Interactive tracking virtual world system

ABSTRACT

An Interactive Tracking Virtual World (ITVW) system, may be utilized with other systems accessible through the Internet and/or a communications network. The ITVW system may be operable as an online game and/or to provide a virtual environment. ITVW system users (i.e., ITVW users) may be individuals or groups, such as parents and/or their children, which utilize the ITVW system for tracking an identity within the ITVW system. The ITVW system may also include ITVW system participants (i.e., ITVW participants), such as commercial business establishments, individuals and/or other entities associated with the ITVW system. The ITVW system collects an ITVW user&#39;s location information and location history.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/722,972, filed on Oct. 2, 2017; which is a continuation of U.S.patent application Ser. No. 14/328,678, filed on Jul. 10, 2014; which isa continuation of U.S. patent application Ser. No. 14/174,725 (U.S. Pat.No. 8,825,087), filed Feb. 6, 2014; which is a continuation of U.S.patent application Ser. No. 13/463,730 (U.S. Pat. No. 8,649,803), filedMay 3, 2012; which claims the benefit of U.S. Provisional PatentApplication No. 61/482,010, filed May 3, 2011; all of which areincorporated by reference herein in their entireties.

FIELD

This disclosure relates to the implementation of a virtual space thatreflects the real-world activities of users as a mechanism forincentivizing and/or monitoring real world activities by the users.

BACKGROUND

Systems that provide virtual spaces, such as virtual worlds and/or othervirtual spaces, to users are known. Generally, these virtual spaces aredevoid of effect caused by real world activities of the users. As aresult, interaction of the users with the virtual space is typicallylimited to “in-game” activities.

Systems that provide real-world location monitoring of, for example,children or other subordinates are known. Typically these systems aremonolithic systems that provide little to no incentive or engagement tothe individuals being monitored, other than fulfilling a requirementbeing imposed by the monitoring party.

SUMMARY

An Interactive Tracking Virtual World (ITVW) system, may be utilizedwith other systems accessible through the Internet and/or acommunications network. The ITVW system may be operable as an onlinegame and/or to provide a virtual environment. ITVW system users (i.e.,ITVW users) may be individuals or groups, such as parents and/or theirchildren, which utilize the ITVW system for tracking an identity withinthe TVW system. The ITVW system may also include ITVW systemparticipants (i.e., ITVW participants), such as commercial businessestablishments, individuals and/or other entities associated with theITVW system. The ITVW system collects an ITVW user's locationinformation and location history. The collected information may be usedto create an interactive virtual environment which may overlay a map,such as a map in a geographical mapping program.

An ITVW user may log into a secure website where an ITVW useridentification may be verified. If parental permission is required, aparent identification may also be verified. From within the ITVW system,the ITVW user may invite “friends”, such as individuals or otherentities to become a member of the ITVW user's virtual world. Thefriends may be tagged with identifiers to denote a personal connectionwith the ITVW user. Multiple ITVW users may use the ITVW systemsimultaneously to reflect an online community. An ITVW child user maypick an avatar and/or a nickname. These identifiers may become the ITVWchild user's identity online without disclosing personal informationthrough the ITVW system. In the virtual world of the ITVW system,graphics may be selected according to an original theme developed by anITVW user. A pre-existing theme may also be adopted by an ITVW user. Thevirtual world may be fully customizable. Examples of theme graphics area rain forest, the undersea, or outer space and may contain cartoon-likegraphics with some animation. The graphics in the virtual world may thenoverlay a real world geographical map. In one example, the overlay mayconvert an aerial view of an ITVW user's city or hometown into agraphical rendition of the real world city or hometown.

The ITVW system may be operable through a secure online website or aportal. The ITVW system may receive data originating at a trackingdevice. The tracking device may be worn or held by an ITVW user. Thetracking device may be a cell phone or some other personal trackingdevice. The tracking device transmits tracking information relating tothe ITVW user. The ITVW system may also receive data originating at afunction in an another system, such as a communication system. Thefunction may be any system which receives and communicates informationassociated with the tracking device. Examples of communication systemsincluding a function operable with a tracking device and the ITVW systeminclude a global positioning system (GPS) satellite system, a land-basedGPS and/or a Global System for Mobile Communications (GSM). Thesecommunication systems all have an enabled location tracking functionwhich is operable to provide an ITVW user's location information inaddition to other information associated with an ITVW user. The trackingdevice may communicate wirelessly with the function in thecommunications system using, for example, a cellular service. Otherforms of wireless communication may also be used.

The information from the tracking device and/or the communication systemfunction may include various types of location-based informationassociated with an ITVW user. Location-based information originatingfrom the tracking device may include an ITVW user's geographicalcoordinates at a discrete point in time, the ITVW user's velocity,elevation, movement direction and identity, time stamp, an ITVW user ID,any stored data from previous visits with an ITVW participant, timestamps, and/or rules for interacting with ITVW participants or the ITVWsystem. In addition, the communications system function may also providelocation information. This information may originate from the trackingdevice and/or the tracking function. Location information originatingfrom the communication system function may include an ITVW user ID, anystored data from previous visits with an ITVW participant, time stamps,and/or rules for interacting with ITVW participants or the ITVW systemin addition to information unique to the communication system such asparticipant ID, participant data, potential event data, or transactiondata associated with a visit.

The location information transmitted from the tracking device may bestored in a database or a memory utilized by the ITVW system. The ITVWdatabase may provide location information to the ITVW system inreal-time, at recurring intervals, or in response to an event or programroutine. The received location information may enable the ITVW system toactivate events in the virtual world of the ITVW system. The locationinformation delivered by the tracking device may be used in a number ofways.

One utilization is to enable a third party, such as a parent of an ITVWuser, to identify where the ITVW user may be located by displaying acurrent location and/or a location history on a map. The ITVW system mayprovide the parent with the ability to set up one or more “geofences”around the ITVW user. The geofence is a region or area in the ITVWsystem defined with a boundary line. Crossing the boundary line maycause or initiate an event in the ITVW system, such as triggering a pushnotification to the ITVW user and/or the parent. The geofence may betime or condition related. For example, the parent may elect to receivepush notifications when a ITVW child user takes a certain action, suchas leaving a school's grounds before the school closes. If a childleaves school early, the ITVW system may create an alert which is sentto a parent.

A user's location information in combination with the geofence functioncan influence or initiate events in a virtual game environment. Forexample, a geofence boundary and time conditions may be created by aparent to yield an event in the game. For example, creating a geofencearound a school grounds lasting from Sam to 3 pm. If the child with thetracking device enters school grounds before Sam and stays within thegeofence for the entire day until 3 pm, the ITVW child user may berewarded with points for arriving on time and spending the whole day atsch.

Another way the location information may be utilized in the ITVW systemis within a dynamic online gaming environment. In the dynamic gamingenvironment, as an ITVW user carrying a tracking device moves throughtheir real world environment, the tracking device transmits information.A function in a system may also transmit information. The transmittedinformation is received at the ITVW system. The received informationfrom the tracking device and/or communication system function maytrigger certain elements to change in the ITVW user's virtual onlineenvironment. The ITVW system may also utilize the received informationto interact with internal or external databases associated with businesslocations, historical places, government or municipal operatinglocations and/or other establishments within the community. Theseinteractions may generate events in an online game associated with theITVW system. The interaction events may be programmed, for example, bythe ITVW user, an ITVW system administrator, a parent or another thirdparty, such as one of the business establishments located in ageographical region associated with the ITVW user's virtual world.

Other examples of these events include the ITVW user stopping at an icecream store on the way home from school. The ITVW system generates anotice that the ice cream store is present or added to the virtual worldenvironment. This is a generated event in the game which may operate toopen a “magical door” which enables the ITVW child user to scoop icecream in the gaming environment. Arrangements for having the ice creamstore as an ITVW participant may be contracted in advance oraccomplished through a participant registration process. The participantregistration and the online game event are an advertising opportunityfor the ITVW participant. When the ITVW child user logs back into his orher online virtual game world, the ITVW child user's environment mayappear different based on where the child traveled in the physica world.

The online environment presented through the ITVW system may change innumber of ways. An ITVW user's GPS location may trigger a simple eventlike displaying an ITVW participant's business name and logo on a map ofthe virtual world in the game. The business logo may be a link toadvertise a promotion or offer something to the ITVW user, such a realand/or virtual souvenir. In another example, the GPS location may open agateway or create a link that gives access to a new section of thevirtual world. In other words, the link may give access to new games,new game world, social hubs, or downloadable content. It is the GPSdevice's location that opens the virtual world for the ITVW child userto enhance the virtual experience with the ITVW system. Each user's gameenvironment may be unique to each user depending on where the user hastraveled.

Participants may be business partners with the ITVW system. Theseparticipants have a new marketing channel specific to ITVW users(children and families) for brand promotion, education and entertainmentby using the ITVW system game environment as a new advertising medium.

The tracking device may store its daily interactions with locationfunctions, such as GPS and/or GSM. In this example, the tracking devicetransmits the information to a server housing the ITVW database.Programmed routines may then determine how the online virtualenvironment may be updated to reflect where the user has been. When theITVW user logs into their personalized virtual world associated with theITVW system, their profile may be updated providing additional ITVWactivities in their environment. Activities may be associated with aproduct or service provided by an ITVW participant. Examples includeplaying music in a virtual music store in the virtual environment of theITVW system if the ITVW user had recently visited a music store of anITVW participant, or watching a movie through the secure online websiteif the ITVW participant is associated with movie content.

An ITVW user may subscribe to the ITVW online game environment as anITVW user. The ITVW child user may purchase or obtain a tracking deviceand register it with the ITVW system. The GPS location informationtransmitted from the tracking device may be received at the ITVW systemand stored in an ITVW system database. This stored information may becross-referenced with select ITVW participants, such as businesses orother establishments. The information generated in the cross referencingmay activate parts of the virtual world environment. This provides theITVW user access to new ITVW system environment virtual locations. Thevirtual locations may provide, for example, promotions, games, andcontent within the virtual world.

According to an example, a child ITVW user may initiate ITVW systemactivity by logging into a website associated with the ITVW system. Ifthis is a first visit, the ITVW child user may choose a rainforestenvironment and select a monkey avatar. If the he has not developed alocation tracking history, he will see a few square miles of his hometown turned into an amusing version of the rainforest with streets thatlook like dirt paths and buildings that look like giant tropical flora.He may want to invite friend to be part of his group, and visit with hisfriends in the virtual world.

Once the ITVW child user develops a tracking history, some of thetropical flora may reveal business logos, links and information bubblesreflecting ITVW participant establishments in places that exist in thereal world and virtual establishments which appear for gaming purposes.In the virtual world, these businesses and places become unlocked,accessible, or open for business when visited by the child user, or someother system defined event occurs. The ITVW child user may click a linkand enter the virtual location to play games, receive promotions,download content and meet friends.

The ITVW system provides other benefits. The web environment may usetracking technology to grant access to games in an amusing, fancifulonline environment. For parents, knowing where their child is locatedbrings peace of mind. Should the child go missing, the parent has analternative way to find the child using the ITVW system. For the child,the online environment lends itself to being a fun social environmentwhere games are discovered based on their personal tracking historypresented in a treasure hunt like fashion. The ITVW system also providesan incentive for a child to carry a tracking device or cell phone.Themes in the ITVW system virtual environment themes may provide amethod of communicating educational messages.

An ITVW child user may also be a participant or even contribute contentor modifications to the virtual world through the ITVW system. In anexample, the child user creates a virtual version of her own home whichis accessible by invitation to her friends. Or the child user may createa virtual version of a school which might have homerooms that arecustomized by an authorized individual or group of ITVW system users.

For businesses as ITVW participants, the virtual environment creates achannel for child and family specific marketing. It also gives localbusinesses more advertising opportunities. The ITVW system may alsointeract with other online or virtual world gaming systems. The ITVWsystem may also be used to sell advertising at the local business leveland place the locations of the virtual world map. In another example, anITVW user may be charged a monthly subscription amount to access acertain number of games. Embedded downloadable content may also beprovided.

Below is a list of examples showing different methods by which locationinformation may be implemented through the ITVW system to change anonline gaming environment. In these examples, a tracking deviceutilizing the GPS system transmits location information to the ITVWsystem for a virtual online gaming environment.

A visit to the local museum may open a link on the game site to avirtual museum where the character avatars may paint and hang a pictureon the virtual wall.

A visit to the local music store may open a link in the game to avirtual music store that offers music downloads.

A visit to the local state park may offer a link to virtual park whereusers may learn about preservation and earn coins.

A visit to the local airport may open a link where users may catch avirtual flight to another virtual city.

A visit to the local toy store may open a link where users may downloada coupon.

A visit to a local book store may open a link that enables users to votefor a favorite book.

A visit to the playground may open a link to another virtual world.

These and other objects, features, and characteristics of the systemand/or method disclosed herein, as well as the methods of operation andfunctions of the related elements of structure and the combination ofparts and economies of manufacture, will become more apparent uponconsideration of the following description and the appended claims withreference to the accompanying drawings, all of which form a part of thisspecification, wherein like reference numerals designate correspondingparts in the various figures. It is to be expressly understood, however,that the drawings are for the purpose of illustration and descriptiononly and are not intended as a definition of the limits of theinvention. As used in the specification and in the claims, the singularform of “a”, “an”, and “the” include plural referents unless the contextclearly dictates otherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a virtual world system.

FIG. 2 illustrates a system configured to host a virtual space to usersthat reflects the real-world activities of the users.

FIG. 3 illustrates a graphical user interface presented to users tofacilitate customization of virtual space events that can be triggeredthrough real-world activities.

FIG. 4 illustrates a graphical user interface presented to users thatfacilitates customization of notifications that are triggered throughreal-world activities of virtual space users.

FIG. 5 illustrates a method of hosting a virtual space in which eventsmay be triggered by real-world activities of the users.

FIG. 6 illustrates a method of hosting a virtual space in whichnotifications to observers may be triggered by real-world activities oftarget users of the virtual space.

DETAILED DESCRIPTION

FIG. 1 illustrates an example of an ITVW system 10 including ITVWservers 109. The ITVW system 10 may receive input data from varioussources outside the ITVW system 10. An ITVW system child user 100 wearsa tracking device 101, which is registered in advance with the ITVWsystem 10. The tracking device 101 transmits location information via awireless link 102 and communications network 103 to a communicationsserver 104 which transmits the location information over the Internet108 to the ITVW system 10, where it is stored on the ITVW servers 109.The ITVW servers 109 include storage and software which prepare arepresentation of a virtual world. A representation of the virtual worldmay be transmitted from the ITVW system 10 to the Internet 108. Thetransmitted virtual world representation is received by an ITVW systemuser 107 via a communications network 105 and various human interfacedevices 106. The communications server 104 may also receive participantdata from ITVW system participants and transmit this over the Internet108 to the ITVW system 10.

FIG. 2 illustrates a system 200 configured to provide a virtual space tousers. System 200 may be configured such that the virtual space may beimpacted by real world actions of the users. Real-world actions of theusers may be tracked, for example, tracking the real-world locations ofthe users. Certain real-world actions may be incentivized by providing apositive impact associated with such real-world actions in the virtualspace. Information related to the real-world locations of the users maybe provided to supervisors of the users, such as parents and/or othersupervisors. Providing the virtual space may include hosting the virtualspace over a network.

In some implementations, system 200 may include a server 202. The server202 may be configured to communicate with one or more client computingplatforms 204 according to a client/server architecture. The users mayaccess system 200 and/or the virtual space via client computingplatforms 204.

Server 202 may be configured to execute one or more computer programmodules. The computer program modules may include one or more of a usermodule 206, a space module 208, a relationship module 210, a locationmodule 212, a space trigger module 214, a notification module 216,and/or other modules.

User module 206 may be configured to manage user information associatedwith users of system 200. The user information may include user accountsand/or other user information associated with users of the system 200.The user accounts and/or other user information may include informationstored by server 202, one or more of the client computing platforms 204,and/or other storage locations. The user accounts may include, forexample, information identifying users (e.g., a username or handle, anumber, an identifier, and/or other identifying information) within thevirtual space, security login information (e.g., a login code orpassword), virtual space account information, subscription information,virtual currency account information (e.g., related to currency held incredit for a user), relationship information (e.g., information relatedto relationships between users in the virtual space), virtual spaceusage information, demographic information associated with users,interaction history among users in the virtual space, information statedby users, purchase information of users, browsing history of users, aclient computing platform identification associated with a user, a phonenumber associated with a user, and/or other information related tousers.

The space module 208 may be configured to implement the instance of thevirtual space executed by the computer modules to determine views of thevirtual space. The views may then be communicated (e.g., via streaming,via object/position data, and/or other information) from server 202 toclient computing platforms 204 for presentation to users. The viewdetermined and transmitted to a given client computing platform 204 maycorrespond to a user character, or avatar, being controlled by a uservia the given client computing platform 204. The view determined andtransmitted to a given client computing platform 204 may correspond to alocation in the virtual space (e.g., the location from which the view istaken, the location the view depicts, and/or other locations), a zoomratio, a dimensionality of objects, a point-of-view, and/or viewparameters. One or more of the view parameters may be selectable by theuser.

The instance of the virtual space may comprise a simulated space that isaccessible by users via clients (e.g., client computing platforms 204)that present the views of the virtual space to a user. The simulatedspace may have a topography, express ongoing real-time interaction byone or more users, and/or include one or more objects positioned withinthe topography that are capable of locomotion within the topography. Insome instances, the topography may be a 2-dimensional topography. Inother instances, the topography may be a 3-dimensional topography. Thetopography may include dimensions of the space, and/or surface featuresof a surface or objects that are “native” to the space. In someinstances, the topography may describe a surface (e.g., a groundsurface) that runs through at least a substantial portion of the space.In some instances, the topography may describe a volume with one or morebodies positioned therein (e.g., a simulation of gravity-deprived spacewith one or more celestial bodies positioned therein). The instanceexecuted by the computer modules may be synchronous, asynchronous,and/or semi-synchronous.

The above description of the manner in which views of the virtual spaceare determined by space module 208 is not intended to be limiting. Thespace module 208 may be configured to express the virtual space in amore limited, or more rich, manner. For example, views determined forthe virtual space may be selected from a limited set of graphicsdepicting an event in a given place within the virtual space. The viewsmay include additional content (e.g., text, audio, pre-stored videocontent, and/or other content) that describes particulars of the currentstate of the place, beyond the relatively generic graphics. For example,a view may include a generic battle graphic with a textual descriptionof the opponents to be confronted. Other expressions of individualplaces within the virtual space are contemplated.

Within the instance(s) of the virtual space executed by space module208, users may control characters, objects, simulated physical phenomena(e.g., wind, rain, earthquakes, and/or other phenomena), and/or otherelements within the virtual space to interact with the virtual spaceand/or each other. The user characters may include avatars. As usedherein, the term “user character” may refer to an object (or group ofobjects) present in the virtual space that represents an individualuser, such as an avatar. The user character may be controlled by theuser with which it is associated. The user controlled element(s) maymove through and interact with the virtual space (e.g., non-usercharacters in the virtual space, other objects in the virtual space).The user controlled elements controlled by and/or associated with agiven user may be created and/or customized by the given user. The usermay have an “inventory” of virtual goods and/or currency that the usercan use (e.g., by manipulation of a user character or other usercontrolled element, and/or other items) within the virtual space.

The users may participate in the instance of the virtual space bycontrolling one or more of the available user controlled elements in thevirtual space. Control may be exercised through control inputs and/orcommands input by the users through client computing platforms 204. Theusers may interact with each other through communications exchangedwithin the virtual space. Such communications may include one or more oftextual chat, instant messages, private messages, voice communications,and/or other communications. Communications may be received and enteredby the users via their respective client computing platforms 204.Communications may be routed to and from the appropriate users throughserver 202 (e.g., through space module 208).

The relationship module 210 may be configured to establish relationshipsbetween users within the virtual 210. Such relationships may include oneor more of friendships, guilds (with guild-mates), alliances,connections, followers, and/or other relationships. The relationshipmodule 210 may establish relationships based on relationship requestsand acceptances received from users. Establishment of a relationship maybe initiated by a single communication (e.g., a request) initiated by agiven user requesting a relationship between the given user and one ormore other users. Establishment of a relationship may require a firstcommunication from the given user to be approved by the one or moreother users. Relationships may include one or more types ofrelationships that have a functional purpose or impact within thevirtual space, and/or one or more types of relationships that a socialconstruct within the virtual space that does not have a functionalresult.

In some implementations, one of the classes of relationships provided bya system 200 may include an observer/target relationship. An observermay include a user that has privileges within the virtual space and/orsystem 200 generally to observe information related to use of system 200by one or more target users. For example, an observer may be a parentthat has privileges that facilitate observation of information relatedto user of system 200 by one or more of the parents children, which maybe target users. As is described herein, in some implementations, anobserver may have control over the access of a target to the virtualspace, use of the virtual space by the target, and/or control over theexperience of the target within the virtual space. An observer/targetrelationship may be established between users at the time of useraccount creation (e.g., by a parent or guardian authorizing the newaccount of a child user), and/or at other times.

Location module 212 may be configured to obtain location informationindicating the real-world locations of the users of system 200 (e.g., asdescribed above, or elsewhere herein). Location module 212 may beconfigured to obtain such location information from devices beingcarried by the users. In some implementations, the devices may includeclient computing platforms 204, and/or other devices (e.g., dedicatedtracking/geolocation devices). The location information may includeinformation obtained by the devices, and then communicated to locationmodule server 202 (e.g., wirelessly). The location information mayindicate times at which the users were at the indicated locations.

Space trigger module 214 may be configured to trigger events within thevirtual space based on the location information obtained by locationmodule 212. By way of illustration, a first event may be triggered basedon a first user breaching a geofence surrounding or associated with alocation in the real-world. Determination that the first user hasbreached the geofence may be made by space trigger module 214 based onlocation information for the first user. The first event may have animpact within the virtual space. The impact may include, for example, anaward (or loss) of points, gold, experience points, gems, jewels, and/orother virtual currency; unlocking of content within the virtual space(e.g., one or more additional areas, buildings, rooms, and/or othercontent); reception of a virtual item; alteration of the visualexpression of the virtual space in views provided to the user (e.g.,with the addition of branding or badges in the views), and/or otherimpacts. One or more impacts of the first event triggered by spacetrigger module 214 may be apparent in the views of the virtual spaceprovided to the first user by space module 208. One or more of theimpacts of the first event may apparent in views of the virtual spaceprovided to other users by space module 208. For example, an avatarassociated with the first user may bear a visual indicator (and/or someother indicator) of one or more impacts of the first event.

The triggering of the first event may be conditioned on a time at whichthe geofence was breached. For example, there may be a time periodduring which the breach of geofence results in the triggering of thefirst event. As an example, there may be a time period during whichbreach of the geofence does not result in the triggering of the firstevent (e.g., if it would otherwise).

Space trigger module 214 may be configured such that one or more of theevents, the circumstances that cause the one or more events, the impactof the one or more events, and/or other aspects of the one or moreevents are configured by users. For example, an observer may configureone or more events that incentivize a target user (e.g., with positiveor desirable impacts in the virtual space) to perform real-world tasks.As another example, a real-world merchant, brand, or service providermay configure one or more events that incentivize users generally toperform real-world tasks that are beneficial to the real-world merchant,brand, or service provider (e.g., visit a place of business and/or othertasks). Space trigger module 214 may be configured such thatconfiguration of an event may require monetary compensation from theuser configuring the event. Space trigger module 214 may be configuredto provide a user interface to users that facilitates the configurationof an event to be triggered by space trigger module 214.

By way of illustration, FIG. 3 illustrates a view 220 of a graphicaluser interface provided to users to configure an event in the virtualspace. View 220 may include a title field 222, a user field 224, one ormore trigger parameter fields 226, one or more event impact fields 228,and/or other fields or information. Title field 222 may be configured toreceive entry and/or selection of a title for the event. User field 224may be configured to receive entry and/or selection of a user (or groupof users) for whom the event may be triggered in the virtual space.Entry and/or selection of a user (or group of users) may include one ormore specification of a specific user, specification of one or morecharacteristics of users, and/or other specifications. Trigger parameterfields 226 may be configured to receive entry and/or selection of one ormore trigger parameter that are used to trigger the event. A triggerparameter may include an real-world location parameter, an real-worldtime parameter, and/or other parameter. Even impact fields 228 may beconfigured to receive entry and/or selection of the parameter of theimpact of the event. Provision of view 220 to users of a system (e.g.,such as system 200) may enhance the engagement of users with the virtualspace, may enhance user control and/or customization of the userexperience, and/or may provide other enhancements to the virtual space.

Returning to FIG. 2, notification module 216 may be configured toprovide notifications to observers related to the real-world activitiesof the corresponding target users. Notification module 216 may triggernotifications based on the location information for the target usersobtained by space trigger module 214. For example, a first notificationto a first observer may be triggered responsive to a first target userbreaching a geofence surrounding or associated with a location in thereal-world. Determination that the first user has breached the geofencemay be made by notification module 216 based on location information forthe first target user. The first notification may indicate to the firstobserver the breaching of the geofence. The notification may include aphone call, an email, a text message (e.g., an SMS message or other textmessage), a message within the virtual space, a message in a socialnetworking platform (e.g., Facebook®, MySpace®, OpenFeint, and/or othersocial networking platforms), a game center message, a micro-bloggingservice message (e.g., such as a message in the platform provided byTwitter®, the platform provided by Tumblr®, and/or other micro-bloggingplatforms), and/or other notifications.

The triggering of the first notification may be conditioned on a time atwhich the geofence was breached. For example, there may be a time periodduring which the breach of geofence results in the triggering of thefirst notification. As an example, there may be a time period duringwhich breach of the geofence does not result in the triggering of thefirst notification (e.g., if it would otherwise).

Notification module 216 may be configured such that one or more of thenotifications, the circumstances that cause the one or morenotifications, the impact of the one or more notifications, and/or otheraspects of the one or more notifications are configured by users (e.g.,the observers). For example, an observer may configure one or morenotifications for one or more specific target users to monitor thereal-world activities of the one or more specific target users.Notification module 216 may be configured to provide a user interface toobservers that facilitates the configuration of a notification to betriggered by notification module 216.

By way of illustration, FIG. 4 illustrates a view 230 of a graphicaluser interface provided to users to configure an event in the virtualspace. View 230 may include a title field 232, a target user field 234,one or more trigger parameter fields 236, one or more notificationdelivery fields 238, and/or other fields or information. Title field 232may be configured to receive entry and/or selection of a title for thenotification. Target user field 234 may be configured to receive entryand/or selection of a target user (or group of target users) for whomthe notification may be triggered in the virtual space. Entry and/orselection of a target user (or group of target users) may include one ormore specification of a specific target user, specification of one ormore characteristics of target users, and/or other specifications.Trigger parameter fields 236 may be configured to receive entry and/orselection of one or more trigger parameter that are used to trigger thenotification. A trigger parameter may include an real-world locationparameter, an real-world time parameter, and/or other parameter.Notification delivery fields 238 may be configured to receive entryand/or selection of the form in which the notification should bedelivered to the observer. Provision of view 230 to observer users of asystem (e.g., such as system 200) may provide a practical mechanism formonitoring the real-world activities of target users that is engagingand rewarding for the target users. This may enhance the likelihood oftarget users agreeing to participate in the monitoring activity, and/orprovide other enhancements.

Returning to FIG. 2, In some implementations, server 202, clientcomputing platforms 204, location devices (if separate from clientcomputing platforms 204, not shown), and/or external resources 240 maybe operatively linked via one or more electronic communication links.For example, such electronic communication links may be established, atleast in part, via a network such as the Internet and/or other networks.It will be appreciated that this is not intended to be limiting, andthat the scope of this disclosure includes implementations in whichservers 202, client computing platforms 204, and/or external resources240 may be operatively linked via some other communication media.

A given client computing platform 204 may include one or more processorsconfigured to execute computer program modules. The computer programmodules may be configured to enable an expert or user associated withthe given client computing platform 204 to interface with system 200and/or external resources 240, and/or provide other functionalityattributed herein to client computing platforms 204. By way ofnon-limiting example, the given client computing platform 204 mayinclude one or more of a desktop computer, a laptop computer, a handheldcomputer, a NetBook, a Smartphone, a gaming console, and/or othercomputing platforms.

The external resources 240 may include sources of information, hostsand/or providers of virtual environments outside of system 200, externalentities participating with system 200, and/or other resources. In someimplementations, some or all of the functionality attributed herein toexternal resources 38 may be provided by resources included in system200.

The server 202 may include electronic storage 242, one or moreprocessors 244, and/or other components. The server 202 may includecommunication lines, or ports to enable the exchange of information witha network and/or other computing platforms. Illustration of server 202in FIG. 2 is not intended to be limiting. The server 202 may include aplurality of hardware, software, and/or firmware components operatingtogether to provide the functionality attributed herein to server 202.For example, server 202 may be implemented by a cloud of computingplatforms operating together as server 202.

Electronic storage 242 may comprise electronic storage media thatelectronically stores information. The electronic storage media ofelectronic storage 242 may include one or both of system storage that isprovided integrally (i.e., substantially nonremovable) with server 202and/or removable storage that is removably connectable to server 202via, for example, a port (e.g., a USB port, a firewire port, etc.) or adrive (e.g., a disk drive, etc.). Electronic storage 242 may include oneor more of optically readable storage media (e.g., optical disks, etc.),magnetically readable storage media (e.g., magnetic tape, magnetic harddrive, floppy drive, etc.), electrical charge-based storage media (e.g.,EEPROM, RAM, etc.), solid-state storage media (e.g., flash drive, etc.),and/or other electronically readable storage media. The electronicstorage 242 may include one or more virtual storage resources (e.g.,cloud storage, a virtual private network, and/or other virtual storageresources). Electronic storage 242 may store software algorithms,information determined by processor 244, information received fromserver 202, information received from client computing platforms 204,and/or other information that enables server 202 to function properly.

Processor(s) 244 is configured to provide information processingcapabilities in server 202. As such, processor 244 may include one ormore of a digital processor, an analog processor, a digital circuitdesigned to process information, an analog circuit designed to processinformation, a state machine, and/or other mechanisms for electronicallyprocessing information. Although processor 244 is shown in FIG. 2 as asingle entity, this is for illustrative purposes only. In someimplementations, processor 244 may include a plurality of processingunits. These processing units may be physically located within the samedevice, or processor 244 may represent processing functionality of aplurality of devices operating in coordination. The processor 244 may beconfigured to execute modules 206, 208, 210, 212, 214, and/or 216.Processor 244 may be configured to execute modules 206, 208, 210, 212,214, and/or 216 by software; hardware; firmware; some combination ofsoftware, hardware, and/or firmware; and/or other mechanisms forconfiguring processing capabilities on processor 244.

It should be appreciated that although modules 206, 208, 210, 212, 214,and/or 216 are illustrated in FIG. 2 as being co-located within a singleprocessing unit, in implementations in which processor 244 includesmultiple processing units, one or more of modules 206, 208, 210, 212,214, and/or 216 may be located remotely from the other modules. Thedescription of the functionality provided by the different modules 206,208, 210, 212, 214, and/or 216 described below is for illustrativepurposes, and is not intended to be limiting, as any of modules 206,208, 210, 212, 214, and/or 216 may provide more or less functionalitythan is described. For example, one or more of modules 206, 208, 210,212, 214, and/or 216 may be eliminated, and some or all of itsfunctionality may be provided by other ones of modules 206, 208, 210,212, 214, and/or 216. As another example, processor 244 may beconfigured to execute one or more additional modules that may performsome or all of the functionality attributed below to one of modules 206,208, 210, 212, 214, and/or 216.

FIG. 5 illustrates a method 250 of hosting a virtual space in whichevents may be triggered by real-world activities of the users. Theoperations of method 250 presented below are intended to beillustrative. In some embodiments, method 250 may be accomplished withone or more additional operations not described, and/or without one ormore of the operations discussed. Additionally, the order in which theoperations of method 250 are illustrated in FIG. 5 and described belowis not intended to be limiting.

In some embodiments, method 250 may be implemented in one or moredesigned to process information, an analog circuit designed to processinformation, a state machine, and/or other mechanisms for electronicallyprocessing information). The one or more processing devices may includeone or more devices executing some or all of the operations of method250 in response to instructions stored electronically on an electronicstorage medium. The one or more processing devices may include one ormore devices configured through hardware, firmware, and/or software tobe specifically designed for execution of one or more of the operationsof method 250.

At an operation 252, event information related to a first event may beobtained. The event information may include one or more triggerparameters, one or more event impacts, a title, a user, and/or otherinformation. The event information may be obtained, for example througha user interface presented to users to configure customized events. Insome implementations, operation 252 may be performed by a space triggermodule the same as or similar to space trigger module 214 (shown in FIG.2 and described herein).

At an operation 254, user location information for a first user may beobtained. the user location information may indicate a real-worldlocation of the first user. The user location information may includetime information. In some implementations, operation 254 may beperformed by a location module the same as or similar to location module212 (shown in FIG. 2 and described herein).

At an operation 256, the first event may be triggered for the first userbased on the obtained user location information. The first event may betriggered responsive to the obtained user location informationindicating the first user has satisfied event criteria specified by theevent information obtained at operation 252. In some implementations,operation 256 may be performed by a space trigger module the same as orsimilar to space trigger module 214 (shown in FIG. 2 and describedherein).

At an operation 258, responsive to the triggering of the first event,event impact associated with the first event may be manifested for thefirst user in the virtual space. The impact may include, withoutlimitation, an award, a change in the visual depiction of the virtualspace, an enhance access to content in the virtual space, and/or otherimpacts in the virtual space. The impact may be dictated by the eventinformation obtained at operation 252. In some implementations,operation 258 may be performed by a space trigger module the same as orsimilar to space trigger module 214 (shown in FIG. 2 and describedherein) in conjunction with a space module the same as or similar tospace module 208 (shown in FIG. 2 and described herein).

FIG. 6 illustrates a method 260 of hosting a virtual space in whichnotifications to observers may be triggered by real-world activities oftarget users of the virtual space. The virtual space may include eventstriggered based on the real-world activities of the target users (e.g.,according to method 250 shown in FIG. 5) in order to enhanceparticipation in the monitoring by the target users. The operations ofmethod 260 presented below are intended to be illustrative. In someembodiments, method 260 may be accomplished with one or more additionaloperations not described, and/or without one or more of the operationsdiscussed. Additionally, the order in which the operations of method 260are illustrated in FIG. 6 and described below is not intended to belimiting.

In some embodiments, method 260 may be implemented in one or moreprocessing devices (e.g., a digital processor, an analog processor, adigital circuit designed to process information, an analog circuitdesigned to process information, a state machine, and/or othermechanisms for electronically processing information). The one or moreprocessing devices may include one or more devices executing some or allof the operations of method 260 in response to instructions storedelectronically on an electronic storage medium. The one or moreprocessing devices may include one or more devices configured throughhardware, firmware, and/or software to be specifically designed forexecution of one or more of the operations of method 260.

At an operation 262, notification information related to a firstnotification may be obtained. The notification information may includeone or more trigger parameters, one or more delivery mechanisms, atitle, a target user, and/or other information. The notificationinformation may be obtained, for example through a user interfacepresented to a first observer to configure customized notifications. Insome implementations, operation 262 may be performed by a notificationmodule the same as or similar to notification module 216 (shown in FIG.2 and described herein).

At an operation 264, user location information for a first target usermay be obtained. the user location information may indicate a real-worldlocation of the first target user. The user location information mayinclude time information. In some implementations, operation 264 may beperformed by a location module the same as or similar to location module212 (shown in FIG. 2 and described herein).

At an operation 266, the first notification may be triggered based onthe obtained user location information. The first notification may betriggered responsive to the obtained user location informationindicating the first target user has satisfied event criteria specifiedby the notification information obtained at operation 262. In someimplementations, operation 266 may be performed by a notification modulethe same as or similar to notification module 216 (shown in FIG. 2 anddescribed herein).

At an operation 268, responsive to the triggering of the firstnotification, notification may be transmitted to the first observer. Thenotification may include an email, a text message, a virtual spacemessage, a phone call, and/or other messages or notifications. Thenotification may indicate the first notification has been triggered. Insome implementations, operation 268 may be performed by a notificationmodule the same as or similar to notification module 216 (shown in FIG.2 and described herein).

Although the present technology has been described in detail for thepurpose of illustration based on what is currently considered to be themost practical and preferred implementations, it is to be understoodthat such detail is solely for that purpose and that the technology isnot limited to the disclosed implementations, but, on the contrary, isintended to cover modifications and equivalent arrangements that arewithin the spirit and scope of the appended claims. For example, it isto be understood that the present technology contemplates that, to theextent possible, one or more features of any implementation can becombined with one or more features of any other implementation.

What is claimed is:
 1. A system configured to trigger events in a clientapplication, the system comprising: one or more processors configured toexecute computer program modules to: obtain real-world locationinformation specifying a real-world location of a first user; obtainuser information specifying a status of the first user, the status ofthe first user reflecting user participation in an event triggeredwithin an interactive client application hosted over the network; obtainevent information defining event requirements for triggering the eventwithin the interactive client application hosted over the network, theevent information specifying real-world location criteria and one ormore user requirements; compare the real-world location of the firstuser as specified by the real-world location information for the firstuser with the real-world location criteria for the event to determinewhether the real-world location of the first user as specified by thereal-world location information for the first user satisfies thereal-world location criteria by being within the set of real-worldlocations defined by the real-world location criteria; compare thestatus of the first user as specified by the user information for thefirst user with the one or more user requirements of the eventrequirements to determine whether the status of the first user satisfiesthe one or more user requirements; and responsive to the real worldlocation of the first user as specified by the real-world locationinformation of the event requirements satisfying the real-world locationcriteria and the status of the first user satisfying the one or moreuser requirements for the event, triggering the event for the first userin the client application; wherein obtaining the event information forthe event triggered for the first user includes obtaining the eventinformation that defines the real-world location criteria and the one ormore user requirements via a graphical user interface configured toreceive entry or selection of the event information from a second userthat is different from the first user.
 2. The system of claim 1, whereinthe computer program modules further configured to obtain notificationinformation defining real-world location criteria and one or more userrequirements that will trigger a notification within an interactiveclient application hosted over a network, to compare the real-worldlocation information for the first user with the real-world locationcriteria and user information with the one or more user requirements forthe notification, and, responsive to the real-world location informationindicating the first user has satisfied the real-world location criteriafor the notification and user information indicating the first user hassatisfied the one or more user requirements for the notification,transmitting a notification transmission to an observer of the firstuser.
 3. The system of claim 2, wherein the real-world location criteriafor the notification is different from the real-world location criteriafor the event.
 4. The system of claim 2, wherein the real-world criteriafor the notification is the same as the real-world criteria for theevent.
 5. The system of claim 1, wherein obtaining notificationinformation defining real-world location criteria that will trigger anotification is configured to obtain the notification information via agraphical user interface configured to receive entry or selection of thenotification information from the observer.
 6. The system of claim 1,wherein the notification transmission includes one or more of an email,a message in a social networking platform, a message in a micro-bloggingservice, a text message, a phone call, or a client application message.7. The system of claim 1, wherein the user requirement includes aregistered participant.
 8. A system configured to trigger themanifestation of one or more impacts in a client application, the systemcomprising: one or more processors configured to execute computerprogram modules to: obtain real-world location information specifying areal-world location of a first user; obtain user information specifyinga status of the first user, the status of the first user reflecting thefirst user's acceptance of a manifestation of one or more impactstriggered within an interactive client application hosted over thenetwork; obtain impact information defining impact requirements fortriggering the manifestation of one or more impacts within theinteractive client application hosted over a network, the impactinformation specifying real-world location criteria and one or more userrequirements, the real-world location criteria defining a set ofreal-world locations; compare real-world location information thatindicates the real-world location of the first user with the real-worldlocation criteria for the one or more impacts to determine whether thereal-world location of the first user as specified by the real-worldlocation information for the first user satisfies the real-worldlocation criteria by being within the set of real-world locationsdefined by the real-world location criteria; compare the status of thefirst user as specified by the user information for the first user withthe one or more user requirements for the one or more impacts todetermine whether the status of the first user satisfies the one or moreuser requirements; and responsive to the real-world location informationthe real world location of the first user satisfying the real-worldlocation criteria and the user information of the first user satisfyingthe one or more user requirements for the one or more impacts,triggering the manifestation of the one or more impacts in the clientapplication for the first user; wherein obtaining the impact informationthat defines the real-world location criteria for the real-worldlocation criteria and the one or more user requirements triggered forthe first user including obtaining the one or more impacts via agraphical user interface configured to receive entry or selection of theone or more impacts from a second user.
 9. The system of claim 8,wherein obtaining impact information defining real-world locationcriteria and one or more user requirements that will trigger amanifestation of one or more impacts is configured such that the one ormore impacts are only apparent in views of the client applicationprovided to the first user.
 10. The system of claim 8 wherein obtainingimpact information defining real-world location criteria and one or moreuser requirements that will trigger a manifestation of one or moreimpacts is configured such that the one or more impacts are apparent inviews of the client application provided to a third user.
 11. Acomputer-implemented method of triggering events a client application,the method being implemented in a computer system that includes one ormore processors configured to execute computer program modules, themethod comprising: obtaining real-world location information specifyinga real-world location of a first user; obtaining user informationspecifying a status of the first user, the status of the first userreflecting the first user's acceptance of a notification transmissionwithin an interactive client application hosted over the network;obtaining notification information defining notification requirementsfor transmitting the notification within the interactive clientapplication hosted over the network, the notification requirementsspecifying real-world location criteria and one or more userrequirements, the real-world location criteria defining a set ofreal-world locations; comparing the real-world location information forthe first user with the real-world location criteria for thenotification to determine whether the real-world location of the firstuser as specified by the real-world location information for the firstuser satisfies the real-world location criteria by being within the setof real-world locations defined by the real-world location criteria;comparing the status of the first user as specified by the userinformation for the first user with the one or more user requirementsfor the notification to determine whether the status of the first usersatisfies the one or more user requirements; and responsive to the realworld location of the first user as specified by the real-world locationinformation satisfying the real-world location criteria for thenotification and the status of the first user satisfying the one or moreuser requirements for the notification, transmitting the notificationtransmission to an observer of the first user.
 12. The method of claim11, further comprising: obtaining event information defining real-worldlocation criteria and one or more user requirements that will trigger anevent within the client application; comparing the real-world locationinformation for the first user with the real-world location criteria forthe event; comparing the user information for the first user with theone or more user requirements for the event; and responsive to thereal-world location information indicating the first user has satisfiedthe real-world location criteria and the status of the first usersatisfying the one or more user requirements for the event, triggeringthe event for the first user in the client application, wherein theevent information for the event triggered for the first user is obtainedvia a graphical user interface configured to receive entry or selectionof the event information from the a second user that is different fromthe first user.
 13. The method of claim 12, wherein the real-worldlocation criteria and one or more user requirements for the notificationare different from the real-world location criteria and one or more userrequirements for the event.
 14. The method of claim 12, wherein thereal-world criteria for the notification and one or more userrequirements are the same as the real-world criteria and one or moreuser requirements for the event.
 15. The method of claim 11, wherein thenotification information is obtained via a graphical user interfaceconfigured to receive entry or selection of the notification informationfrom the observer.
 16. The method of claim 11, wherein the notificationtransmission includes one or more of an email, a message in a socialnetworking platform, a message in a micro-blogging service, a textmessage, a phone call, or a client application message.
 17. The methodof claim 11, wherein the user requirement includes a registeredparticipant.
 18. The method of claim 12, wherein the observer is thesecond user.