Interactive action figures for gaming schemes

ABSTRACT

An action figure is provided with a serial number that provides an access code which allows owners to engage in enjoyable games or other activities via the Internet or other gaming systems. The interactive action figure system comprises a toy, statue, or other three-dimensional figurine with a serial number, and preferably a computer network accessible over the internet and a particular gaming framework managed by a network device. Owners of action figure toys may “log onto” the network using the action figure serial number as an access code to activate a particular computer character identity and participate in games such as hand-to-hand combat games, action-adventure series, or learning games. The action figure may be, for example, a warrior, sports figure, doll or teddy bear to appeal to a wide range of users. Once a particular character is activated, game play proceeds according to preset rules. The game character&#39;s traits, powers, and other features may be enhanced or otherwise modified by purchasing preferably-three-dimensional accessories and inputting serial numbers into the gaming system that are also supplied with the accessories.

This application claims priority of provisional application, Ser. No. 60/484,834, filed Jul. 2, 2003, which is incorporated herein by this reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates generally to gaming platforms available on the Internet, computer CDs, or other gaming systems. More specifically, this invention relates to an action figure and/or three-dimensional accessories that include access codes enabling users to engage in various games and activities wherein the particular action figure and accessories are reflected in an electronic identity corresponding to the access codes.

2. Related Art

The advancement of the Internet has brought about many opportunities for users to engage in games and other activities including those in which individual users compete against one another. These games and activities allow users to interact in various capacities. For example, some gaming platforms allow users to play simple card games against one another, while others allow Internet users to compete against their peers in action and/or adventure simulations such as those in which various characters duel in hand-to-hand combat.

In U.S. Pat. No. 5,964,660 (James et al.) an Internet gaming system is disclosed that allows a large number of computer users running a Web browser to play a game via the network. Users input moves and become apprised of the state of the game, using the basic input/output functions of their browser.

U.S. Pat. No. 6,276,672 B1 (Vance) teaches a remotely accessible game, such as an Internet game, to encourage consumers to purchase specific products. When a product like a bottle of water is purchased, an access code is provided inside the label or beneath the cap. Using the access code as a login password, consumers may take part in a particular game.

US Patent Application No. US2002/0183119A1 (Fessler) describes an external game enhancer that may be used with an electronic gaming system. The game enhancer may be a small plug-in external item, containing storage memory, which can be quickly and directly connected to the electronic gaming platform so that the memory is accessible by the gaming machine when the game is played. The game enhancer may be built into a toy or consumer product like a key chain.

U.S. Pat. No. 6,616,532 B2 (Albrecht) also describes a game enhancement system that provides a consumer product with a memory device that may be transferred to the game memory for enhancing the functionality of the electronic game. Alternatively, a pass word for enhancing the functionality of the electronic game may be provided to a consumer upon purchase of a product.

SUMMARY OF THE INVENTION

The invention comprises a gaming platform and/or an action figure adapted to interact with the gaming platform. The characteristics of a computer game character are related to a customizable action figure that may, in itself, be a source of entertainment or a display item for users even when said users are not connected to the gaming platform. The customizable action figure may provide access for game users to participate remotely in games and/or other activities via the Internet or other computer or game programs. Alternatively or additionally, the customizable action figure may allow game users to enhance the character/team, for example, by changing their characteristics, such as attributes, powers, weapons, equipment, experience points, levels, feats, strengths, weaknesses, etc. This access and/or enhancement may be provided by inputting, into the gaming platform, one or more serial numbers that are associated with the action figure and/or accessories for the action figure. Preferably, the gaming platform is adapted to save the character with its enhanced attributes, so that the user may later return to the game with the character in the same condition as when the user left the game. The action figure may provide not only access or enhancement to an enjoyable activity via its interaction with the Internet or other gaming platform, but also a source of entertainment in its physical, toy form.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic view of one embodiment of an invented interactive gaming platform accessible via the Internet.

FIG. 2 is a perspective view of one embodiment of the invented interactive action figure in an Internal gaming platform, displayed on a computer screen.

FIG. 3 is a perspective view of one embodiment of an action figure holding two accessories, and having a serial number on the leg surface (which is shown enlarged to the side of the leg).

FIGS. 4A, 4B, 4C, 4D, and 4E illustrates embodiments of some possible accessories that may be purchased for the action figure of FIG. 3, and that may have their serial numbers input into the gaming platform of FIG. 1 to modify/enhance the game character of FIG. 2.

DETAILED DESCRIPTION OF THE INVENTION

In preferred embodiments of the invention, each action figure corresponds to a different computer identity, or character, in a variety of different gaming platforms managed by remote servers, and/or in other computer or game programs. When the action figure and/or programming is designed or and manufactured, information based on the physical attributes of the action figure is programmed into the server/program to create the particular character identity in the gaming platform. A serial number is provided on or with the action figure, either on a surface of the action figure or in the packaging for the action figure. For example, the serial number may be provided by etching, molding, or adhesive or tied-on label. Alternatively, the serial number may be provided by including it on or inside the packaging for the action figures, for example, on a tag, sheet, or ID tag inside the box. Preferably, the serial number is not visible from the outside of the packaging, so that a consumer may not see or record the serial number until he/she purchases the action and opens the packaging. The serial number may be a number and/or letters, and may or may not convey, when simply read or viewed by the consumer, information about the character, accessory, or characteristic. For example, a serial number may be styled such as: 1035589, SM1035589, SUPERMANSTRENGTH1035589, 4011856, H4011856, HEALTH4011856, etc. Any number of action figures may be supplied with a single serial number. For example, different superhero action figures preferably will have different serial numbers, for example, one serial number for all Spiderman™ action figures, and a different serial number for all Green Goblin™ action figures. Or, a certain portion of a single superhero may have one serial number and another portion of that same superhero may have a different serial number. Or, every action figure may have a different serial number. Other system of serial numbers may be designed.

When the action figure is purchased, the owner of the action figure uses the serial number provided with the action figure as an access code to 1) access a game/activity; and/or 2) access a character in the game/activity, depending on the embodiment of the gaming platform. The programming and instructions may instruct the owner to input all of the serial number, or a portion of the serial number (such as the numbers only). Once the game and/or the character is activated, the character may, for example, compete against similar characters, embark on an adventure alone, or join a team of other characters in a competition or adventure.

Further, owners of such action figures may modify/enhance their game platform characters by purchasing accessories, each of which preferably is also are provided with a serial number. Upon registering the serial numbers of the various accessories with a particular electronic character, by inputting the accessory serial number into the gaming platform, these accessories become part of the identity of the game character for future use. These accessory items, for example, may be items or attributes, to make a character stronger, more dangerous, live longer, brandish different weapons, etc.

The action figures are preferably three-dimensional figures, in the form of miniature humans, superheros, animals, gods, mythical persons or beasts, robots, for example. Preferably, each of the action figures has visible features, such as body parts; hair, fur, feathers; clothing or armor; facial expressions; logos; or other features that make the action figure identifiable. These features may be molded, painted, attached or otherwise connected or provided on the action figure. The action figures may or may not have joints, bending limbs or parts, or other moveable parts. Some or all of these features are the information that is programmed into the character in the gaming system, at least to an extent that the viewer/player of the game, once the game character is accessed (preferably by the serial number on the three-dimensional action figure), recognizes that the character is the same person/animal/entity as the action figure. So, the action figure may be said to “visually correspond” to the electronic/computer game character, or to “be in the likeness of” the electronic/computer game character, and vice versa. Thus, the three-dimensional, physically tangible action figure has a substantial resemblance to the two-dimensional, digital character in the computer/game.

The “accessories” described above are preferably also three-dimensional, physically tangible items, purchased at a store, through a catalog, over the internet, or otherwise acquired. The accessories preferably are items that are miniatures of items that the action may be dressed in, ride on or in, fight with, or otherwise use in a hand, paw, claw, etc. Such items would be armor, leather couplets, chain mail, helmets, swords, guns, knives, laser weapons, grenades, horses, motorcycles, tanks, helicopters, etc. Thus, these items have a substantial resemblance to the enhancement that is being unlocked by the item's serial number, and these items may be attached to, held by, or mounted by, the action figure. Alternatively, the accessories may be items that are symbols of less tangible traits, such as health, strength, courage, wisdom, intelligence, weakness, etc. Such accessories may be a medallion or badge shaped like a small clenched fist for “strength”; a heart-shaped medallion or badge for “health”; a book-shaped medallion or badge for “wisdom”, for example. Preferably, the accessory representing the less tangible trails are medallions or badges or other forms that can be attached to the action figure and that are sized appropriately for the size of the action figure. Other shapes or forms may be used, such as a plate, a banner, a tag, or simply an item to be placed beside the action figure. As with the action figure, the serial number may be applied directly onto the accessory item or in or on packaging for the accessory. As with the action figure, preferably the serial number is not visible to the consumer/owner until he or she opens the package.

Each time game play is suspended, information regarding the changing characteristics of the game “player” (the character) is stored on the server so that each time the game is accessed the most current “player” is retrieved. If there is only one game “player” active in a game, the user may stop play at any time and save his or her information. When more than one user is involved, play may be halted at any break in the action or at such point all users agree to stop. At some time in the course of game play, the character may become weaker or die. At this point, owners of the action figure may purchase additional strength or lives for their character or pay to have their character resurrected or cloned so that they can continue playing the game.

Referring now to the figures, an embodiment of an interactive action figure 10 for use with Internet gaming platforms 20 is illustrated. The interactive action figure comprises an action figure toy 10 which contains a serial number 25 corresponding to a specific computer identity or game character 30. The character 30 may be brought to life within a specific gaming network using the serial number 25 as a first access code. Providing the required access code 25 to the appropriate network server 40 or managing device activates the particular character 30 within the gaming framework. Once activated, the character 30 proceeds in the game according to the rules of the game. For example, the character 30 may compete in hand-to-hand combat against another similar character or embark upon an adventure alone.

Preferably, the invented interactive action figure 10 may take many physical forms to appeal to a wide range of users. For example, the action figure may be a warrior, a sports figure, a casino gambler, a doll, or a teddy bear. The specific gaming platform may then be designed around the particular figure and its intended audience. For example, a teddy bear may be intended for children and an appropriate computer identity may embark on an adventure that teaches valuable skills or lessons along the way. Alternatively, a warrior may appeal to a more adult audience. Consequently, its character may participate in a street fight or other intense or dangerous competition.

In a preferred embodiment, the gaming platform connects (50) a large number of individual users owning action figures and their corresponding computer identities, as shown in FIG. 1. Within the gaming platform, the characters may be formed into teams to compete in, for example, a soccer game, rugby competition, or a war (60). However, connecting users is not necessary so long as the individual user may access the appropriate computer identity using the action figure serial number and engage in an enjoyable activity via the Internet. Preferably, a centralized management device continually stores and updates character information as game play proceeds so that users may quit at any time and return to the game later and retrieve the most “current” computer identity for their action figure. For example, if a user completes a level in a game, this information would be stored and the user would not have to return to this level in the future. Preferably, where many users are active in a single game, users may quit at any time there is a break in play or when all users agree to suspend play.

One of many possible embodiments of an invented interactive action figure 10 on the Internet is depicted in FIG. 2. This action figure 10 is shown in FIG. 3 in his basic form, with two weapon accessories 70, 75 already added. Additional accessories are shown in FIGS. 4A-4E, including boots 80, chest armor 90, face mask 85, arm armor 95, and wisdom (book) accessory 100. One may note the close resemblance between the action figure 10 in FIG. 3 and the game character 30 of FIG. 2, wherein the character has been enhanced with weapon accessories 70′, 75′, and boot 80′, face mask 85′, and chest armor 90′ accessories).

As game play proceeds, users may update or modify their computer characters by purchasing accessories for their action figures, for example, according to the above description of accessories. Preferably, each accessory item has a serial number (125, 126, 127, 128, 129) or “secondary access code” with which it is associated, either by attaching or implanting the serial number to or in the accessory item, or by placing the serial number inside the packaging. After inputting the first access code (preferably the action figure's serial number) into the network managing system, one or more secondary access codes may be input to update the existing computer character identity. As described above, such accessory items may be intangible; for example, an individual may purchase accessory items that represent additional lives for their computer character or strength enhancers that bolster their chances of success. Alternatively, the accessory items may be physical items or equipment such as weapons or clothing as shown in FIG. 3. Inputting secondary codes for accessory items prompts the network managing system to associate these items with the computer identity corresponding to the first access code.

At some point in the course of game play, a specific character may expire within a particular gaming platform. For example, a character may die in the midst of a battle or come to the end of a particular journey after all preceding levels have been passed. If this occurs, an action figure owner may pay to have their character revived (for example, resurrected, cloned, or refreshed). This revival procedure may involve purchasing another action figure with an additional/updated serial number, or purchasing another serial number without buying another action figure via a revival product or service associated with the particular character, which may be distributed after payment is made to the manufacturer of the action figures or the manager of the gaming system.

While the preferred embodiments are described as being adapted for use in an Internet gaming platform, other gaming platforms may be used. For example, computer CD games, or gaming systems of the types represented by the popular PS2™ or X-box™ systems, might be adapted for use in embodiments of the invention. For example, such systems may be adapted to accept input of serial numbers to unlock games, characters, and/or characteristics of the characters, such as traits, weapons, weaknesses, etc. Therefore, while the current preferred embodiments include multiple users of Internet games, other embodiments and especially future embodiments may include non-Internet gaming systems for one or more users.

Although this invention has been described above with reference to particular means, materials, and embodiments, it is to be understood that the invention is not limited to these disclosed particulars, but extends instead to all equivalents within the scope of the following claims. 

1. A method for providing a computer activity to a user, said method comprising the steps of: registering a first product in response to a primary access code being entered on a computer, the primary access code being associated with the first product; responsive to registering the first product, creating an identity for a character for use in the computer activity; further responsive to registering the first product, providing content for displaying a visual representation of the character in the computer activity, the visual representation of the character corresponding to the first product; registering a second product on the computer in response to a secondary access code being entered on a computer, the secondary access code being associated with the second product; and responsive to registering the second product, providing an enhancement that is stored in association with the identity of the character for future use in the computer activity without requiring the secondary access code to be entered again.
 2. The method of claim 1, wherein the second product is an accessory to the first product.
 3. The method of claim 2, wherein the enhancement comprises an accessory item for use by the character in said computer activity.
 4. The method of claim 3, further comprising providing additional content for displaying a visual representation of the accessory item in the computer activity, the visual representation of the accessory item corresponding to the second product.
 5. A method for providing a computer activity to a user, said method comprising the steps of: registering a first product in response to a primary access code being entered on a computer, the primary access code being associated with the first product; responsive to registering the first product, associating an identity for a character with a user account for use in the computer activity; further responsive to registering the first product, providing content for displaying a visual representation of the character in the computer activity, the visual representation of the character corresponding to the first product; registering a second product on the computer in response to a secondary access code being entered on a computer, the secondary access code being associated with the second product; and responsive to registering the second product, providing an enhancement that is stored in association with the user account for future use in the computer activity without requiring the secondary access code to be entered again.
 6. The method of claim 5, wherein the second product is an accessory to the first product.
 7. The method of claim 6, wherein the enhancement comprises an accessory item for use by the character in said computer activity.
 8. The method of claim 7, further comprising providing additional content for displaying a visual representation of the accessory item in the computer activity, the visual representation of the accessory item corresponding to the second product.
 9. A method for providing a computer activity to a user, said method comprising the steps of: registering a first tangible product on a computer, said registering including accepting information manually input into the computer by the user; responsive to registering the first product, providing an item for display in said computer activity, said item visually corresponding to said first product; registering a second tangible product on said computer; and responsive to registering the second product, enhancing said item in said computer activity.
 10. The method of claim 9, wherein said second product is an accessory to said first product.
 11. The method of claim 10, wherein said enhancing includes displaying an accessory item for said item in said computer activity.
 12. The method of claim 11, wherein said accessory item for said item substantially resembles said accessory for said first product.
 13. The method of claim 11, wherein said enhancing also includes displaying said accessory item in conjunction with said item to accessorize said item in said computer activity.
 14. The method of claim 13, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing also includes modifying at least one of said traits in said computer activity.
 15. The method of claim 12, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity, and further wherein said accessory item is used by said animated character in said computer activity.
 16. The method of claim 10, wherein said first product is representative of a living being, and wherein said accessory is one of clothing for the product, an item for the product to hold, an item for the product to wear, or representative of a symbol of a desired characteristic of the product.
 17. The method of claim 16, wherein said enhancing also includes displaying an accessory item in conjunction with said item to accessorize said item in said computer activity.
 18. The method of claim 17, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing also includes modifying at least one of said traits in said computer activity.
 19. The method of claim 9, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing includes modifying at least one of said traits in said computer activity.
 20. The method of claim 15, wherein said accessory for said first product is symbolic in a manner that anticipates said modification of said at least one of said traits.
 21. The method of claim 20, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity.
 22. The method of claim 9, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity.
 23. The method of claim 9, wherein said information includes a first access code provided with said first product.
 24. The method of claim 23, wherein said registering the second product includes the step of accepting a second access code manually input into the computer by the user.
 25. The method of claim 23, wherein the first access code is a human readable code that was initially hidden from the user.
 26. A method for providing a computer activity to a user, said method comprising the steps of: registering a first tangible product on a computer, said registering including accepting a first human readable code input into the computer by the user; responsive to registering the first product, providing an item for display in said computer activity, said item visually corresponding to said first product; registering a second product on said computer; and responsive to registering the second product, enhancing said item in said computer activity.
 27. The method of claim 26, wherein said second product is an accessory to said first product.
 28. The method of claim 27, wherein said enhancing includes displaying an accessory item for said item in said computer activity.
 29. The method of claim 28, wherein said accessory item for said item substantially resembles said accessory for said first product.
 30. The method of claim 28, wherein said enhancing also includes displaying said accessory item in conjunction with said item to accessorize said item in said computer activity.
 31. The method of claim 30, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing also includes modifying at least one of said traits in said computer activity.
 32. The method of claim 29, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity, and further wherein said accessory item is used by said animated character in said computer activity.
 33. The method of claim 27, wherein said first product is representative of a living being, and wherein said accessory is one of clothing for the product, an item for the product to hold, an item for the product to wear, or representative of a symbol of a desired characteristic of the product.
 34. The method of claim 33, wherein said enhancing also includes displaying an accessory item in conjunction with said item to accessorize said item in said computer activity.
 35. The method of claim 34, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing also includes modifying at least one of said traits in said computer activity.
 36. The method of claim 26, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing includes modifying at least one of said traits in said computer activity.
 37. The method of claim 32, wherein said accessory for said first product is symbolic in a manner that anticipates said modification of said at least one of said traits.
 38. The method of claim 37, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity.
 39. The method of claim 26, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity.
 40. The method of claim 26, wherein the first human readable code was initially hidden from the user with said first product.
 41. A method for providing a computer activity to a user, said method comprising the steps of: registering a first product on a computer, said registering including accepting a first human readable code manually input into the computer by the user; responsive to registering the first product, providing an item for display in said computer activity, said item visually corresponding to said first product; registering a tangible product on said computer, said registering including accepting a second human readable code manually input into the computer by the user; and responsive to registering the second product, enhancing said item in said computer activity.
 42. The method of claim 41, wherein said second product is an accessory to said first product.
 43. The method of claim 42, wherein said enhancing includes displaying an accessory item for said item in said computer activity.
 44. The method of claim 43, wherein said accessory item for said item substantially resembles said accessory for said first product.
 45. The method of claim 43, wherein said enhancing also includes displaying said accessory item in conjunction with said item to accessorize said item in said computer activity.
 46. The method of claim 45, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing also includes modifying at least one of said traits in said computer activity.
 47. The method of claim 44, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity, and further wherein said accessory item is used by said animated character in said computer activity.
 48. The method of claim 42, wherein said first product is representative of a living being, and wherein said accessory is one of clothing for the product, an item for the product to hold, an item for the product to wear, or representative of a symbol of a desired characteristic of the product.
 49. The method of claim 48, wherein said enhancing also includes displaying an accessory item in conjunction with said item to accessorize said item in said computer activity.
 50. The method of claim 49, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing also includes modifying at least one of said traits in said computer activity.
 51. The method of claim 41, wherein said item possesses one or more traits in said computer activity, and wherein said enhancing includes modifying at least one of said traits in said computer activity.
 52. The method of claim 47, wherein said accessory for said first product is symbolic in a manner that anticipates said modification of said at least one of said traits.
 53. The method of claim 52, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity.
 54. The method of claim 41, wherein said first product is one of an action figure, a doll, or a stuffed animal, and wherein said item is an animated character in said computer activity.
 55. The method of claim 41, wherein the first human readable code was initially hidden from the user with said first product.
 56. A method for providing a computer activity to a user, said method comprising the steps of: accepting a first human readable access code provided with a toy and manually input by the user; registering the toy using the first access code input by the user; responsive to registering the toy, providing a character in said computer activity, said character substantially resembling said toy; registering an accessory to said toy using a second access code provided with said accessory; and responsive to registering the accessory, modifying a characteristic of said character in said computer activity.
 57. The method of claim 56, wherein said modifying the characteristic of said character includes providing an accessory item for said character.
 58. The method of claim 57, wherein said accessory is tangible, and wherein said accessory item substantially resembles said accessory.
 59. The method of claim 57, wherein said modifying the characteristic of said character further includes modifying a trait of said character.
 60. The method of claim 57, wherein said accessory is for said toy to wear or hold, and wherein said accessory item is for said character to wear or hold.
 61. The method of claim 60, wherein said modifying an appearance and/or a capability of said character includes providing a function or trait for said character that is represented by the form of said accessory item.
 62. The method of claim 56, wherein said modifying the characteristic of said character includes modifying a trait of said character.
 63. The method of claim 62, wherein said accessory for said first product is symbolic in a manner that anticipates said modifying of said trait.
 64. The method of claim 56, wherein said character is animated by the user in said computer activity.
 65. The method of claim 64, wherein said modifying the characteristic of said character includes modifying the animation of said character in said computer activity.
 66. The method of claim 56, wherein said computer activity is provided by a server and wherein said registering is accomplished using a computer network.
 67. A method for providing a computer activity to a user, said method comprising the steps of: accepting a first human readable access code provided with a first tangible product and manually input by the user; registering the first tangible product using the first access code input by the user; responsive to registering the first tangible product, providing an image in said computer activity, said image substantially resembling said first tangible product; registering an accessory to said first tangible product using a second access code provided with said accessory; and responsive to registering the accessory, modifying a characteristic of said image in said computer activity.
 68. The method of claim 67, wherein said modifying the characteristic of said image includes providing an accessory item for said image.
 69. The method of claim 68, wherein said accessory is tangible, and wherein said accessory item substantially resembles said accessory.
 70. The method of claim 68, wherein said modifying the characteristic of said image further includes modifying a trait of said image.
 71. The method of claim 68, wherein said accessory attaches to said product, and wherein said accessory item attaches to said image.
 72. The method of claim 70, wherein said modifying an appearance and/or a capability of said image includes providing a function or trait for said image that is represented by the form of said accessory item.
 73. The method of claim 67, wherein said modifying the characteristic of said character includes modifying a trait of said character.
 74. The method of claim 73, wherein said accessory for said first product is symbolic in a manner that anticipates said modifying of said trait.
 75. The method of claim 67, wherein said image is animated by the user in said computer activity.
 76. The method of claim 75, wherein said modifying the characteristic of said image includes modifying the animation of said image in said computer activity.
 77. The method of claim 67, wherein said computer activity is provided by a server and wherein said registering is accomplished over a computer network.
 78. A method for providing a computer activity, said method comprising the steps of: providing a toy with a unique first access code; providing an accessory with a unique second access code, wherein said accessory is an accessory to said toy; registering said toy on a server connected to a network using said first access code; responsive to registering said toy, providing a character in a computer activity, said character substantially resembling said toy, wherein said character is provided such that it can be animated based on a command received by said server; registering the accessory on said server using said second access code; and responsive to registering the accessory, modifying a characteristic of said character in said computer activity.
 79. The method of claim 78, wherein said computer activity includes an additional character of another registered toy, said additional character animated by another user using an additional user computer via said network and located remotely from said user.
 80. The method of claim 79, wherein said computer activity is a competitive game, and wherein said enhancement provides a competitive advantage for said user animating said character against said additional character in said game.
 81. The method of claim 79, wherein said first access code is human readable and wherein said registering includes the step of accepting said first access code via manual entry by the user.
 82. A method for providing a computer activity, said method comprising the steps of: providing a tangible product with a unique first access code; providing an accessory with a unique second access code, wherein said accessory is an accessory to said product; registering said product on a server connected to a network using said first access code; responsive to registering said product, providing an image in said computer activity, said image substantially resembling said product, wherein said image is provided such that it can be animated in said computer activity based on a command received by said server; registering the accessory on said server using said second access code; and responsive to registering the accessory, modifying a characteristic of said image in said computer activity.
 83. The method of claim 82, wherein said computer activity includes an additional image of another registered product, said additional image animated by another user using an additional user computer via said network and located remotely from said user.
 84. The method of claim 83, wherein said computer activity is a competitive game, and wherein said enhancement provides a competitive advantage for said user animating said image against said additional image in said game.
 85. The method of claim 83, wherein said first access code is human readable and wherein said registering includes the step of accepting said first access code via manual entry by the user.
 86. A method for providing a computer activity, said method comprising the steps of: providing a toy with a unique first access code; providing an accessory with a unique second access code, wherein said accessory is an accessory to said toy; registering said toy on a server connected to a network using said first access code; responsive to registering said toy, providing a character in said computer activity, said character substantially resembling said toy, wherein said character is provided such that it can be animated based on a command received by said server; registering the accessory on said server using said second access code; and responsive to registering the accessory, modifying a characteristic of said character in said computer activity.
 87. The method of claim 86, wherein said computer activity includes an additional character of another registered toy, said additional character animated by another user using an additional user computer via said network and located remotely from said user.
 88. The method of claim 87, wherein said computer activity is a competitive game, and wherein said enhancement provides a competitive advantage for said user animating said character against said additional character in said game.
 89. The method of claim 87, wherein said first access code is human readable and wherein said registering includes the step of accepting said first access code via manual entry by the user.
 90. A method for providing a computer activity on a computer, said method comprising the steps of: registering a first product on a computer, wherein the first product belongs to a first class of products; responsive to registering the first product, providing a first item in said computer activity; registering a second product on said computer, wherein the second product belongs to a second class of products different than the first class of products; and responsive to registering the second product, enhancing said first item in said computer activity.
 91. The method of claim 90, wherein said enhancing includes providing a second item in said computer activity, where said second item is an accessory to said first item.
 92. The method of claim 91, wherein said second product is an accessory to said first product.
 93. The method of claim 92, wherein said second item substantially resembles said second product.
 94. The method of claim 90, wherein said enhancing includes modifying a trait of said first item in said computer activity.
 95. The method of claim 90, wherein said first product is one of an action figure, a doll, or a toy animal, and wherein said second product is an accessory to said first product that is other than any of said action figure, doll, or toy animal.
 96. The method of claim 90, wherein said enhancement includes extending use of said item in said computer activity after use of said first item had expired.
 97. The method of claim 90, wherein said first class is a class comprised of action figures, and where said second class is a class comprised of accessories to said action figures.
 98. The method of claim 97, wherein said second class is a class of weapons for accessorizing said action figures.
 99. A method for providing a computer activity on a computer, said method comprising the steps of: registering a first tangible product on a computer using a human readable code provided with said first product, wherein the first product belongs to a first class of tangible products; responsive to registering the first product, providing a first item in said computer activity; registering a second product on said computer, wherein the second product belongs to a second class of products different than the first class of products; and responsive to registering the second product, enhancing said first item in said computer activity.
 100. The method of claim 99, wherein said enhancing includes providing a second item in said computer activity, where said second item is an accessory to said first item.
 101. The method of claim 100, wherein said second product is a tangible accessory to said first product.
 102. The method of claim 101, wherein said second item substantially resembles said second product.
 103. The method of claim 99, wherein said enhancing includes modifying a trait of said first item in said computer activity.
 104. The method of claim 99, wherein said first product is one of an action figure, a doll, or a toy animal, and wherein said second product is an accessory to said first product that is other than any of said action figure, doll, or toy animal.
 105. The method according to claim 99, wherein said enhancement includes extending use of said item in said computer activity after use of said first item had expired.
 106. The method of claim 99, wherein said first class is a class comprised of action figures, and where said second class is a class comprised of tangible accessories to said action figures.
 107. The method of claim 106, wherein said second class is a class of weapons for accessorizing said action figures.
 108. A method for providing a computer activity on a computer, said method comprising the steps of: registering a first tangible product on a computer using a human readable code provided with said first product, wherein the first product belongs to a first class of tangible products; responsive to registering the first product, providing a first item in said computer activity, said first item visually corresponding to said first tangible product; registering a second product on said computer, wherein the second product belongs to a second class of products different than the first class of products; and responsive to registering the second product, enhancing said first item in said computer activity.
 109. The method of claim 108, wherein said enhancing includes providing a second item in said computer activity, where said second item is an accessory to said first item.
 110. The method of claim 109, wherein said second product is a tangible accessory to said first product.
 111. The method of claim 110, wherein said second item substantially resembles said second product.
 112. The method of claim 108, wherein said enhancing includes modifying a trait of said first item in said computer activity.
 113. The method of claim 108, wherein said first product is one of an action figure, a doll, or a toy animal, and wherein said second product is an accessory to said first product that is other than any of said action figure, doll, or toy animal.
 114. The method according to claim 108, wherein said enhancement includes extending use of said item in said computer activity after use of said first item had expired.
 115. The method of claim 108, wherein said first class is a class comprised of action figures, and where said second class is a class comprised of tangible accessories to said action figures.
 116. The method of claim 115, wherein said second class is a class of weapons for accessorizing said action figures.
 117. A method of providing a virtual environment including a computer activity, said method comprising: a server receiving a transmission of first registration information over a network to register a first product; responsive to registering the first product said server serving content to be transmitted over the network for displaying a virtual representation of the first product; said server receiving a transmission of second registration information over the network to register a second product; responsive to registering the second product, said server serving additional content for enhancing virtual representation of the first product.
 118. The method of claim 117, wherein said first product includes a tangible toy and a human readable code hidden with the toy, and wherein said first registration information includes at least a portion of said code.
 119. The method of claim 118, wherein said second product includes an accessory to said first product.
 120. The method of claim 119, wherein said second product includes a second human readable code, and wherein said second registration information includes at least a portion of said second human readable code.
 121. The method of claim 120, wherein said enhancing includes providing an accessory item for said virtual representation of the first product.
 122. The method of claim 119, wherein said enhancing step includes providing an accessory item for said virtual representation of the first product.
 123. The method of claim 117, wherein said network is the Internet.
 124. The method of claim 117, wherein said first product is a toy, wherein said virtual representation of the toy has characteristics that impact use in said presentation, and wherein said enhancing step includes providing enhanced characteristics.
 125. A method of providing a virtual environment including a computer activity, said method comprising: a server receiving a transmission of first registration information over a network to register a tangible first product; responsive to registering the first product, said server serving content to be transmitted over the network for displaying a virtual representation of the first product; said server receiving a transmission of second registration information over the network to register a second product; responsive to registering the second product, said server serving additional content for enhancing said virtual representation of the first product.
 126. The method of claim 125, wherein said first product includes a human readable code hidden with the product, and wherein said first registration information includes at least a portion of said code.
 127. The method of claim 126, wherein said second product includes a tangible accessory to said first product.
 128. The method of claim 127, wherein said second product includes a second human readable code, and wherein said second registration information includes at least a portion of said second human readable code.
 129. The method of claim 128, wherein said enhancing step includes providing an accessory item for said virtual representation of the first product.
 130. The method of claim 127, wherein said enhancing step includes providing an accessory item for said virtual representation of the first product.
 131. The method of claim 125, wherein said network is the Internet.
 132. The method of claim 125, wherein said first product is a toy, wherein said virtual representation of the toy has characteristics that impact use in said presentation, and wherein said enhancing step includes providing enhanced characteristics.
 133. A method for providing a computer activity, said method comprising the steps of: registering a toy on said server by accepting a first unique access code provided with the toy; responsive to registering said toy, said server providing content including a character in said computer activity, said character substantially resembling said toy, wherein said character is provided such that it can be animated based on a command received by the server; registering an accessory on said server using a second access code provided with the accessory, wherein said accessory is an accessory to the toy; responsive to registering the accessory, said server providing further content including an image to the computing device in said computer activity, wherein said image substantially resembles said accessory; and further responsive to registering the accessory, the server modifying a characteristic of said character in said computer activity.
 134. The method of claim 133, wherein said modifying a characteristic of said character in said computer activity includes accessorizing said character with said image.
 135. The method of claim 134, wherein said character possesses traits in said computer activity, and wherein said modifying a characteristic of said character in said computer activity also includes modifying said traits in said computer activity.
 136. The method of claim 133, wherein said character possesses traits in said computer activity, and wherein said modifying a characteristic of said character in said computer activity includes modifying said traits in said computer activity.
 137. A method for providing a computer activity, said method comprising the steps of: providing a toy with a unique first access code that is initially hidden from view; providing an accessory with a unique second access code that is initially hidden from view, wherein said accessory is different than said toy; registering said toy on said computing device using said first access code; responsive to registering said toy, providing a character in said computer activity, said character substantially resembling said toy, wherein said character is provided such that it can be animated based on a command received by said computing device; registering the accessory on said computing device using said second access code; and responsive to registering the accessory, modifying a characteristic of said character in said computer activity.
 138. The method of claim 137, wherein said first access code is a printed human readable code.
 139. The method of claim 138, wherein said registering includes accepting said first access code from the computing device as manually entered by the user.
 140. A method for providing a computer activity to a user using a computing device, said method comprising the steps of: providing an accessory with a unique second access code that is initially hidden from view, wherein said accessory is different than said toy; registering a toy on said computing device using a unique human readable first access code provided with the toy initially hidden from view; responsive to registering said toy, providing a character in said computer activity, said character substantially resembling said toy, wherein said character is provided such that it can be animated based on a command received by said computing device; registering an accessory on said computing device using a second unique human readable access code provided with the accessory initially hidden from view; and responsive to registering the accessory, modifying a characteristic of said character in said computer activity.
 141. The method of claim 140, wherein said first access code is printed on a medium provided with the toy, and where said registering includes accepting said first access code from the computing device as manually entered by the user.
 142. A method of providing a game on a computing device, said method comprising: providing an action figure with a unique first access code that is initially hidden from view; providing an accessory with a unique second access code that is initially hidden from view; registering said action figure on said computing device using said first access code; responsive to registering said action figure, providing a character for participating in said game, said character substantially resembling said action figure, wherein said character is provided such that it can be animated by the user in said game using said computing device; registering the accessory on said computing device using said second access code; and responsive to registering the accessory, modifying a characteristic of the character in said game.
 143. The method of claim 142, wherein said computing device is a video game console.
 144. The method of claim 142, wherein said game also includes an additional character animated by an additional user for interacting with said character.
 145. The method of claim 142, wherein said computing device is connected to an additional computing device via a communication network, and wherein the additional user animates the additional character using the additional computing device.
 146. The method of claim 142, wherein said accessory is intangible.
 147. The method of claim 142, wherein said accessory is a tangible accessory for said action figure.
 148. The method of claim 147, wherein responsive to registering the accessory, said character obtains an animated accessory that substantially resembles the accessory.
 149. The method of claim 148, wherein said character has a trait that impacts the character's performance in said game, and responsive to registering the accessory, said trait is improved.
 150. The method of claim 142, wherein said character has a trait that impacts the character's performance in said game, and wherein responsive to registering the accessory, said trait is modified.
 151. The method of claim 142, wherein said game is provided by a server connected to the computing device via a communication network.
 152. A method of providing a game on a computing device, said method comprising: registering a tangible action figure on said computing device using a unique human readable first access code provided with the action figure that is initially hidden from view; responsive to registering said action figure, providing a character for participating in said game, said character substantially resembling said action figure, wherein said character is provided such that it can be animated by the user in said game using said computing device and further wherein said character is provided with traits that impact a performance of the character in the game; registering an accessory on said computing device using a unique human readable second access code provided with the accessory that is initially hidden from view; and responsive to registering the accessory, modifying an appearance of said character, and also modifying at least one of said traits of said character in said game.
 153. A method for providing a computer activity to a user, said method comprising: receiving a code corresponding to a first product responsive to said code being entered on a computer; responsive to receiving the code, causing a virtual item to be displayed in said computer activity, said virtual item corresponding to said first product; receiving another code corresponding to a second product responsive to said another code being entered into said computer; responsive to receiving the another code, affiliating enhancement information corresponding to the second product with the virtual item in the computer activity and enhancing said virtual item in said computer activity based on said enhancement information; and saving said enhancement information affiliated with said virtual item to be subsequently retrieved for future use in the computer activity.
 154. The method according to claim 153, wherein the virtual item has a general appearance resembling an appearance of said first product.
 155. The method according to claim 154, wherein the first product is a toy and the virtual item is a virtual character having the general appearance resembling the appearance of the toy.
 156. A method for providing a computer activity to a user, said method comprising: receiving a code entered into a computer, said code corresponding to a toy comprising body parts that make the toy identifiable; responsive to receiving the code, causing a virtual character that visually corresponds to the toy to be displayed in said computer activity; receiving another code entered into said computer, said another code corresponding to an accessory for the toy; and responsive to receiving the another code, affiliating enhancement information corresponding to the accessory with the virtual character in the computer activity and enhancing said virtual character in said computer activity based on said enhancement information.
 157. The method according to claim 156, wherein the body parts are connected to the toy.
 158. The method according to claim 156, wherein the body parts include a hand, and the accessory comprises an item to be used in the hand.
 159. A method for providing a computer activity to a user, said method comprising: receiving an access code corresponding to a toy over a communication network during registration of the toy; responsive to receiving the code, transmitting content over the communication network to display a virtual character that visually corresponds to the toy in said computer activity; receiving another access code over the communication network, said another code corresponding to an accessory for the toy; and responsive to receiving the another code, transmitting enhancement information corresponding to the accessory over the communication network to enhance said virtual character in said computer activity based on said enhancement information.
 160. The method according to claim 159 further comprising saving said virtual character enhanced based on said enhancement information on a centralized management device accessible over the communication network.
 161. The method according to claim 159 further comprising: establishing a user account corresponding to the user; and affiliating the virtual character with the user account to enable the user to subsequently gain access to the virtual character for future use by accessing the user account.
 162. A system comprising: a three-dimensional figure, said three-dimensional figure associated with a first access code; a computer system, including an interface that allows entering said first access code, and responsive to receiving said first access code, providing a likeness of the three-dimensional figure, and controlling interaction with said likeness of the three-dimensional figure on the computer system; and an accessory for the likeness of the three-dimensional figure, said accessory associated with a second access code; wherein said interface of said computer system also allows entry of said second access code, and responsive to entry of said second access code, and said computer system provides information indicative of said accessory responsive to said entry of said second access code, said information indicative of said accessory being associated with said likeness of said three-dimensional figure.
 163. A system as in claim 162, wherein said three-dimensional figure is packaged in packaging, and wherein said first access code is associated with said packaging.
 164. A system as in claim 163, wherein said first access code is provided in said packaging in a way that is not visible without opening the packaging.
 165. A system as in claim 162, wherein said first access code comprises a series of letters.
 166. A system as in claim 165, wherein each of a plurality of individual three-dimensional figures has a unique first access code.
 167. A system as in claim 162, wherein said computer system provides an activity and allows said likeness of said three-dimensional figure to interact as part of said activity on the computer system.
 168. A system as in claim 162, wherein said accessory is associated with a three dimensional version of the accessory.
 169. A system as in claim 168, wherein said three dimensional version of the accessory is an item that can be used with said three-dimensional figure.
 170. A system as in claim 169, wherein said computer system allows said information indicative of the accessory to be used with said likeness of said three-dimensional figure in a same way that said three dimensional version of said accessory is used with said three-dimensional figure.
 171. A system as in claim 162, wherein said accessory is an attribute that changes a characteristic of said likeness of said three-dimensional figure.
 172. A system as in claim 171, wherein said attribute makes the likeness of said three-dimensional figure in the computer system take actions on said computer during said interaction which make the likeness appear stronger.
 173. A system as in claim 171, wherein said attribute makes the likeness of said three-dimensional figure have more capabilities than it had before said accessory is added.
 174. A system as in claim 162, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 175. A system as in claim 174, wherein said three-dimensional figure and said likeness of the three-dimensional figure have a same facial expression.
 176. A system as in claim 174, wherein said three-dimensional figure and said likeness of the three-dimensional figure have the same clothing.
 177. A system as in claim 174, wherein said three-dimensional figure includes a logo thereon, and said likeness of the three-dimensional figure has a same logo thereon.
 178. A system as in claim 162, wherein said accessory causes said computer system to change a characteristic of a behavior of the likeness of the three-dimensional figure.
 179. A system as in claim 178, wherein said accessory has a likeness which represents an indication of the way in which the behavior of the three-dimensional figure is changed.
 180. A system as in claim 162, wherein said accessory has a packaging, and said second access code is associated with packaging for the accessory.
 181. A system as in claim 180, wherein said second access code is associated with said packaging in a way that prevents the second access code from being visible until the packaging is opened.
 182. A system as in claim 162, wherein said three-dimensional figure is one of a warrior, a sports figure, a casino gambler, a doll, or a teddy bear.
 183. A system as in claim 162, wherein said computer system allows said virtual representation to move between areas, and stores a last area of said virtual representation within said computer system.
 184. A system as in claim 183, wherein said computer system automatically returns to said last area.
 185. A system as in claim 162, wherein said first access code has an expiration, and said second access code extends said expiration.
 186. A system as in claim 162, wherein said computer senses an action taken by a user to enter said first access code.
 187. A system as in claim 186, wherein said computer also senses an action taken by a user to enter said second access code.
 188. A system as in claim 162, wherein said computer system provides an interface which allows manual entry of said first access code can be entered over a network, and accepts said entry of said first access code over said network.
 189. A system as in claim 188, wherein said computer system provides an interface which allows manual entry of said first access code, and accepts said entry of said first access code over said network.
 190. A system as in claim 162, wherein said computer system stores at least one of said first and second access codes in a user account.
 191. A method comprising: associating a three-dimensional figure with a first access code; allowing said first access code to be entered into a computer system; responsive to receiving said first access code, using the computer system for providing a likeness of the three-dimensional figure on a display associated with said computer system, and interacting with said likeness of the three-dimensional figure on the computer system; and receiving a second access code in the computer system; and responsive to receiving said second access code, providing an accessory for said likeness, associated with said likeness, in said computer system, and said likeness is modified by said accessory.
 192. A method as in claim 191, wherein said associating comprises associating said first access code with packaging of the three-dimensional figure.
 193. A method as in claim 192, wherein said associating is provides the first access code in a way that is not visible without opening the packaging.
 194. A method as in claim 191, wherein each of said first access code and said second access code are different.
 195. A method as in claim 191, wherein each of said first access code and said second access code include a series of letters.
 196. A method as in claim 191, wherein each of said first access codes, for each of a plurality of different three-dimensional figures, is unique.
 197. A method as in claim 191, wherein said computer system provides an activity and controls manipulating said likeness of said three-dimensional figure to access said activity.
 198. A method as in claim 191, further comprising associating said second access code with a three-dimensional version of said accessory.
 199. A method as in claim 198, wherein said three-dimensional version of the accessory is an item that can be used with said three-dimensional figure.
 200. A method as in claim 199, wherein said accessory is clothing.
 201. A method as in claim 199, wherein said computer system allows said accessory to be used with said virtual likeness of said three-dimensional figure in a similar manner that said three-dimensional version of said accessory is used with said three-dimensional figure.
 202. A method as in claim 191, wherein said second access code changes a characteristic of said likeness of the three-dimensional figure.
 203. A method as in claim 202, wherein said second access code represents an attribute that makes the likeness of the three-dimensional figure in the computer system stronger.
 204. A method as in claim 202, wherein said second access code represents an attribute that makes the virtual likeness of the three-dimensional figure have more capabilities than it had before said second access code was added.
 205. A method as in claim 202, further comprising associating a second likeness with said second access code, where said second likeness represents an indication of the way in which a behavior of the three-dimensional figure is changed by said second access code.
 206. A method as in claim 191, further comprising packaging said accessory and associating said second access code with said packaging for the accessory.
 207. A method as in claim 206, further comprising associating said second access code with said packaging in a way that prevents the second access code from being visible until the packaging is opened.
 208. A method as in claim 191, further comprising using said computer system to allow said virtual representation to move among areas, and further comprising storing a last area of where said virtual representation had moved.
 209. A method as in claim 208, further comprising automatically returning to said last area.
 210. A method as in claim 191, wherein said first access code has an expiration, and further comprising using said second access code to extend said expiration.
 211. A method as in claim 191, wherein said computer system provides an activity and allows said likeness of said three-dimensional figure to interact with said activity.
 212. A method as in claim 45, wherein said computer system also allows said likeness of said accessory to be part of said activity.
 213. A combination comprising: a three-dimensional figure, said three-dimensional figure associated with a first alphanumeric access code; a computer system, including an interface that allows entering said first alphanumeric access code, and responsive to receiving said first alphanumeric access code, providing a likeness of the three-dimensional figure, and allowing interaction with said likeness of the three-dimensional figure on the computer system; and a three-dimensional accessory for the three-dimensional figure, said three-dimensional accessory usable with the three-dimensional figure, and said three-dimensional accessory associated with a second alphanumeric access code; wherein said computer system also allows entry of said second alphanumeric access code, and responsive to entry of said second alphanumeric access code, provides a virtual representation of said three-dimensional accessory associated with said likeness of said three-dimensional figure in a way that allows interaction with both said likeness of said three-dimensional figure and said virtual representation of said three-dimensional accessory, and where said likeness of said three dimensional figure is modified by said virtual representation of said accessory.
 214. A combination as in claim 213, wherein said three-dimensional accessory is an item of clothing that can be worn on said three-dimensional figure, and wherein said second alphanumeric access code causes said likeness of said three-dimensional figure to be shown with a likeness of said item of clothing.
 215. A combination as in claim 213, wherein said three-dimensional figure is packaged in packaging, and wherein said first alphanumeric access code is associated with said packaging.
 216. A combination as in claim 215, wherein said first alphanumeric access code is provided in said packaging in a way that is not visible without opening the packaging.
 217. A combination as in claim 213, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 218. A combination as in claim 217, wherein said three-dimensional figure, and said likeness of the three-dimensional figure have a same facial expression.
 219. A combination as in claim 213, wherein said three-dimensional accessory has a packaging, and said second alphanumeric access code is associated with packaging for the three-dimensional accessory.
 220. A combination as in claim 219, wherein said second alphanumeric access code is associated with said packaging in a way that prevents the second alphanumeric access code from being visible until the packaging is opened.
 221. A method as in claim 213, further comprising purchasing said three-dimensional accessory in a store.
 222. A system comprising: a computer system, including an interface that allows entering a first access code that is associated with a three-dimensional figure, and responsive to receiving said first access code, said computer system providing a likeness of the three-dimensional figure, and said computer system allowing interaction with said likeness of the three-dimensional figure on the computer system, and said likeness having a first characteristic on the computer system; and said computer system accepting a second access code, different than the first access code, and responsive to said accepting, changing said first characteristic of said likeness of the three-dimensional figure on said computer system.
 223. A system as in claim 222, further comprising the three-dimensional figure.
 224. A system as in claim 223, wherein said three-dimensional figure is packaged in packaging, and wherein said first access code is associated with said packaging.
 225. A system as in claim 224, wherein said first access code is provided in said packaging in a way that is not visible without opening the packaging.
 226. A system as in claim 223, wherein said first and second access codes each comprise a series of letters.
 227. A system as in claim 226, wherein each of a plurality of individual three-dimensional figures has a unique first access code.
 228. A system as in claim 223, wherein said computer system provides an activity and allows said likeness of said three-dimensional figure to access said activity, and wherein said second access code changes the way that said likeness reacts when accessing said activity.
 229. A system as in claim 228, wherein said second access code makes the likeness of said three-dimensional figure in the computer system stronger in said activity.
 230. A system as in claim 228, wherein said second access code makes the likeness of said three-dimensional figure in the computer system have more capabilities than it had before said second access code was used.
 231. A system as in claim 223, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 232. A system as in claim 231, wherein said three-dimensional figure, and said likeness of the three-dimensional figure have a same facial expression.
 233. A system as in claim 231, wherein said three-dimensional figure and said likeness of the three-dimensional figure have the same clothing.
 234. A system as in claim 223, wherein said second access code makes the likeness of said three-dimensional figure in the computer system have a changed behavior of the likeness than it had before said second access code was accepted.
 235. A system as in claim 223, further comprising an image associated with said second access code, and wherein a visual content of said image represents the way in which the first characteristic of the three-dimensional figure is changed by said accepting said second access code.
 236. A system as in claim 223, wherein said first access code has an expiration, and said second access code extends said expiration.
 237. A combination comprising: a computer system, including an interface that allows accepting a first access code, and responsive to receiving said first access code, providing a likeness of a three-dimensional figure, and allowing interaction with said likeness of the three-dimensional figure on the computer system, and also accepting a second access code associated with the three-dimensional figure, said second access code changing a way that said likeness of the three-dimensional figure on said computer system reacts to said interaction; and a physically viewable item, representative of said second access code, said item representing an indication of the way in which a behavior of the likeness of the three-dimensional figure is changed.
 238. A combination as in claim 237, further comprising the three-dimensional figure; and wherein said first access code is associated with said three-dimensional figure.
 239. A combination as in claim 238, wherein said three-dimensional figure is packaged in packaging, and wherein said first access code is associated with said packaging.
 240. A combination as in claim 239, wherein said first access code is provided in said packaging in a way that is not visible without opening the packaging.
 241. A combination as in claim 237, wherein said first access code comprises a series of letters.
 242. A combination as in claim 241, wherein each of a plurality of individual three-dimensional figures has a unique first access code.
 243. A combination as in claim 237, wherein said computer system provides an activity and allows said likeness of said three-dimensional figure to access said activity, and said behavior includes a way that said three-dimensional figure accesses said activity.
 244. A combination as in claim 237, wherein said change of behavior is an attribute that makes the likeness in the computer system stronger.
 245. A combination as in claim 244, wherein said item looks like a fist.
 246. A combination as in claim 237, wherein said change of behavior is an attribute that makes the likeness in the computer system have improved health.
 247. A combination as in claim 246, wherein said item looks like a body part.
 248. A combination as in claim 237, wherein said change of behavior is an attribute that makes the likeness in the computer system have improved wisdom.
 249. A combination as in claim 248, wherein said item looks like a book.
 250. A combination as in claim 237, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 251. A combination as in claim 250, wherein said three-dimensional figure, and said likeness of the three-dimensional figure, have a same facial expression.
 252. A combination as in claim 237, wherein said physically viewable item comprises an accessory associated with said second access code, said accessory has a tangible three-dimensional form.
 253. A combination as in claim 252, wherein said computer system allows a likeness of said accessory to be used with said likeness of said three-dimensional figure in a similar manner that said accessory is used with said three-dimensional figure.
 254. A combination as in claim 252, wherein said accessory has a packaging, and said second access code is associated with packaging for the accessory.
 255. A combination as in claim 252, wherein said accessory is a badge.
 256. A combination as in claim 252, wherein said accessory is a medallion.
 257. A combination as in claim 237, wherein said second access code extends an expiration date of said first access code.
 258. A combination comprising: a tangible figure, having a first access code physically associated with said tangible figure; a computer system, including an interface that allows entering said first access code, and responsive to receiving said first access code, providing a likeness of the tangible figure, and allowing interaction with said likeness of the tangible figure on the computer system; and a tangible accessory for the tangible figure, said tangible accessory physically associated with a second access code; wherein said computer system also allows entry of said second access code, and responsive to entry of said second access code, provides information indicative of said tangible accessory as associated with said likeness of said tangible figure.
 259. A combination as in claim 258, wherein said tangible figure is packaged in packaging, and wherein said first access code is associated with said packaging.
 260. A combination as in claim 259, wherein said first access code is provided in said packaging in a way that is not visible without opening the packaging.
 261. A combination as in claim 258, wherein said first access code comprises a series of letters.
 262. A combination as in claim 258, wherein each of a plurality of individual tangible figures has a unique first access code.
 263. A combination as in claim 258, wherein said computer system provides an activity and allows said likeness of said tangible figure to access said activity.
 264. A combination as in claim 263, wherein said tangible accessory is an item that can be used with said tangible figure.
 265. A combination as in claim 264, wherein said computer system allows said information indicative of said tangible accessory to be used with said likeness of said three-dimensional figure in a similar manner that said tangible accessory is used with said tangible figure.
 266. A combination as in claim 258, wherein said first access code has an expiration, and said second access code extends said expiration.
 267. A system comprising: a computer system, including an interface that allows accepting a first alphanumeric access code and responsive to receiving said first alphanumeric access code, providing a likeness of a three-dimensional figure prior to an expiration, and allowing interaction with said likeness of the three-dimensional figure on the computer system prior to said expiration and preventing said interaction after said expiration, and also accepting a second alphanumeric access code associated with the three-dimensional figure, said second alphanumeric access code extending said expiration.
 268. A system as in claim 267, further comprising the three-dimensional figure, associated with said first alphanumeric access code.
 269. A system as in claim 268, further comprising an accessory for the three-dimensional figure, said accessory associated with a third access code, wherein said computer system also provides information indicative of said accessory as associated with said likeness of said three-dimensional figure responsive to entry of said third access code.
 270. A method comprising: selling a three-dimensional figure associated with a first alphanumeric access code; accepting entry of said first alphanumeric access code, and responsive to receiving said first alphanumeric access code, providing a likeness of the three-dimensional figure on a computer system, and allowing interaction with said likeness of the three-dimensional figure on the computer-based system; selling an accessory for the three-dimensional figure, said accessory usable with the three-dimensional figure, and said accessory associated with a second alphanumeric access code; and accepting entry of said second alphanumeric access code, and responsive to entry of said second alphanumeric access code, providing a virtual representation of said accessory associated with said likeness of said three-dimensional figure in a way that allows interaction with both said likeness of said three-dimensional figure and said accessory.
 271. A method as in claim 270, wherein said accessory is an item of clothing that can be worn on said three-dimensional figure, and wherein said second alphanumeric access code causes said likeness of said three-dimensional figure to be shown with a likeness of said item of clothing.
 272. A method as in claim 270, further comprising associating said first alphanumeric access code with packaging for the three-dimensional figure.
 273. A method as in claim 272, wherein said first alphanumeric access code is provided in said packaging in a way that is not visible without opening the packaging.
 274. A method as in claim 270, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 275. A method as in claim 274, wherein said three-dimensional figure, and said likeness of the three-dimensional figure have a same facial expression.
 276. A method as in claim 270, wherein said accessory has a packaging, and said second alphanumeric access code is associated with packaging for the accessory.
 277. A method as in claim 270, wherein said second alphanumeric access code is associated with said packaging in a way that prevents the second alphanumeric access code from being visible until the packaging is opened.
 278. A method comprising: accepting entry of a first access code on a computer system, where said first access code is associated with a three-dimensional figure; responsive to receiving said first access code, providing a likeness of the three-dimensional figure on the computer system; using the computer system for allowing interaction with said likeness of the three-dimensional figure on the computer system, where said likeness has a first characteristic on the computer system; accepting a second access code on the computer system, different than the first access code; and responsive to said accepting the second access code, changing said first characteristic of said likeness of the three-dimensional figure on said computer system.
 279. A method as in claim 278, wherein said first and second access codes each comprise a series of alphanumerics.
 280. A method as in claim 278, further comprising providing an activity on the computer system and interacting with said likeness of said three-dimensional figure as part of said activity, and wherein said second access code changes the way that said likeness reacts when accessing said activity.
 281. A method as in claim 280, wherein said second access code makes the likeness of said three-dimensional figure in the computer system stronger in said activity.
 282. A method as in claim 280, wherein said second access code makes the likeness of said three-dimensional figure in the computer system have more capabilities than it had before said second access code was used.
 283. A method as in claim 278, wherein said second access code makes the likeness of said three-dimensional figure in the computer system have a changed behavior of the likeness than it had before said second access code was accepted.
 284. A method as in claim 278, further comprising an image associated with said second access code, and wherein a visual content of said image represents the way in which the first characteristic of the three-dimensional figure is changed by said accepting said second access code.
 285. A method as in claim 278, wherein an action taken responsive to entry of said first access code has an expiration, and said second access code extends said expiration.
 286. A method comprising: accepting a first access code on a computer system; providing a likeness of a three-dimensional figure on the computer system responsive to accepting the first access code on the computer system; allowing interaction with said likeness of the three-dimensional figure on the computer system; accepting a second access code associated with the likeness of the three-dimensional figure on the computer system, said second access code changing a way that said likeness of the three-dimensional figure on said computer system reacts to said interaction; and using an item for representing an indication of the way in which a behavior of the three-dimensional figure is changed by said second access code.
 287. A method as in claim 286, further comprising selling the three-dimensional figure; and wherein said first access code is physically associated with said three-dimensional figure.
 288. A method as in claim 286, wherein said first access code comprises a series of alphanumerics.
 289. A method as in claim 286, wherein said computer system provides an activity and allows said likeness of said three-dimensional figure to access said activity, and said behavior includes a way that said three-dimensional figure accesses said activity.
 290. A method as in claim 286, wherein said change of behavior is an attribute that makes the likeness of said three-dimensional figure in the computer system stronger.
 291. A method as in claim 290, wherein said item looks like a fist.
 292. A method as in claim 286, wherein said change of behavior is an attribute that makes the likeness of said three-dimensional figure in the computer system have improved health.
 293. A method as in claim 292, wherein said item looks like a body part.
 294. A method as in claim 286, wherein said change of behavior is an attribute that makes the likeness of said three-dimensional figure in the computer system have improved wisdom.
 295. A method as in claim 294, wherein said item looks like a book.
 296. A method as in claim 286, further comprising an accessory associated with said second access code, said accessory having a tangible three-dimensional form.
 297. A method as in claim 296, wherein said accessory has a packaging, and said second access code is associated with packaging for the accessory.
 298. A method as in claim 297, wherein said accessory is a badge.
 299. A method as in claim 297, wherein said accessory is a medallion.
 300. A method as in claim 286, wherein said second access code extends an expiration date of said first access code.
 301. A method comprising: accepting a first alphanumeric access code; taking an action based on said first alphanumeric access code, said action having an expiration; responsive to receiving said first alphanumeric access code and prior to said expiration, providing a likeness of a three-dimensional figure, on a computer system; allowing interaction with said likeness of the three-dimensional figure on the computer system prior to said expiration and preventing said interaction after said expiration; and accepting a second alphanumeric access code associated with the three-dimensional figure, and extending said expiration based on said second alphanumeric access code.
 302. A method as in claim 301, further comprising selling the three-dimensional figure physically associated with said first alphanumeric access code.
 303. A system as in claim 301, further comprising selling an accessory for the three-dimensional figure, said accessory physically associated with said second alphanumeric access code, wherein said computer system also provides information indicative of said accessory associated with said likeness of said three-dimensional figure responsive to entry of said second alphanumeric access code.
 304. A system comprising: a three-dimensional figure, said three-dimensional figure associated with a first access code; a computer system, including an interface that accepts said first access code, and responsive to receiving said first access code, producing an output that displays a likeness of the three-dimensional figure, and controlling interaction with said likeness of the three-dimensional figure on the computer system, where the computer system prevents said interaction with said likeness on said computer system by the user prior to said first access code being entered; and an accessory for the three-dimensional figure, said accessory associated with a second access code; wherein said computer system also accepts entry of said second access code, and responsive to entry of said second access code provides information indicative of said accessory that modifies the interaction with said likeness of said three dimensional figure.
 305. A system as in claim 304, wherein said three-dimensional figure is packaged in packaging, and wherein said first access code is associated with said packaging.
 306. A system as in claim 305, wherein said first access code is provided in said packaging in a way that is not visible without opening the packaging.
 307. A system as in claim 304, wherein each of a plurality of individual three-dimensional figures has a unique first access code.
 308. A system as in claim 304, wherein said computer system provides an activity and provides controls that allow a user to interact with said activity, and said computer system allows said likeness of said three-dimensional figure to interact as part of said activity on the computer system.
 309. A system as in claim 304, wherein said accessory is a tangible item that can be used with said three-dimensional figure.
 310. A system as in claim 309, wherein said computer system controls said information indicative of the accessory to be used with said likeness of said three-dimensional figure in a same way that said accessory is used with said three-dimensional figure.
 311. A system as in claim 304, wherein said accessory is an attribute that changes a characteristic of said likeness of said three-dimensional figure.
 312. A system as in claim 311, wherein said attribute makes the likeness of said three-dimensional figure in the computer system take actions on said computer during said interaction which make the likeness appear stronger during said interaction.
 313. A system as in claim 311, wherein said attribute makes the likeness of said three-dimensional figure have more capabilities than it had before said accessory is added.
 314. A system as in claim 304, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 315. A system as in claim 314, wherein said three-dimensional figure and said likeness of the three-dimensional figure have a same facial expression.
 316. A system as in claim 314, wherein said three-dimensional figure and said likeness of the three-dimensional figure have the same clothing.
 317. A system as in claim 314, wherein said three-dimensional figure includes a logo thereon, and said likeness of the three-dimensional figure has a same logo thereon.
 318. A system as in claim 304, wherein said accessory causes said computer system to change a characteristic of a behavior of the likeness of the three-dimensional figure.
 319. A system as in claim 318, wherein said accessory has a likeness which represents an indication of the way in which the behavior of the three-dimensional figure is changed.
 320. A system as in claim 318, wherein said accessory has a packaging, and said second access code is associated with packaging for the accessory.
 321. A system as in claim 320, wherein said second access code is associated with said packaging in a way that prevents the second access code from being visible until the packaging is opened.
 322. A system as in claim 304, wherein said three-dimensional figure is one of a warrior, a sports figure, a casino gambler, a doll, or a teddy bear.
 323. A system as in claim 304, wherein said computer system controls said virtual representation to move between areas, and stores a last area of said virtual representation within said computer system.
 324. A system as in claim 323, wherein said computer system automatically returns to said last area.
 325. A system as in claim 304, wherein said first access code defines an action, and said action has an expiration, and said second access code extends said expiration.
 326. A system as in claim 304, wherein said computer senses an action taken by a user to enter said first access code.
 327. A system as in claim 326, wherein said computer system provides an interface which allows manual entry of said first access code can be entered over a network, and accepts said entry of said first access code over said network.
 328. A system as in claim 326, wherein said computer also senses an action taken by a user to enter said second access code.
 329. A system as in claim 328, wherein said computer system provides an interface which allows manual entry of said first access code over a network, and accepts said entry of said first access code over said network.
 330. A system as in claim 304, wherein said computer system stores at least one of said first and second access codes in a user account.
 331. A system comprising: a three-dimensional figure, said three-dimensional figure associated with a first access code; a computer system, including an interface that allows a user taking an action to enter said first access code, and recognizes said access responsive to receiving said first access code, producing an output that displays a likeness of the three-dimensional figure, and controlling interaction with said likeness of the three-dimensional figure on the computer system; and a first accessory for the three-dimensional figure, said accessory associated with a second access code; a second accessory for the three-dimensional figure, said accessory associated with a third access code; wherein said computer system also allows entry of said second and third access codes, and responsive to entry of said second and third access codes, provides information indicative of said first and second accessories, said information being viewed as connected with said likeness of said three-dimensional figure but said information of said first accessory not being connected to information indicative of said second accessory.
 332. A system as in claim 331, wherein said three-dimensional figure is packaged in packaging, and wherein said first access code is associated with said packaging, and provided in said packaging in a way that is not visible without opening the packaging.
 333. A system as in claim 331, wherein said computer system provides an activity and provides controls that allow a user to interact with said activity as said interaction.
 334. A system as in claim 331, wherein at least one of said accessories are a tangible item that can be used with said three-dimensional figure.
 335. A system as in claim 334, wherein said computer system controls said information indicative of the accessories to be used with said likeness of said three-dimensional figure in a same way that said accessories are used with said three-dimensional figure.
 336. A system as in claim 331, wherein at least one of said accessories is an attribute that changes a characteristic of said likeness of said three-dimensional figure.
 337. A system as in claim 336, wherein said attribute makes the likeness of said three-dimensional figure in the computer system take actions on said computer during said interaction which make the likeness appear stronger during said interaction.
 338. A system as in claim 336, wherein said attribute makes the likeness of said three-dimensional figure have more capabilities than it had before said accessory was added.
 339. A system as in claim 331, wherein at least one of said accessories causes said computer system to change a characteristic of a behavior of the likeness of the three-dimensional figure.
 340. A system as in claim 339, wherein at least one of said accessories has a likeness which represents an indication of the way in which the behavior of the three-dimensional figure is changed.
 341. A system as in claim 339, wherein said at least one accessory has a packaging, and said second access code is associated with packaging for the accessory.
 342. A system as in claim 341, wherein said second access code is associated with said packaging in a way that prevents the second access code from being visible until the packaging is opened.
 343. A system comprising: a three-dimensional figure, said three-dimensional figure having a physical packaging that includes a first access code; a computer system, including an interface that allows a user taking an action to enter said first access code, and recognizes said access responsive to receiving said first access code, producing an output that displays a likeness of the three-dimensional figure, and controlling interaction with said likeness of the three-dimensional figure on the computer system; and an accessory for the three-dimensional figure, said accessory associated with a second access code; wherein said computer system also allows entry of said second access code, and responsive to entry of said second access code, provides information indicative of said accessory, said information being associated with said likeness of said three-dimensional figure.
 344. A system as in claim 343, wherein said first access code is provided in said packaging in a way that is not visible without opening the packaging.
 345. A system as in claim 343, wherein each of a plurality of individual three-dimensional figures has a unique first access code.
 346. A system as in claim 343, wherein said computer system provides an activity and provides controls for said interacting, and said computer system allows said likeness of said three-dimensional figure to interact as part of said interacting on the computer system.
 347. A system as in claim 343, wherein said accessory is a tangible item that can be used with said three-dimensional figure.
 348. A system as in claim 347, wherein said computer system controls said information indicative of the accessory to be used with said likeness of said three-dimensional figure in a same way that said accessory is used with said three-dimensional figure.
 349. A system as in claim 343, wherein said accessory is an attribute that changes a characteristic of said likeness of said three-dimensional figure during said interacting.
 350. A system as in claim 349, wherein said attribute makes the likeness of said three-dimensional figure in the computer system take actions on said computer during said interaction which make the likeness appear stronger during said interaction.
 351. A system as in claim 349, wherein said attribute makes the likeness of said three-dimensional figure have more capabilities than it had before said accessory is added.
 352. A system as in claim 343, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 353. A system as in claim 352, wherein said three-dimensional figure and said likeness of the three-dimensional figure have a same facial expression.
 354. A system as in claim 352, wherein said three-dimensional figure and said likeness of the three-dimensional figure have the same clothing.
 355. A system as in claim 352, wherein said three-dimensional figure includes a logo thereon, and said likeness of the three-dimensional figure has a same logo thereon.
 356. A system as in claim 343, wherein said accessory causes said computer system to change a characteristic of a behavior of the likeness of the three-dimensional figure.
 357. A system as in claim 356, wherein said accessory has a likeness which represents an indication of the way in which the behavior of the three-dimensional figure is changed.
 358. A system as in claim 356, wherein said accessory has a packaging, and said second access code is associated with packaging for the accessory.
 359. A system as in claim 258, wherein said second access code is associated with said packaging in a way that prevents the second access code from being visible until the packaging is opened.
 360. A system as in claim 343, wherein said three-dimensional figure is one of a warrior, a sports figure, a casino gambler, a doll, or a teddy bear.
 361. A system as in claim 343, wherein said computer system controls said virtual representation to move between areas, and stores a last area of said virtual representation within said computer system.
 362. A system as in claim 361, wherein said computer system automatically returns to said last area.
 363. A system as in claim 343, wherein said first access code defines an action, and said action has an expiration, and said second access code extends said expiration.
 364. A system as in claim 343, wherein said computer senses an action taken by a user to enter said first access code.
 365. A system as in claim 364, wherein said computer system provides an interface which allows manual entry of said first access code can be entered over a network, and accepts said entry of said first access code over said network.
 366. A system as in claim 364, wherein said computer also senses an action taken by a user to enter said second access code.
 367. A system as in claim 366, wherein said computer system provides an interface which allows manual entry of said first access code over a network, and accepts said entry of said first access code over said network.
 368. A system as in claim 343, wherein said computer system stores at least one of said first and second access codes in a user account.
 369. A system comprising: a three-dimensional figure, said three-dimensional figure associated with a first access code; a computer system, including an interface that allows a receiving said first access code, and recognizes said access responsive to receiving said first access code, producing an output that displays a likeness of the three-dimensional figure, and controlling interaction with said likeness of the three-dimensional figure on the computer system; and an accessory for the three-dimensional figure, said accessory associated with a second access code; wherein said computer system also allows entry of said second access code, and responsive to entry of said second access code, provides information indicative of said accessory, said information being associated with said likeness of said three-dimensional figure; and wherein at least one of said first and second access codes is stored by said computer system in a user account.
 370. A system as in claim 369, wherein said three-dimensional figure is packaged in packaging, and wherein said first access code is associated with said packaging.
 371. A system as in claim 370, wherein said first access code is provided in said packaging in a way that is not visible without opening the packaging.
 372. A system as in claim 369, wherein each of a plurality of individual three-dimensional figures has a unique first access code.
 373. A system as in claim 369, wherein said computer system provides an activity and provides controls that allow a user to interact with said activity, and said computer system allows said likeness of said three-dimensional figure to interact as part of said activity on the computer system.
 374. A system as in claim 369, wherein said accessory is a tangible item that can be used with said three-dimensional figure.
 375. A system as in claim 374, wherein said computer system controls said information indicative of the accessory to be used with said likeness of said three-dimensional figure in a same way that said accessory is used with said three-dimensional figure.
 376. A system as in claim 369, wherein said accessory is an attribute that changes a characteristic of said likeness of said three-dimensional figure.
 377. A system as in claim 376, wherein said attribute makes the likeness of said three-dimensional figure in the computer system take actions on said computer during said interaction which make the likeness appear stronger during said interaction.
 378. A system as in claim 376, wherein said attribute makes the likeness of said three-dimensional figure have more capabilities than it had before said accessory is added.
 379. A system as in claim 369, wherein said three-dimensional figure visually corresponds to said likeness of the three-dimensional figure.
 380. A system as in claim 379, wherein said three-dimensional figure and said likeness of the three-dimensional figure have a same facial expression.
 381. A system as in claim 379, wherein said three-dimensional figure and said likeness of the three-dimensional figure have the same clothing.
 382. A system as in claim 379, wherein said three-dimensional figure includes a logo thereon, and said likeness of the three-dimensional figure has a same logo thereon.
 383. A system as in claim 369, wherein said accessory causes said computer system to change a characteristic of a behavior of the likeness of the three-dimensional figure.
 384. A system as in claim 383, wherein said accessory has a likeness which represents an indication of the way in which the behavior of the three-dimensional figure is changed.
 385. A system as in claim 383, wherein said accessory has a packaging, and said second access code is associated with packaging for the accessory.
 386. A system as in claim 385, wherein said second access code is associated with said packaging in a way that prevents the second access code from being visible until the packaging is opened.
 387. A system as in claim 369, wherein said three-dimensional figure is one of a warrior, a sports figure, a casino gambler, a doll, or a teddy bear.
 388. A system as in claim 369, wherein said computer system controls said virtual representation to move between areas, and stores a last area of said virtual representation within said computer system.
 389. A system as in claim 388, wherein said computer system automatically returns to said last area.
 390. A system as in claim 369, wherein said first access code defines an action, and said action has an expiration, and said second access code extends said expiration.
 391. A system as in claim 369, wherein said computer senses an action taken by a user to enter said first access code.
 392. A system as in claim 391, wherein said computer system provides an interface which allows manual entry of said first access code can be entered over a network, and accepts said entry of said first access code over said network.
 393. A system as in claim 391, wherein said computer also senses an action taken by a user to enter said second access code.
 394. A system as in claim 393, wherein said computer system provides an interface which allows manual entry of said first access code over a network, and accepts said entry of said first access code over said network.
 395. A system as in claim 369, wherein said computer system stores at least one of said first and second access codes in a user account. 