as defined in claim 16 further comprising acomponent for: notifying the owner of a spam avatar that the spam avatarhas been added to the black list; and notifying the owner in the casethat the owner has had a report filed against them.
 18. The system asdefined in claim 17, the component further notifying the owner of theidentified spam avatar the methods used to identify the identified spamavatar.
 19. The system as defined in claim 18 further comprising acomponent for: allowing the owner of the identified spam avatar toremove the identified spam avatar from the black list; and allowing theowner of the identified spam avatar to decrease the black list scores ofthe identified spam avatar.
 20. The system as defined in claim 16further comprising a component for allowing owners of other avatars toexamine the black list and the black list score of the identified spamavatar.