US20070143119A1 - Probability adjustment of a virtual world loss event - Google Patents
Probability adjustment of a virtual world loss event Download PDFInfo
- Publication number
- US20070143119A1 US20070143119A1 US11/238,684 US23868405A US2007143119A1 US 20070143119 A1 US20070143119 A1 US 20070143119A1 US 23868405 A US23868405 A US 23868405A US 2007143119 A1 US2007143119 A1 US 2007143119A1
- Authority
- US
- United States
- Prior art keywords
- loss
- participant
- virtual world
- occurrence
- event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q90/00—Systems or methods specially adapted for administrative, commercial, financial, managerial or supervisory purposes, not involving significant data processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0222—During e-commerce, i.e. online transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3244—Payment aspects of a gaming system, e.g. payment schemes, setting payout ratio, bonus or consolation prizes
- G07F17/3255—Incentive, loyalty and/or promotion schemes, e.g. comps, gaming associated with a purchase, gaming funded by advertisements
Definitions
- An embodiment provides a computer-implemented system.
- the computer-implemented system includes a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence.
- the computer-implemented system also includes a record of a protected loss corresponding to the loss event, the protected loss described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant.
- the computer-implemented system further includes a loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss.
- the system includes a computing system couplable to a network and operable to interact with at least two participants via the network.
- the system also includes a program module operable to manage a virtual world that includes a loss event having a probability of occurrence.
- the system further includes a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants (hereafter “the participant”).
- the system also includes a loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss.
- a further embodiment provides a computer-implemented method.
- the computer-implemented method includes managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world.
- the method also includes selecting a protected loss corresponding to the at least one loss event.
- the protected loss being described in an agreement that includes an obligation of a protection entity to provide a benefit to a participant of at least one participant upon an occurrence of the selected protected loss in the virtual world.
- the method further includes modifying the incidence of the at least one loss event in response to the selected protected loss.
- FIG. 1 illustrates an exemplary system in which embodiments may be implemented, including a thin computing device
- FIG. 2 illustrates another exemplary system in which embodiments may be implemented, including a general-purpose computing device
- FIG. 3 illustrates a partial view of an exemplary system
- FIG. 4 illustrates an exemplary environment that includes a partial view of a system
- FIG. 5 illustrates an exemplary operational flow
- FIG. 6 illustrates an alternative embodiment of the exemplary operational flow of FIG. 5 ;
- FIG. 7 illustrates another alternative embodiment of the exemplary operational flow of FIG. 5 ;
- FIG. 8 illustrates a partial view of an exemplary computer-program product
- FIG. 9 illustrates a partial view of an exemplary environment in which embodiments may be implemented.
- FIG. 10 illustrates a partial view of an environment in which embodiments may be implemented
- FIG. 11 illustrates a partial view of an exemplary networked environment
- FIG. 12 illustrates an exemplary operational flow
- FIG. 13 illustrates an alternative embodiment of the exemplary operational flow of FIG. 12 ;
- FIG. 14 illustrates another alternative embodiment of the exemplary operational flow of FIG. 12 ;
- FIG. 15 illustrates a partial view of an exemplary computer-program product
- FIG. 16 illustrates an exemplary operational flow
- FIG. 17 illustrates an alternative embodiment of the exemplary operational flow of FIG. 16 ;
- FIG. 18 illustrates another alternative embodiment of the exemplary operational flow of FIG. 16 ;
- FIG. 19 illustrates a further alternative embodiment of the exemplary operational flow of FIG. 16 ;
- FIG. 20 illustrates an alternative embodiment of the exemplary operational flow of FIG. 16 ;
- FIG. 21 illustrates another alternative embodiment of the exemplary operational flow of FIG. 16 ;
- FIG. 22 illustrates a partial view of an exemplary system
- FIG. 23 illustrates a partial view of an exemplary computer-program product
- FIG. 24 illustrates an exemplary schematic timing diagram of risk management opportunities that are possible in a virtual world environment among participants and entities
- FIG. 25 illustrates a partial view of a system in which embodiments may be implemented
- FIG. 26 illustrates a partial view of an exemplary system in which embodiments may be implemented
- FIG. 27 illustrates an exemplary operational flow in which embodiments may be implemented
- FIG. 28 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented
- FIG. 29 illustrates a partial view of an exemplary system in which embodiments may be implemented
- FIG. 30 illustrates a partial view of an exemplary system in which embodiments may be implemented
- FIG. 31 illustrates an exemplary operational flow in which embodiments may be implemented
- FIG. 32 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented
- FIG. 33 illustrates a partial view of an exemplary article of manufacture in which embodiments may be implemented
- FIG. 34 illustrates a partial view of an exemplary system in which embodiments may be implemented
- FIG. 35 illustrates an exemplary operational flow in which embodiments may be implemented
- FIG. 36 illustrates an alternative embodiment of the operational flow of FIG. 35 ;
- FIG. 37 illustrates an alternative embodiment of the operational flow of FIG. 35 ;
- FIG. 38 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented
- FIG. 39 illustrates a partial view of an exemplary system in which embodiments may be implemented.
- FIG. 40 illustrates an alternative embodiment of the instructions of the exemplary system of FIG. 39 ;
- FIG. 41 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented
- FIG. 42 illustrates an exemplary operational flow in which embodiments may be implemented
- FIG. 43 illustrates a partial view of an exemplary system in which embodiments may be implemented
- FIG. 44 illustrates a partial view of an exemplary system in which embodiments may be implemented
- FIG. 45 illustrates an exemplary operational flow in which embodiments may be implemented
- FIG. 46 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented
- FIG. 47 illustrates a partial view of a system in which embodiments may be implemented
- FIG. 48 illustrates a partial view of an exemplary system in which embodiments may be implemented
- FIG. 49 illustrates an exemplary operational flow in which embodiments may be implemented
- FIG. 50 illustrates an alternative embodiment of the exemplary operational flow of FIG. 49 ;
- FIG. 51 illustrates another alternative embodiment of the exemplary operational flow of FIG. 49 .
- FIG. 52 illustrates a further alternative embodiment of the exemplary operational flow of FIG. 49 .
- FIGS. 1 and 2 are intended to provide a brief, general description of an illustrative and/or suitable exemplary environment in which embodiments may be implemented.
- An exemplary system may include a thin computing device 20 of FIG. 1 or the computing system environment 100 of FIG. 2 .
- FIGS. 1 and 2 are examples of environments and are not intended to suggest any limitation as to the structure, scope of use, or functionality of an embodiment.
- An embodiment should not be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in an exemplary operating environment. For example, in certain instances, elements of an environment may be deemed not necessary and omitted. In other instances, other elements may be deemed necessary and added.
- FIG. 1 illustrates an exemplary system that includes a thin computing device 20 that interfaces with an electronic device (not shown) that may include one or more functional elements 51 .
- the electronic device may include any item having electrical and/or electronic components playing a role in a functionality of the item, such as a limited resource computing device, a game console, a digital camera, a cell phone, a printer, a refrigerator, a car, and an airplane.
- the thin computing device 20 includes a processing unit 21 , a system memory 22 , and a system bus 23 that couples various system components including the system memory 22 to the processing unit 21 .
- the system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
- the system memory includes read-only memory (ROM) 24 and random access memory (RAM) 25 .
- ROM read-only memory
- RAM random access memory
- a basic input/output system (BIOS) 26 containing the basic routines that help to transfer information between sub-components within the thin computing device 20 , such as during start-up, is stored in the ROM 24 .
- a number of program modules may be stored in the ROM 24 and/or RAM 25 , including an operating system 28 , one or more application programs 29 , other program modules 30 , and program data 31 .
- a user may enter commands and information into the computing device 20 through input devices, such as a number of switches and buttons, illustrated as hardware buttons 44 , connected to the system via a suitable interface 45 .
- Input devices may further include a touch-sensitive display screen 32 with suitable input detection circuitry 33 .
- the output circuitry of the touch-sensitive display 32 is connected to the system bus 23 via a video driver 37 .
- Other input devices may include a microphone 34 connected through a suitable audio interface 35 , and a physical hardware keyboard (not shown).
- the computing device 20 may include other peripheral output devices, such as at least one speaker 38 .
- Other external input or output devices 39 may be connected to the processing unit 21 through a USB port 40 and USB port interface 41 , to the system bus 23 .
- the other external input and output devices 39 may be connected by other interfaces, such as a parallel port, game port or other port.
- the computing device 20 may further include or be capable of connecting to a flash card memory (not shown) through an appropriate connection port (not shown).
- the computing device 20 may further include or be capable of connecting with a network through a network port 42 and network interface 43 , and/or through wireless port 46 and corresponding wireless interface 47 . Such a connection may be provided to facilitate communication with other peripheral devices, including other computers, printers, and so on (not shown). It will be appreciated that the various components and connections shown are exemplary and other components and means of establishing communications links may be used.
- the computing device 20 may be primarily designed to include a user interface having a character, key-based, other user data input via the touch sensitive display 32 using a stylus (not shown).
- the user interface is not limited to an actual touch-sensitive panel arranged for directly receiving input, but may alternatively or in addition respond to another input device, such as the microphone 34 .
- spoken words may be received at the microphone 34 and recognized.
- the computing device 20 may be designed to include a user interface having a physical keyboard (not shown).
- the device functional elements are typically application specific and related to a function of the electronic device.
- the device functional elements are driven by a device functional element(s) interface 50 , which coupled with the system bus 23 .
- a functional element may typically perform a single well-defined task with little or no user configuration or setup, such as a refrigerator keeping food cold, a cell phone connecting with an appropriate tower and transceiving voice or data information, and a camera capturing and saving an image.
- FIG. 2 illustrates another exemplary system in which embodiments may be implemented.
- FIG. 2 illustrates a general-purpose computing system, shown as a computing system environment 100 .
- Components of the computing system environment 100 may include, but are not limited to, a computing device 110 having a processing unit 120 , a system memory 130 , and a system bus 121 that couples various system components including the system memory to the processing unit 120 .
- the system bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
- such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, also known as Mezzanine bus.
- ISA Industry Standard Architecture
- MCA Micro Channel Architecture
- EISA Enhanced ISA
- VESA Video Electronics Standards Association
- PCI Peripheral Component Interconnect
- Computer-readable media may include any media that can be accessed by the computing device 110 and include both volatile and nonvolatile media, removable and non-removable media.
- Computer-readable media may include computer storage media and communications media.
- Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.
- Computer storage media include, but are not limited to, random-access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory, or other memory technology, CD-ROM, digital versatile disks (DVD), or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage, or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computing device 110 .
- Communications media typically embody computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communications media include wired media such as a wired network and a direct-wired connection and wireless media such as acoustic, RF, optical, and infrared media. Combinations of any of the above should also be included within the scope of computer-readable media.
- the system memory 130 includes computer storage media in the form of volatile and nonvolatile memory such as ROM 131 and RAM 132 .
- a basic input/output system (BIOS) 133 containing the basic routines that help to transfer information between elements within the computing device 110 , such as during start-up, is typically stored in ROM 131 .
- RAM 132 typically contains data and program modules that are immediately accessible to or presently being operated on by processing unit 120 .
- FIG. 2 illustrates an operating system 134 , application programs 135 , other program modules 136 , and program data 137 .
- the operating system 134 offers services to applications programs 135 by way of one or more application programming interfaces (APIs) (not shown). Because the operating system 134 incorporates these services, developers of applications programs 135 need not redevelop code to use the services. Examples of APIs provided by operating systems such as Microsoft's “WINDOWS” are well known in the art.
- the computing device 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media products.
- FIG. 2 illustrates a non-removable non-volatile memory interface (hard disk interface) 140 that reads from and writes to non-removable, non-volatile magnetic media, a magnetic disk drive 151 that reads from and writes to a removable, non-volatile magnetic disk 152 , and an optical disk drive 155 that reads from and writes to a removable, non-volatile optical disk 156 such as a CD ROM.
- hard disk interface hard disk interface
- removable/nonremovable, volatile/non-volatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, DVDs, digital video tape, solid state RAM, and solid state ROM.
- the hard disk drive 141 is typically connected to the system bus 121 through a non-removable memory interface, such as the interface 140
- magnetic disk drive 151 and optical disk drive 155 are typically connected to the system bus 121 by a removable non-volatile memory interface, such as interface 150 .
- hard disk drive 141 is illustrated as storing an operating system 144 , application programs 145 , other program modules 146 , and program data 147 . Note that these components can either be the same as or different from the operating system 134 , application programs 135 , other program modules 136 , and program data 137 .
- the operating system 144 , application programs 145 , other program modules 146 , and program data 147 are given different numbers here to illustrate that, at a minimum, they are different copies.
- a user may enter commands and information into the computing device 110 through input devices such as a microphone 163 , keyboard 162 , and pointing device 161 , commonly referred to as a mouse, trackball, or touch pad.
- Other input devices may include a joystick, game pad, satellite dish, and scanner.
- These and other input devices are often connected to the processing unit 120 through a user input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port, or a universal serial bus (USB).
- a monitor 191 or other type of display device is also connected to the system bus 121 via an interface, such as a video interface 190 .
- computers may also include other peripheral output devices such as speakers 197 and printer 196 , which may be connected through an output peripheral interface 195 .
- the computing system environment 100 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180 .
- the remote computer 180 may be a personal computer, a server, a router, a network PC, a peer device, or other common network node, and typically includes many or all of the elements described above relative to the computing device 110 , although only a memory storage device 181 has been illustrated in FIG. 2 .
- the logical connections depicted in FIG. 2 include a local area network (LAN) 171 and a wide area network (WAN) 173 , but may also include other networks such as a personal area network (PAN) (not shown).
- LAN local area network
- WAN wide area network
- PAN personal area network
- Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet.
- the computing system environment 100 When used in a LAN networking environment, the computing system environment 100 is connected to the LAN 171 through a network interface or adapter 170 .
- the computing device 110 When used in a WAN networking environment, the computing device 110 typically includes a modem 172 or other means for establishing communications over the WAN 173 , such as the Internet.
- the modem 172 which may be internal or external, may be connected to the system bus 121 via the user input interface 160 , or via another appropriate mechanism.
- program modules depicted relative to the computing device 110 may be stored in a remote memory storage device.
- FIG. 2 illustrates remote application programs 185 as residing on computer storage medium 181 . It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
- Embodiments may be implemented with numerous other general-purpose or special-purpose computing devices, computing system environments, and/or configurations.
- Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with an embodiment include, but are not limited to, personal computers, handheld or laptop devices, personal digital assistants, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network, minicomputers, server computers, game server computers, web server computers, mainframe computers, and distributed computing environments that include any of the above systems or devices.
- Embodiments may be described in a general context of computer-executable instructions, such as program modules, being executed by a computer.
- program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types.
- An embodiment may also be practiced in a distributed computing environment where tasks are performed by remote processing devices that are linked through a communications network.
- program modules may be located in both local and remote computer storage media including memory storage devices.
- FIG. 3 illustrates a partial view of an exemplary system 300 .
- the system 300 includes a server platform 302 and a client or participant platform 303 .
- the server platform 302 may include a plurality of individual servers 304 , 306 , 308 .
- the client platform 303 may include a plurality of individual clients 312 , 314 , 316 , 318 .
- the number of clients is limitless, constrained only by the physical characteristics of the server platform 302 , client platform 303 , and a communications network 310 connecting the two.
- Each of the clients 312 , 314 , 316 , 318 may include a personal computer running client software which facilitates a participant's activation, operation, and/or interaction with the virtual world.
- the clients 312 , 314 , 316 , 318 may include other computing devices, for example but not limited to, the thin computing devices such as the thin computing device 20 of FIG. 1 , general-purpose computing systems such as the computing system 100 of FIG. 2 , cellular telephones, wireless or palmtop computers, portable digital assistants, handheld game systems, and/or game consoles.
- Each client 312 , 314 , 316 , 318 is generally responsible for displaying interacting objects (other participants, terrain, non-participant characters, etc.), displaying the virtual world's interface, processing a participant's inputs, playing music and sound, and performing other operations.
- a computing system may include one or more computing devices operating in a coordinated and/or cooperative manner. In another embodiment, a computing system may include two or more computing systems operating in a coordinated and/or cooperative manner.
- Each of the servers 304 , 306 , 308 generally includes a computer system having a server platform portion of the virtual world for communication, database storage, coordination, and overall control and administration of the virtual world.
- the servers 304 , 306 , 308 generally maintain state information and coordinate client interaction with various objects in a virtual environment, including but not limited to other clients, vehicles, artificial intelligence, terrain, music and sound.
- Each server 304 , 306 , 308 provides additional functions, such as security, recording virtual world goals and scoring and tracking each participant's advancement towards those goals.
- the clients 312 , 314 , 316 , 318 communicate with the server platform 302 via the communication network 310 .
- the communication network 310 may include the Internet.
- the communication network 310 may include an intranet, a WAN, a LAN, and/or any other type of network utilizable for communicating between the server platform 302 and the client platform 303 .
- the communications network 310 could include, without limitation, a wireless network, a cellular network, or any other system that facilitates transmission of data.
- Each participant 312 , 314 , 316 , 318 has an associated communications link (or session) with one or more of the servers 304 , 306 , 308 . As shown in FIG.
- participant 1 ( 312 ) could communicate with server A ( 304 ) via a communications link 322 .
- participant 2 ( 314 ) could communicate with server B ( 306 ) via communications link 324 .
- the servers 304 , 306 , 308 are preferably interconnected via a communications network 310 .
- a particular client for example participant 1 ( 312 ), who desires to enter a virtual world, communicates through a communications link 322 with an allocated server A ( 304 ).
- the determination of which specific server 304 , 306 , 308 to which a particular participant is linked may depend on a number of parameters, such as server load, number of participants, location of clients, status of participant (e.g., position) within the virtual world itself, and other parameters.
- the number of servers 304 , 306 , 308 needed for allocation depends upon the number of participants.
- FIG. 3 illustrates operation of the system 300 when a number of participants 312 , 314 , 316 , 318 are logged onto a plurality of servers 304 , 306 , 308 .
- the server platform 302 communicates with each participant positional, status, and event data (referred to as participant or participant data, or as a participant's attributes) for other participants and for objects that the participant may see or interact with the virtual world.
- participant data may include, but is not limited to, avatar attributes, type, physics modeling, scoring, position, orientation, motion vector, animation, background music, participant music, inventory, vehicle, call sign, or other participant or object attributes necessary for the particular virtual world.
- the server includes a database of information that is maintained and updated as the participants interact within the virtual world. Through the interaction between the client platform 303 and the server platform 302 , the virtual world is facilitated.
- a virtual world may include a virtual reality environment.
- a virtual world may include a computer-simulated environment.
- a virtual world may be intended for virtual inhabitation and interaction, often using avatars.
- a participant may include a human user, a spectator, an entity (human or otherwise based), and/or an entity that provides a service to a virtual world.
- Inhabitation may include a representation of its participants in a form of two or three-dimensional graphical representations of humanoids, or other graphical or text-based avatars.
- a virtual world allows for multiple participants.
- a virtual world may include a limited environment.
- a limited environment may include a classroom, a city, an organization, and/or a special purpose space.
- a virtual world may include at least one of the following characteristics:
- Shared Space a virtual world may allow many participants to participate at once.
- Graphical User Interface a virtual world may depict space visually, ranging in style from 2D “cartoon” imagery to more immersive 3D environments.
- Simulation a virtual world may include a simulation of the real world or a simulation of an imaginary world.
- Virtual identity a participant may participate in a virtual world through a virtual identity.
- a virtual identity may include one or more attributes and/or associations utilized by a virtual world in managing a participation in the virtual world. Further, a participant may interact with objects that are part of the virtual world through their virtual identity. These objects may be representations of items or other participants, such as avatars.
- a virtual world may include interaction in real time.
- Interactivity a world may allow participants to alter, develop, build, or submit customized content.
- a virtual world may allow inter-participant communication.
- Persistence a virtual world's existence may continue regardless of whether individual participants are logged in.
- a virtual world includes an online persistent world, active and available 24 hours a day and seven days a week.
- a virtual world may persist for less than a whole day, or less than a whole week.
- a virtual world may allow and encourage the formation of in-world social groups like guilds, clubs, cliques, housemates, neighborhoods, etc.
- a virtual world may include a single player game.
- a virtual world may include a graphical reality as presently exists in multi-participant virtual worlds.
- a virtual world may include communities and chat rooms.
- a virtual world may include a training and/or classroom setting.
- a virtual world may be adapted for educational purposes. Educators may create an online community in which students log into and interact. Within an educational virtual world, students may use their avatar to learn about new assignments and to create projects that are viewable within the virtual world. For example, students taking a computer class may log into a virtual world in which they are the inhabitants of a village that needs their expertise.
- a virtual world may be adapted for commerce, for professional, military, and vocational training, for medical consultation and psychotherapy, and even for social and economic experimentation.
- a virtual world may include a virtual monetary system that constitutes a medium of exchange that allows virtual world transactions.
- the monetary system may include virtual currency, monetary chips, discount coupons, award points, access rights, entrance keys, experience medals, level permits, bonus vouchers, skill merits, character traits, health benefits, success awards, entrance tickets, authorization passes, eligibility credentials, benefit tokens, vested rights, licenses, permissions, decryption codes, bonus vouchers, test certificates, game time credits, additional characters, control over other player characters, control over non-player characters, aliases, privacy levels, visibility levels, and disguises.
- FIG. 4 illustrates an exemplary environment that includes a partial view of a system 400 .
- the system may be incorporated in a server, for example, such as the server 304 of FIG. 3 .
- the system may be incorporated into a local computer system, such as the thin computing device 20 of FIG. 1 , and/or such as the computing system 100 of FIG. 2 .
- the system includes a processor 402 , computer storage medium 404 , user interface 406 , risk mitigation module 408 , and virtual world program 410 .
- these elements may be at least substantially similar to corresponding elements of the thin computing device 20 of FIG. 1 and/or the computing system environment 100 of FIG. 2 .
- a plurality of participants such as the participants 1 - 4 associated with clients 312 , 314 , 316 , 318 of FIG. 3 , who may be at different locations, have bi-directional communication links 414 with the risk mitigation module via the user interface.
- the risk mitigation module may include one or more computer program products with a carrier medium having program instructions thereon. Such computer program products may run on multiple computer devices or run on an integrated computer system, depending on the circumstances.
- the computer storage medium 404 provides a storage capability.
- Various categories of data stored in the computer storage medium 404 may include a record or data indicative of arrangements 416 , consideration transfers 418 , loss occurrences 422 , and benefit provisions 424 .
- the system 400 enables at least two participants to respectively form an arrangement with a protection entity (not shown) that includes the protection entity providing a respective benefit to a participant upon an occurrence of a defined loss in the virtual world in exchange for a consideration.
- the system 400 includes a program 410 comprising computer-readable instructions operable to manage a virtual world configured to interact with at least two participants over a network.
- the computer-readable instructions operable to manage a virtual world include computer-readable instructions operable to administer a virtual world.
- the computer-readable instructions operable to manage a virtual world include computer-readable instructions operable to control a virtual world.
- the computer-readable instructions operable to manage a virtual world include computer-readable instructions operable to provide a virtual world a virtual world experience to the at least two participants.
- the virtual world experience may be an experience such as that provided by Sony Online Entertainment's Everquest®, or an experience provided by Linden Research's Second Life®.
- the system also includes a risk mitigation module, such as the risk mitigation module 408 .
- the risk mitigation module includes operability to facilitate an arrangement that includes a protection entity (not shown) providing a benefit to a participant, such as the participant 1 ( 312 ) of FIG. 3 upon an occurrence of a defined loss in the virtual world in exchange for a consideration.
- the system also includes the computer storage medium, such as for example the computer storage medium 404 , operable to save a record of the arrangement.
- the at least two participants may include at least two participants who control their respective virtual identity in the virtual world.
- the virtual identity may be embodied in an avatar.
- a participant A would individually control their virtual identity A, which by way of further example may be an avatar representative of warrior.
- Participant B would individually control their virtual identity B, which by way of further example may be an avatar representative of a queen.
- the at least two participants who control their respective virtual identity in the virtual world include at least two participants who control their respective virtual identity having at least one attribute in the virtual world.
- the at least one attribute may include at least one of an attribute native to the virtual world, an attribute acquired from a source not native to the virtual world, an attribute created by another participant of the at least two participants, an attribute created by a third party, a weapon, a property, an asset, and or an item.
- the network may include at least one of a private computer network or a public computer network.
- the network may include the Internet.
- the risk mitigation module operable to facilitate an arrangement may include a submodule operable to facilitate at least one of forming the arrangement, an interaction between the participant and the protection entity, creating the arrangement, negotiating a term of the arrangement, revising the arrangement, resolution of disputes, transferring the consideration, transferring a right of the participant in the arrangement, memorializing the arrangement, and notification regarding matters relevant to the arrangement.
- the protection entity may include a participant protection entity.
- the participant protection entity may include at least one of a real-world entity, a real-world entity engaged in a real-world business of entering into agreements similar to the arrangement, a person, an individual, a virtual-world entity, a virtual-world entity engaged in a business of entering into contracts similar to the arrangement, a fictional protection entity, or an avatar of the virtual world.
- the protection entity may include a non-participant protection entity.
- the non-participant protection entity may include at least one of a provider of the virtual world, an operator of the virtual world, a person associated with the virtual world, or a program associated with the virtual world program 410 .
- the providing a benefit to the participant may include providing a virtual-world benefit to the participant.
- the providing a benefit to the participant may include providing a real-world benefit to the participant.
- the providing a benefit to the participant may include providing a compensation to the participant.
- the compensation may include payment in a form of a real world currency, and/or a virtual world currency.
- the providing a benefit to the participant may include providing an agreed-upon benefit to the participant.
- the providing a benefit to the participant may include providing a predetermined benefit to the participant.
- a predetermined benefit for a loss of an avatar attribute, such as a life, an arm, or weapon may include restoration of the life, arm, or weapon.
- a predetermined benefit may include extending a participant's subscription to a virtual world for a predetermined length of time.
- a predetermined benefit may include a fixed amount of virtual-world compensation.
- the providing a benefit to the participant may include providing a compensation determined with relative to a circumstance existing at an occurrence of the loss. For example, a loss of life of an avatar having a high-attained level in a virtual world may receive a greater benefit than a loss of an avatar life at a low attained level in the virtual world.
- a loss of life of an avatar owning significant attributes and/or associations may receive a greater benefit than loss of a life of an avatar owning insignificant attributes and/or associations.
- the providing a benefit to the participant may include providing a compensation that is a function of a participant attribute and/or environmental attribute measured at an occurrence of the loss.
- the providing a benefit to the participant may include providing an attribute replacement to the participant.
- the providing an attribute replacement to the participant may include providing at least one of a replacement of an attribute, a resurrection of a virtual identity of the participant in the virtual world, a replacement of a virtual-world property, a payment of a virtual-world fine, and a satisfaction of a virtual-world punishment.
- the defined loss may include a determinable contingency.
- the defined loss may include at least one of loss suffered by a participant occurring by reason of a harm, an injury, a death, a damaging, a casualty, a disability, and an imposed punitive obligation.
- the defined loss may include a loss relative to a subject matter of the arrangement in which the participant has an interest.
- the defined loss may include at least one of loss suffered by another participant having a relationship with the participant. For example, a loss suffered by another participant may include a loss suffered by another participant with whom the participant has a business relationship, a community relationship, and/or a familial relationship.
- a first participant may have an interest in a subject matter of the arrangement when a loss or damage to it would cause the first participant to suffer a financial loss or other kind of loss. For example, if a property owned by the first participant is damaged, the value of the property is reduced, and whether the first participant pays to have the property repaired or sells it at a reduced price, the first participant has suffered a financial loss resulting from the damage. By contrast, if a second participant's property is damaged, the first participant may be emotionally upset or disadvantaged, but the first participant would not directly suffer any loss by the damage. The first participant has an interest in their own property, but in this example the first participant does not have an insurable interest in the second participant's property.
- the consideration may include a virtual-world consideration.
- the virtual-world consideration may include virtual-world money.
- the virtual-world consideration may include at least one of an attribute, a right, a body part, a weapon, or a token.
- the consideration may include a real-world consideration.
- the real-world consideration may include a real-world money.
- the consideration may include anything having a value.
- the consideration may include a consideration provided by the participant.
- the consideration may include a consideration provided by another participant of the at least two participants.
- the computer storage medium 404 operable to save a record of the arrangement may include a computer storage medium operable to save at least one of a record of a conveyance of the consideration 418 to the protection entity, a record of assents 416 to the arrangement, such as for example a record of the protection entity's assent to the arrangement, a record of an occurrence of the loss 422 , or a record of any provision of the benefit 424 .
- the computer storage medium operable to save a record of the arrangement may for example include the computer storage media described in conjunction with FIG. 2 .
- the system 400 further includes a monetary module 412 operable to manage a medium of exchange in the virtual world expressed as a virtual-world currency unit.
- the virtual world program 410 may include the monetary module.
- the monetary module may not be included in the virtual world program.
- the virtual-world currency unit may include a virtual-world currency having a value in the virtual world and facilitating an exchange for goods and services.
- the virtual-world currency having a value in the virtual world and facilitating an exchange for goods and services may include a virtual-world currency having a value in the virtual world and usable as at least one of the consideration and the benefit.
- the system 400 further includes the monetary module 412 providing a native virtual-world medium of exchange expressed as a native virtual-world currency unit having a value in the virtual world.
- the system also includes a secondary monetary module 444 coupled with the virtual world.
- the secondary monetary module may be an integral component of the system 400 .
- the secondary monetary module may be coupled with the system, such as for example, it may be coupled by communication via a computer network.
- the secondary money module includes an operability to manage a secondary virtual-world medium of exchange expressed as a secondary virtual-world currency unit having a value in the virtual world and facilitating at least one of the benefit and the consideration.
- the monetary module coupled with the virtual world may include a monetary module coupled with the virtual world and subject to control of the virtual world.
- the monetary module coupled with the virtual world and subject to control of another participant of the at least two participants may include a monetary module coupled with the virtual world and subject to control of a participant protection entity.
- the secondary virtual world currency may include a secondary virtual world currency having a value in another virtual world.
- a participant may be illustrated and/or described herein as a single illustrated figure, a participant may be representative of a human user, a robotic user (e.g., computational entity), and/or substantially any combination thereof (e.g., a participant may be assisted by one or more robotic agents).
- a participant as set forth herein, although shown as a single entity may in fact be composed of two or more entities. Those skilled in the art will appreciate that, in general, the same may be said of “player,” “protection entity,” and/or other entity-oriented terms as such terms are used herein.
- a participant may include an agent, a program agent, a proxy, and/or a representative of the participant.
- FIG. 5 illustrates an exemplary operational flow 500 .
- the managing operation operates a virtual world in communication with a plurality of players over a network.
- a facilitation operation 520 enables a player of the plurality of players (hereafter referred to as “the player”) and a risk distribution entity to form an agreement whereby a thing of value is conveyed to the risk distribution entity and the risk distribution entity undertakes to provide a benefit upon the player experiencing a specified loss in the virtual world.
- the thing of value may include virtual world thing of value, or a real world thing of value.
- the thing of value may be conveyed to the risk distribution entity by the player.
- the thing of value may be conveyed to the risk distribution entity by another player of the plurality of players.
- the risk distribution entity may undertake to provide a benefit to the player, or to another player of the plurality of players.
- the risk distribution entity may undertake to provide a benefit upon the player experiencing a specified loss in the virtual world, or upon to another player of the plurality of players experiencing a specified loss in the virtual world.
- a documenting operation 530 makes a digital record of the arrangement.
- the digital record of the arrangement may include at least one of a digital record of a conveyance of a thing of value to the protection entity, the protection entity's assent to the arrangement, the player's assent to the arrangement, a provision of the benefit in the virtual world or in the real world, or an occurrence of the specified loss in the virtual world.
- the operational flow then moves to an end operation.
- the operational flow 500 may include at least one additional operation, such as an assistance operation 540 .
- the assistance operation facilitates a transfer of the benefit in response to an indication that the player experienced the specified loss in the virtual world.
- FIG. 6 illustrates an alternative embodiment of the exemplary operational flow 500 of FIG. 5 .
- the managing operation 510 may include at least one additional operation.
- An additional operation may include an operation 512 , and/or an operation 514 .
- the operation 512 operates at least one of an online interactive gaming environment, a massive multiplayer online game, or a massive multiplayer on-line role-playing game.
- the operation 514 operates at least one of a learning environment, an online community, and/or a participant interactive environment.
- FIG. 7 illustrates an alternative embodiment of the exemplary operational flow 500 of FIG. 5 .
- the facilitation operation 520 may include at least one additional operation.
- An additional operation may include an operation 522 , an operation 524 , and an operation 526 .
- the enabling a player and a risk distribution entity to form an agreement includes at least one of creating an opportunity for an interaction between the player and the risk distribution entity, providing a capability for the player and the risk distribution entity to form the arrangement, assisting an interaction between the player and the risk distribution entity, creating the agreement, negotiating a term of the agreement, revising a term of the agreement, resolving the agreement, transferring the consideration, transferring a right of the player in the agreement, and memorializing the agreement.
- the risk distribution entity includes an entity that shifts and/or distributes a risk of the specified loss among the plurality of players.
- the thing of value includes at least one of a thing having a value in the virtual world and a thing having a value in the real world.
- FIG. 8 illustrates a partial view of an exemplary computer-program product 550 .
- the computer-program product includes a computer program 554 for executing a computer process in a computing system.
- An embodiment of the exemplary computer-program product may be provided using a computer-readable signal-bearing medium 552 , and includes computer executable instructions.
- the computer product encodes the computer program for executing a computer process.
- the computer process includes communicating with virtual world and a participant.
- the computer process also includes providing an opportunity for the participant to make an arrangement with a protection entity that includes the protection entity providing a compensation upon a described loss being experienced in the virtual world in exchange for a consideration.
- the process further includes creating a record of the arrangement.
- the computer process 554 may further include an additional process, such as a process 556 , a process 558 , and/or a process 560 .
- the communicating with a virtual world and with a participant may include communicating with a virtual world and with a participant via a network.
- the computer process may further include communicating between the virtual world and the protection entity.
- the computer process may further include providing a notification of an occurrence of the described loss.
- the computer-readable signal-bearing medium 552 may include a computer storage medium 562 , which may be carried by a computer-readable carrier (not shown).
- the computer-readable signal-bearing medium 552 may include a communications medium 564 .
- the computer program 554 may be implemented in hardware, software, and/or firmware, and/or a combination thereof.
- FIG. 9 illustrates a partial view of an exemplary environment in which embodiments may be implemented.
- FIG. 9 includes a computing device 600 having a processor 602 and computer storage medium 604 for saving a program 605 .
- the computing device may include elements at least substantially similar to the thin computing device 20 of FIG. 1 and/or the computing device 110 of FIG. 2 .
- the program 605 may be incorporated in one or more computer program products having a carrier medium with program instructions thereon.
- Peripheral components may include display 606 , as well as input devices such as keyboard 610 and mouse 612 .
- An active participant 614 may have access to features disclosed in the exemplary operational flows described in conjunction with FIGS. 12-14 by running the program 605 .
- Inactive participants 616 , 618 may also periodically have access to the program 605 including non-real time interaction through the program with each other and/or with active participant 614 in order to participate in the benefits and advantages of the methods and processes disclosed herein.
- FIG. 10 illustrates a partial view of an environment 601 in which embodiments may be implemented.
- FIG. 10 includes a networked system having a network server 620 with communication links to different virtual world environments 622 , 624 , 626 .
- terminal 628 has access through cable connection 630
- terminal 632 has access through dial-up line 634
- terminal 636 has access through wireless connection 638
- terminal 640 uses transmission signals 642 (e.g., radio or television signals) via satellite 644 for access to a network, illustrated as a computer network, the Internet, a WAN, and/or a LAN.
- the network server 620 is coupled with the network. Participants may be logged on to participate simultaneously in risk mitigation arrangements in virtual world environments, or be respectively logged on during non-overlapping or partially overlapping time periods. Such participation may be directly with other parties or indirectly through intermediaries, depending on the circumstances involved.
- FIG. 11 illustrates a partial view of an exemplary networked environment 660 .
- the networked environment is interactive with participants 650 via a network 652 having an interactive communication link 654 through I/O interface 656 .
- Such a network 660 may include a virtual lobby arcade 662 with various types of virtual opportunities.
- the categories for such virtual opportunities are almost unlimited, and may for example include shops, competitions, journeys, test, battles, entertainment, careers, vehicles, training, auctions, communication manager, events, awards, skills, health, and homes.
- a non-participant protection entity 672 operating, for example, as a storefront business, interacts with participants to facilitate an arrangement with them to mitigate, manage, and/or distribute risk in a virtual world, for example, such as the game environment 664 , the virtual world 666 , and/or the role-playing virtual community 668 .
- a risk management element 670 enables the non-participant protection entity.
- the networked environment 600 may include a participant protection entity 674 .
- the participant protection entity may be coupled with the networked environment via the network 652 .
- separately owned virtual environments may be included as part of the virtual network environment 660 , including the virtual game environment 664 , the virtual world 666 , and/or the role-playing virtual community 668 .
- the services of the non-participant protection entity 672 may also be usable in these separate individual virtual environments based on appropriate agreements with their owners and/or operators.
- a system embodiment may be implemented employing the environments illustrated in FIGS. 9-11 .
- the system includes a computer-simulated environment wherein a participant is able to take part.
- the computer-simulated environment may include the virtual world I 622 , the virtual world II 624 , and/or the virtual world III 626 of FIG. 10 .
- the computer-simulated environment may include the virtual game environment 664 , the virtual world 666 , and/or the role-playing virtual community 668 of FIG. 11 .
- the system also includes a risk management element of the computer-simulated environment.
- the risk management element may include the risk management element 670 of FIG. 11 .
- the risk management element includes an operability that facilitates an arrangement that includes a protection entity providing a future benefit to the participant upon an occurrence of a defined loss in the computer-simulated environment in exchange for a transfer of a thing of value to the protection entity.
- the future benefit may include at least one of a compensation, or an attribute replacement.
- the defined loss may include at least one of harm, damage, injury, death, damage to others, damage to property of others, or criminal penalties, or punishment.
- the thing of value may include at least one of a virtual world or a real world thing of value.
- the transfer may be procured by the participant, or by another participant.
- the system includes a computer storage medium operable to save a record of the arrangement.
- the record of the arrangement may include at least one of a record of any provision of the benefit to the participant.
- system may further include a participant interface communication link that enables the participant to access to the computer-simulated environment and participate in the risk management element.
- system may further include a protection entity interface communications link that enables the protection entity to access to the computer-simulated environment and participate in the risk management element.
- the figure illustrates another embodiment that provides a system.
- the system includes a computing device couplable to a virtual world via a public network.
- the computing device is illustrated as the computing device 600 .
- the system also includes instructions, illustrated as the program 605 .
- the instructions when executed on the computing device, cause the computing device to activate a virtual character that represents a participant in the virtual world.
- the instructions also enable participation by the virtual character in an arrangement with a protection entity that includes the protection entity providing a compensation to the virtual character upon a future occurrence of a described loss in the virtual world in exchange for a consideration transferred to the protection entity.
- the instructions further make a record of the arrangement.
- the protection entity includes a participant protection entity. In another embodiment, the protection entity includes a non-participant protection entity.
- FIG. 12 illustrates an exemplary operational flow 700 .
- the operational flow moves to a control operation 710 that accepts an input operating a virtual character in a virtual world.
- a negotiation operation 720 participates in an arrangement with a protection entity.
- the arrangement includes the protection entity providing a compensation to the virtual character upon a future occurrence of a described loss in the virtual world in exchange for a consideration transferred to the protection entity.
- a memory operation 750 saves data indicative of the arrangement in a computer-readable medium.
- the operational flow proceeds to an end operation.
- control operation 710 may include at least one additional operation, such as the operation 712 .
- the additional operation 712 includes operating an avatar that represents a participant in a virtual world.
- the operational flow 700 may include at least one additional operation 760 .
- An additional operation may include an operation 762 and/or an operation 764 .
- the operation 762 includes establishing a communication link via a network between the virtual world and the participant.
- the operation 764 includes receiving a notification of an occurrence of the described loss.
- FIG. 13 illustrates an alternative embodiment of the exemplary operational flow 700 of FIG. 12 .
- the negotiation operation 720 may include at least one additional operation.
- An additional operation may include an operation 722 .
- the operation 722 receives a communication related to at least one of offering, accepting, or negotiating an opportunity to form the arrangement.
- the operation 722 may include at least one additional operation.
- An additional operation may include an operation 724 and/or operation 726 .
- the operation 724 receives a communication originating from the virtual world and related to an opportunity to form the arrangement.
- the operation 726 receives a communication originating from the protection entity and related to an opportunity to form the arrangement.
- the operation 726 may include at least one additional operation.
- An additional operation may include an operation 728 and/or operation 732 .
- the protection entity includes a participant protection entity.
- the protection entity includes a non-participant protection entity.
- FIG. 14 illustrates an alternative embodiment of the exemplary operational flow 700 of FIG. 12 .
- the negotiation operation 720 may include at least one additional operation.
- An additional operation may include an operation 734 , an operation 736 , an operation 738 , an operation 742 , an operation 744 , and/or an operation 746 .
- the operation 734 sends a communication related to at least one of offering, accepting, or negotiating an opportunity to form the arrangement.
- the exchange for a consideration transferred to the protection entity includes an exchange for a consideration having a value in the virtual world.
- the exchange for a consideration transferred to the protection entity includes an exchange for a consideration having a value in the real world.
- the exchange for a consideration transferred includes an exchange for a consideration transferred by the participant.
- the exchange for a consideration transferred includes an exchange for a consideration transferred by a third party.
- the participating in an arrangement with a protection entity includes sending an authorization to transfer the consideration to the protection entity.
- FIG. 15 illustrates a partial view of an exemplary computer-program product 780 .
- the computer-program product includes a computer program 784 for executing a computer process in a computing system.
- An embodiment of the exemplary computer-program product may be provided using a computer-readable signal-bearing medium 782 , and includes computer executable instructions.
- the computer product encodes the computer program for executing a computer process.
- the computer process includes sending an instruction to a virtual world related to a virtual character that represents a participant.
- the process also includes enabling a participation by the virtual character in an arrangement with a risk distribution entity that includes the risk distribution entity providing a compensation to the virtual character upon a future occurrence of a described loss in the virtual world in exchange for a consideration transferred to the risk distribution entity.
- the process further includes saving data representative of the arrangement.
- the computer-readable signal-bearing medium 782 may include a computer storage medium 786 , which may be carried by a computer-readable carrier (not shown).
- the computer-readable signal-bearing medium may include a communications medium 788 .
- the computer program 784 may be implemented in hardware, software, and/or firmware, and/or a combination thereof.
- FIG. 16 illustrates an exemplary operational flow 800 .
- the administration operation operates a protection entity associated with a virtual world configured to interact with a participant via a network.
- a negotiating operation 830 participates in an arrangement with the participant that includes the protection entity providing a compensation to the participant upon a future occurrence of a described loss in the virtual world in exchange for receiving a consideration.
- a storage operation 850 saves a record of the arrangement. The operational flow then moves to an end operation.
- the operational flow 800 may include at least one additional operation, such as an operation 870 .
- the operation 870 receives an evidence of a transfer of the compensation.
- FIG. 17 illustrates an alternative embodiment of the exemplary operational flow 800 of FIG. 16 .
- the administration operation 810 may include at least one additional operation.
- An additional operation may include an operation 812 , an operation 814 , and/or an operation 816 .
- the operation 812 operates a protection entity that is associated with a virtual world and configured to interact with a participant via a network.
- the operation 814 operates a protection entity associated with a virtual world that is configured to interact with a participant via a network.
- the operation 816 operates a protection entity involved in a business of entering into risk mitigation agreements in at least one of the virtual world, the real world, or both the virtual world and the real world.
- FIG. 18 illustrates an alternative embodiment of the exemplary operational flow 800 of FIG. 16 .
- the administration operation 810 may include at least one additional operation.
- An additional operation may include an operation 818 , an operation 822 , an operation 824 , and/or an operation 826 .
- the operation 818 operates a virtual world participant protection entity.
- the operation 822 operates a virtual world non-participant protection entity.
- the operation 824 operates a protection entity authorized by the virtual world to participate in the arrangement with the participant.
- the operation 826 operates a protection entity associated with a virtual world configured to interact with at least one of a program agent, a proxy, or a representative of the participant via a network.
- FIG. 19 illustrates an alternative embodiment of the exemplary operational flow 800 of FIG. 16 .
- the negotiation operation 830 may include at least one additional operation.
- An additional operation may include an operation 832 , and/or an operation 838 .
- the operation 832 receives a communication related to at least one of offering, accepting, or negotiating an opportunity to form an arrangement.
- the operation 832 may include at least one additional operation.
- An additional operation may include an operation 834 , and/or an operation 836 .
- the operation 834 receives a communication originating from the virtual world and related to an opportunity to form an arrangement.
- the operation 836 receives a communication originating from the participant and related to an opportunity to form an arrangement.
- the operation 838 sends a communication related to at least one of offering, accepting, or negotiating an opportunity to form an arrangement.
- FIG. 20 illustrates an alternative embodiment of the exemplary operational flow 800 of FIG. 16 .
- the negotiation operation 830 may include at least one additional operation.
- An additional operation may include an operation 842 , an operation 844 , an operation 846 , and/or an operation 848 .
- the operation 842 receives a consideration having a value in the virtual world.
- the operation 844 receives a consideration having a value in the real world.
- the operation 846 receives a consideration transferred by the participant.
- the operation 848 receives a consideration transferred by a third party.
- FIG. 21 illustrates an alternative embodiment of the exemplary operational flow 800 of FIG. 16 .
- the operational flow includes claims operation 860 that receives an indication of an occurrence of the described loss in the virtual world, and provides the compensation to the participant.
- the claims operation 860 may include at least one additional operation.
- An additional operation may include an operation 862 , and/or an operation 864 .
- the operation 862 provides a virtual-world compensation to the participant.
- the operation 864 provides a real-world compensation to the participant.
- FIG. 22 illustrates a partial view of an exemplary system 900 .
- the system includes a computing system 910 that includes a computing device 920 .
- the computing system may be at least substantially similar to the thin computing device 20 of FIG. 1 and/or the computing system environment 100 of FIG. 2 .
- the computing system includes configuration to communicate with a virtual world via a network, the virtual world including an operability to interact with a participant via the network.
- the computing device may be at least substantially similar to the thin computing device 20 of FIG. 1 and/or the computing device 110 of FIG. 2 .
- the system further includes computer-executable instructions 930 that when executed on the computing device cause the computing system to operate a protection entity having an association with the virtual world.
- the instructions further cause the computing system to participate in an arrangement with the participant that includes the protection entity providing a compensation to the participant upon a future occurrence of a described loss in the virtual world in exchange for receiving a consideration.
- the instructions also save data indicative of the arrangement.
- the computer-executable instructions may include an additional instruction. Additional instructions may include instructions 932 , instructions 934 , instructions 936 , instructions 938 , and/or instructions 942 .
- the instructions 932 operate a protection entity having a presence within the virtual world. In a further embodiment, the protection entity may be under control of the virtual world operator or a player participant. In another embodiment, the player participant may be an individual or a company.
- the instructions 934 operate a protection entity having a presence within the virtual world and under a control of the virtual world.
- the instructions 936 operate a protection entity having a presence within the real world and an operability to interact with the virtual world via the network.
- the instructions 938 operate a protection entity involved in a business of a risk mitigation in the real world and having an operability to interact with the virtual world via the network.
- the instruction 942 operates a protection entity having a presence in the real world and having an operability to interact with the participant via the network in response to a referral from the virtual world.
- the protection entity may include a participant protection entity.
- the participant protection entity may include at least one of a real-world entity, a real-world entity engaged in a business of entering into contracts similar to the arrangement, a person, an individual, a virtual-world entity, a virtual-world entity engaged in a business of entering into contracts similar to the arrangement, a fictional protection entity, or an avatar of the virtual world.
- the protection entity may include a non-participant protection entity.
- the non-participant protection entity includes at least one of a provider of the virtual world, an operator of the virtual world, or a person associated with the virtual world.
- FIG. 23 illustrates a partial view of an exemplary computer-program product 960 .
- the computer-program product includes a computer program 964 for executing a computer process in a computing system.
- An embodiment of the exemplary computer-program product may be provided using a computer-readable signal-bearing medium 962 , and includes computer executable instructions.
- the computer product encodes the computer program for executing a computer process.
- the computer process includes operating a protection entity having an association with the virtual world that includes an operability to interact with a participant via a network.
- the process also includes participating in an arrangement with the participant that includes the protection entity providing a compensation to the participant upon a future occurrence of a described loss in the virtual world in exchange for receiving a consideration.
- the process further includes saving data indicative of the arrangement.
- the computer-readable signal-bearing medium 962 may include a computer storage medium 966 , which may be carried by a computer-readable carrier (not shown).
- the computer-readable signal-bearing medium may include a communications medium 968 .
- the computer program 964 may be implemented in hardware, software, and/or firmware, and/or a combination thereof.
- FIG. 24 illustrates an exemplary schematic timing diagram 1060 of risk management opportunities that are possible in a virtual world environment among participants and entities.
- a time line 1062 provides a reference for real time and delayed time accessibility for different virtual world and real-world entities, including a protection entity with an active time period 1064 commencing at 1065 , a third party virtual provider with an active time period 1066 commencing at 1067 , a virtual world provider with an active time period 1068 commencing at a starting time 1069 , and a programmed virtual character role with an active time period 1070 commencing at time 1071 and terminating at time 1073 . Because of the benefits of computerized technology, real time and delayed time interaction between entities are possible for purposes of practicing the methods and implementing the systems for virtual credit opportunities as disclosed herein.
- a participant John 1072 having an actual logon time period 1074 commencing at time 1075 and terminating at time 1077 has the capability of having real time interaction during logon time period 1074 with participant David 1076 .
- David's actual logon time period 1080 commencing at time 1083 and terminating at time 1085 partially overlaps with John's logon time period 1074 , and similarly with active time 1066 of the third party virtual provider, as well as with an active time period of a real-world group participant 1086 .
- John's logon time period 1074 completely overlaps with active period 1064 of the protection entity, and with the active period 1068 of the virtual world provider, and further with an active period of a participant character role 1088 .
- This enables real time interaction between entities, including repeated dialogue communications if deemed appropriate, while risk mitigation arrangements are being negotiated, arranged, implemented, transferred, resolved, and/or canceled.
- time delays between real time interactive messages may also occur intentionally, or because of system limitations.
- John 1072 is logged off between his termination time 1077 and his re-commencement time 1079
- other entities that are active or logged on during the interim period may respond to any of John's requests, actions or questions that have been appropriately stored in memory, or may pursue their own dialogue with respect to new, pending or existing risk mitigation arrangements.
- Such other entities may include Mary 1082 whose logon period 1084 commences at time 1087 and terminates at time 1089 .
- John can resume his virtual world risk mitigation arrangement participation during his new logon time period 1078 until termination at time 1081 .
- This new period may include responses to requests, action or question previously made by Mary 1082 whose logon period 1084 does not overlap either of John's logon time periods 1074 , 1078 .
- real time interaction may be initiated or received by participants or other entities in the virtual world environment through links in the virtual world environment as shown by a real-world website link 1090 activated to commence at time 1091 and terminate at time 1093 , a virtual environment link 1092 activated to commence at time 1095 and terminate at time 1097 , and a real-world protection entity link 1094 activated to commence at time 1098 and terminate at time 1099 .
- a real-world website link 1090 activated to commence at time 1091 and terminate at time 1093
- a virtual environment link 1092 activated to commence at time 1095 and terminate at time 1097
- a real-world protection entity link 1094 activated to commence at time 1098 and terminate at time 1099 .
- participation in a virtual world environment may include activities, events and transactions that are wholly within the simulated or virtual world environment as well as activities, events and transactions that are initiated or partly pursued in the simulated or virtual world environment.
- a virtual world participant or participant taking a class could mean a virtual character taking a class in the virtual world to increase his virtual world skill level, as well as a participant using his virtual character to interact with a real-world course (for example, to take an online class), or some combination of these.
- FIG. 25 illustrates a partial view of a system 1200 in which embodiments may be implemented.
- the system includes a virtual world in which a participant may participate, illustrated as a virtual world environment 1210 that includes a virtual world program 410 .
- the system also includes a covered-loss detection module 1222 operable to identify an occurrence of a defined loss in the virtual world suffered by the participant.
- the defined loss is described in an arrangement and/or agreement (hereafter “agreement”) and includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence in the virtual world of the defined loss.
- the agreement may have any form or format, and may or may not be negotiated.
- the agreement may include a risk management agreement.
- the agreement may be saved as a record of arrangement(s)/agreement(s) 1216 of the computer storage medium 404 .
- the participant is able to influence at least one aspect of a virtual identity in a virtual world created by the virtual world program 410 .
- the virtual identity being uniquely associated with the participant.
- an aspect of the virtual identity affected by the participant may include the participant controlling a movement of an avatar through a virtual world space, and/or affecting the avatar's use of a weapon.
- the participant may not be able to control another aspect of the avatar, such as aging, or time remaining in a session involving the avatar.
- the avatar may be considered an alter ego in the virtual world of the participant.
- an avatar may include a surrogate in the virtual world of a participant and whose actions, associations, and/or attributes are attributed to the participant.
- the participant may place an extrinsic and/or an intrinsic value on the avatar for any reason.
- the participant may value the avatar because the participant likes a graphical image of the avatar, because of the participant's opportunity to control a particular avatar, and/or because the participant values the associations and/or attributes of the avatar.
- the participant may have an interest in an aspect of a property and/or a virtual world object.
- the participant may be able to possess and/or control a virtual world property and/or a virtual world object, which may be implemented through the participant's identity or through an avatar uniquely associated with the participant.
- the participant may suffer a loss in the virtual world in a variety of manners.
- a losses suffered by a virtual identity and/or an avatar may be considered to be a loss suffered by the participant.
- a loss suffered by a participant may include a loss of a feature and/or attribute of an avatar controlled and/or affected by the participant, such as for example a life, limb, or weapon associated with the avatar.
- a loss suffered by a participant may include a loss of a feature and/or attribute of the avatar valued by the participant.
- a loss suffered by a participant may include a loss of a feature and/or attribute of an avatar that is not controlled by the participant, such as for example a loss of a life, limb, or weapon associated with an avatar controlled by another participant.
- a loss suffered by the participant may include a damaging or loss of a virtual world property and/or a virtual world object in which the participant has an interest.
- the defined loss includes a determinable contingency.
- a determinable contingency may include a contingency that may be ascertained with respect to an aspect of the virtual world, such as a flood event programmed into the virtual world program 410 .
- the defined loss includes an indeterminable contingency.
- an indeterminable contingency may include a contingency that may not be ascertained or readily ascertained with respect to an aspect of the virtual world, such as a success in a combat situation with an avatar controlled by another participant.
- the defined loss in the virtual world suffered by the participant includes at least one of a harm, an injury, a loss of life, a damage, a casualty, a disability, and/or an imposed punitive obligation.
- a punitive obligation may include a banishment from the virtual world, such as a punishment imposed by the virtual world environment 1210 for engaging in prohibited behavior or conduct in the virtual world.
- the defined loss in the virtual world suffered by the participant includes an adverse effect on an attribute and/or association of an avatar in the virtual world controlled by the participant. An adverse effect may include a diminution in value of an asset or attribute, and/or a degradation in a performance of an asset or attribute.
- the defined loss in the virtual world suffered by the participant includes at least one of a harm, an injury, a loss of a life, a damage, a casualty, and/or a disability befalling another participant in the virtual world with whom the participant has a relationship.
- the defined loss includes an incident relative to a subject matter in which the participant has an interest.
- the protection entity includes a participant protection entity, illustrated as a participant protection entity 1230 .
- the participant protection entity may be coupled to the virtual world environment 1210 via a computer network, such as a WAN or LAN.
- the protection entity includes a non-participant protection entity, illustrated as the non-participant protection entity 1232 . While the non-participant protection entity is illustrated as part of the virtual world environment 1210 and coextensive with the virtual world program 410 , in another embodiment, the non-participant protection entity may be functionally and/or structurally separate from the virtual world environment and/or the system 1200 .
- the non-participant protection entity includes a non-participant protection entity under a control of at least one of a provider of the virtual world, an operator of the virtual world, or a person associated with the virtual world.
- the benefit includes a compensation for the defined loss.
- a compensation may include anything having a value in the virtual world environment 1210 , and/or a value in the real world.
- the benefit includes a replacement of the defined loss.
- the benefit to the participant includes a compensation to the participant, and/or a compensation to a non-participant.
- the benefit to the participant includes a virtual-world benefit to the participant.
- the benefit to the participant includes a real-world benefit to the participant.
- the benefit to the participant includes an agreed upon benefit to the participant.
- the benefit to the participant includes a predetermined benefit to the participant.
- the benefit to the participant includes a benefit determined relative to a circumstance existing at an occurrence of the loss.
- the benefit to the participant includes a benefit that is a function of a participant attribute and/or environmental attribute measured at an occurrence of the loss.
- the benefit to the participant includes a replacement to the participant.
- the replacement to the participant includes providing at least one of a replacement of an attribute, a restoration in the virtual world of a lost life, a replacement of a virtual-world property, a payment of a virtual-world fine, and a satisfaction of a virtual-world punishment.
- the covered-loss detection module 1222 further includes an event-tracking module 1224 operable to monitor the virtual world for an occurrence of the defined loss.
- the operable to monitor in the virtual world may include overseeing the virtual world environment 1210 for purpose of tracking usage and reporting on events.
- the event-tracking module includes operability to monitor the virtual world for at least one of an anticipated, forecast, current, and/or prior occurrence of the defined loss.
- the event-tracking module may contemporaneously monitor the virtual world in real time for an occurrence of the defined loss suffered by the participant.
- the event-tracking module may monitor a record of participant's activities in the virtual world, such as activities of an avatar controlled by the participant, and/or incidents related to a property and/or object owned or controlled by the participant.
- the event-tracking module may predict and/or anticipate an occurrence of the defined loss likely to be suffered by the participant in the virtual world.
- the covered-loss detection module further includes an operability to track the virtual world environment for an occurrence of the defined loss suffered by the participant.
- the covered-loss detection module 1222 and/or the event-tracking module 1224 may be remote to the virtual world environment 1210 and coupled with the virtual world via the bi-directional communication link 414 .
- the system 1200 includes a query module 1226 .
- the query module includes a query module operable to respond to an inquiry corresponding to a claimed occurrence of a defined loss.
- the inquiry may be submitted by a participant, and/or by the participant protection entity 1230 .
- the inquiry may include an inquiry whether an occurrence of a loss in the virtual world suffered by the participant is an occurrence of a defined loss described in an agreement between the participant and the protection entity.
- the inquiry may include requesting the benefit in response to a claimed occurrence of a defined loss.
- the inquiry may include a request for assistance in obtaining the benefit in response to a claimed occurrence of a defined loss.
- the inquiry may include a request for an explanation why no benefit is being provided in response to a claimed occurrence of a defined loss.
- the inquiry may include an inquiry by a protection entity whether the participant has requested the benefit for a claimed occurrence of a defined loss.
- the query module 1226 includes a query module operable to confirm the occurrence of the claimed occurrence of a defined loss. In another embodiment, the query module includes a query module operable to confirm the occurrence of the claimed occurrence of a defined loss by reference to a record of an identified occurrence maintained by the covered-loss detection module 1222 . In a further embodiment, the query module includes a query module operable to deny the occurrence of the claimed occurrence of a defined loss. In an embodiment, the query module includes a query module operable to facilitate a provision of the benefit to the participant for the participant claimed occurrence of the defined loss.
- the system 1200 further includes a reporting module 1228 operable to transmit a signal indicative of an occurrence of a defined loss.
- the signal indicative of an occurrence of a defined loss may include a signal generated in response to the identified occurrence of a defined loss by the covered-loss detection module 1222 .
- the signal may be transmitted via the bi-directional communication link 414 to the participant, the participant protection entity 1230 , a third party (not shown), and/or a manager of the virtual world environment 1210 .
- the reporting module 1228 further includes a reporting module operable to transmit a signal indicative of an identified occurrence of a defined loss.
- FIG. 26 illustrates a partial view of an exemplary system 1250 in which embodiments may be implemented.
- the system includes a computing system 1252 couplable to a network and operable to interact with at least two participants via the network.
- the computing system includes a program module 1260 operable to manage a virtual world.
- the system also includes a query module 1270 operable to respond to a benefit inquiry corresponding to a claimed occurrence of a defined loss in the virtual world by a participant of the at least two participants (hereafter referred to as “the participant”).
- the claimed occurrence of a defined loss may include a claimed occurrence of the defined loss by the participant.
- the claimed occurrence of a defined loss may include a claimed occurrence of the defined loss by an entity other than the participant.
- the defined loss in the virtual world includes a defined loss described in an agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the defined loss in the virtual world.
- the defined loss includes a preselected loss of at least two preselected losses.
- the query module includes a query module operable to confirm the occurrence of a participant-claimed occurrence of a defined loss. In another embodiment, the query module includes a query module operable to deny the occurrence of the claimed occurrence of a defined loss. In a further embodiment, the query module includes a query module operable to facilitate a provision of the benefit to the participant for the claimed occurrence of the defined loss. In another embodiment, the query module includes a query module operable to report a confirmation decision related to the occurrence of the claimed occurrence of a defined loss. The confirmation decision may include any decision responsive to the benefit inquiry, such as confirming the occurrence of a defined loss, denying the occurrence of a defined loss, and/or requesting more information.
- the system 1250 includes an occurrence-tracking module 1280 operable to monitor the virtual world for an occurrence of the defined loss.
- FIG. 27 illustrates an exemplary operational flow 1300 in which embodiments may be implemented.
- the operational flow moves to a detecting operation 1310 .
- the detecting operation identifies an occurrence in a virtual world of a loss defined in an agreement.
- the virtual world includes a virtual world operable to interact with a plurality of participants over a network.
- the agreement includes an obligation of a protection entity to provide a benefit to a participant of at least two participants (hereafter referred to as “the participant”) upon an occurrence of the defined loss in the virtual world.
- An answer operation 1320 responds to a benefit claim corresponding to a purported occurrence of a loss suffered by the participant in the virtual world based at least in part on the identified occurrence in the virtual world of a loss defined in the agreement.
- the operational flow moves to an end operation.
- the operational flow 1300 may include at least one additional operation 1330 .
- the at least one additional operation may include an operation 1332 , an operation 1334 , and/or an operation 1336 .
- the operation 1332 monitors the virtual world for the occurrence of a loss defined in the agreement.
- the operation 1334 manages the virtual world.
- the operation 1336 accepts a participant input operating a character in the virtual world.
- the participant input operating a character in the virtual world includes any participant input that ultimately affects a character or avatar in the virtual world associated with the participant.
- FIG. 28 illustrates a partial view of an exemplary computer-program product 1350 in which embodiments may be implemented.
- the computer-program product includes a computer-readable signal-bearing medium 1352 bearing program instructions 1354 .
- the program instructions are operable to perform a process in a computer system.
- the process includes receiving a claim for a benefit based upon a purported occurrence in a virtual world of a defined loss described in an agreement and suffered by a participant of at least two participants (hereafter referred to as “the participant”).
- the virtual world is operable to interact with at the least two participants over a network.
- the agreement includes an obligation of a protection entity to provide the benefit to the participant upon an occurrence of the defined loss in the virtual world.
- the claim for a benefit may be received from the participant, from the protection entity, or from a third party.
- the process further includes verifying the purported occurrence of the defined loss in the virtual world.
- the process further includes responding to the claim for a benefit based upon the verifying the purported occurrence of the defined loss in the virtual world.
- the responding to the claim for the benefit based upon the verifying the purported occurrence of the defined loss in the virtual world includes responding that the purported occurrence of the defined loss in the virtual world is verified 1356 .
- the responding that the purported occurrence of the defined loss in the virtual world is verified includes responding that the purported occurrence of the defined loss in the virtual world is verified and the claim is allowed 1358 .
- the responding to the claim for the benefit based upon the verifying the purported occurrence of the defined loss in the virtual world includes responding that the purported occurrence of the defined loss in the virtual world is not verified 1360 .
- the verifying the purported occurrence of the defined loss in the virtual world includes correlating the purported occurrence of the defined loss in the virtual world and a computing-machine-identified occurrence of the defined loss experienced by the participant in the virtual world 1362 .
- the correlating the purported occurrence of the defined loss in the virtual world and a computing-machine-identified occurrence of the defined loss experienced by the participant in the virtual world includes correlating the purported occurrence of the defined loss in the virtual world and a computing-machine-monitored occurrence of the defined loss experienced by the participant in the virtual world 1364 .
- the computer-readable signal-bearing medium includes a computer storage medium 1366 . In another embodiment, the computer-readable signal-bearing medium includes a communication medium 1368 .
- new and advantageous features provide benefits to those individuals who participate in virtual world environments, and benefits to operators of virtual world environments.
- some embodiments enable identifying occurrences of a covered loss in a virtual world environment, and keeping a record of the identified occurrences. For example, instances of property damage and loss of a power in the virtual world environment may be identified.
- the identified occurrences of a covered loss may be used as a basis on which a participant may claim benefits for the occurrence of a covered loss, notice may be provided of the occurrence of a covered loss, and/or protection entity may allow or deny a claim for benefits for the occurrence of a covered loss.
- a participant may receive a notification that a loss of a power or a property is a loss described in a risk mitigation agreement.
- the participant may decide to request the benefit for the loss under the risk mitigation agreement.
- the identifying and/or keeping a record of the identified occurrences is performed by a program and/or module associated with the virtual world.
- the identifying and/or keeping a record of the identified occurrences is performed by a program and/or module not associated with the virtual world.
- some embodiments enable a participant to submit an inquiry whether an occurrence of a loss has been identified by a system implementing an embodiment as a loss described in a risk mitigation agreement. For example, a participant may inquire whether a recent loss of a power or a property experienced by the participant is a loss described in a risk mitigation agreement, and/or whether benefits will be transferred under the risk mitigation agreement. Other embodiments enable a participant to submit an inquiry directed toward whether an occurrence of a loss was identified as a loss described in a risk mitigation agreement. Continuing with the example, the participant may receive a response to their query confirming or denying that the recent loss of a power or a property experienced by the participant is a loss described in a risk mitigation agreement, and/or whether benefits will be transferred under the risk mitigation agreement.
- FIG. 29 illustrates a partial view of an exemplary system 1380 in which embodiments may be implemented.
- the system includes a covered-loss detection module 1384 and a claims module 1390 .
- the covered-loss detection module includes an operability to identify an occurrence of a defined loss in a virtual world suffered by a participant of at least two participants (hereafter referred to as “the participant”) that participate in the virtual world.
- the defined loss is described in a risk management agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the defined loss in the virtual world.
- the claims module includes an operability to send a signal indicative of the occurrence of a defined loss in the virtual world.
- the covered-loss detection module 1384 further includes an event-checking module 1386 operable to monitor the virtual world for an occurrence of a loss in the virtual world suffered by the participant.
- the event-checking module may include a loss table 1388 that includes at least two preselected losses that the participant might suffer in the virtual world.
- the event-checking module monitors the participant's activity in the virtual world and may generate event data indicative of one or more events correlating to one or more preselected losses of the loss table. Periodically, the event data may be searched for an instance of the defined loss, and any found instances of a defined loss may be saved in a storage medium 1392 and/or provided to a data recipient.
- the covered-loss detection module includes a defined loss table 1385 corresponding with at least the defined loss.
- the claims module 1390 includes a claims module operable to receive a benefit claim corresponding to the occurrence of a defined loss in the virtual world 1397 . In an embodiment, the claims module includes a claims module operable to approve a benefit claim corresponding to the occurrence of a defined loss in the virtual world 1398 .
- FIG. 30 illustrates a partial view of an exemplary system 1400 in which embodiments may be implemented.
- the system includes a computing system 1402 couplable to a network.
- the system also includes an overseer module 1406 operable to monitor a virtual world for an occurrence of a loss defined in an agreement.
- the virtual world includes a virtual world configured to interact with at least two participants via a network.
- the agreement includes an obligation of a protection entity to provide a benefit to a participant of the at least two participants (hereafter referred to as “the participant”) upon an occurrence of the defined loss in the virtual world.
- the system further includes a reporting module 1408 operable to transmit via the network a signal indicative of an occurrence of a loss defined in the agreement.
- the overseer module 1406 operable to monitor a virtual world for an occurrence of a loss defined in an agreement includes an overseer module operable to monitor a virtual world for at least one of a prior, a current, and/or an anticipated occurrence of a loss defined in an agreement.
- the reporting module 1408 operable to transmit via the network a signal indicative of a monitored occurrence of a loss defined in the agreement includes a reporting module operable to transmit via the network a signal indicative of a monitored occurrence of a loss defined in the agreement to at least one of the protection entity, to the participant, a third-party, and/or manager of the virtual world.
- the system 1400 includes a claim module 1412 operable to respond to an inquiry corresponding to the monitored occurrence of a defined loss in the virtual world.
- the claims module is operable to verify and/or deny the inquiry.
- the claims module is operable to respond to a participant and/or a participant protection entity.
- FIG. 31 illustrates an exemplary operational flow 1450 in which embodiments may be implemented.
- the operational flow moves to a supervision operation 1460 .
- the supervision operation monitors a virtual world operable to interact with a participant over a network.
- a dissemination operation 1470 transmits a reporting signal indicative of an identified occurrence of a protected loss in the virtual world suffered by the participant.
- the reporting signal may be transmitted to at least one of the protection entity, the participant, a third party, and/or a manager of the virtual world.
- the protected loss includes a protected loss 1472 described in an agreement that includes an obligation of a protection entity to provide a benefit to the participant upon the participant suffering an occurrence of the protected loss in the virtual world.
- the operational flow proceeds to an end operation.
- the operational flow may include at least one additional operation 1480 .
- the at least one additional operation may include an operation 1482 , and/or an operation 1484 .
- the operation 1482 monitors the virtual world for the occurrence of a protected loss.
- the operation 1484 responds to a benefit claim corresponding to a purported occurrence of a protected loss suffered by the participant in the virtual world based at least in part on the identified occurrence of a protected loss in the virtual world.
- the operation 1484 response includes at least one of verifying, denying, and/or explaining a benefit claim corresponding to a purported occurrence of a protected loss suffered by the participant.
- FIG. 32 illustrates a partial view of an exemplary computer-program product 1500 in which embodiments may be implemented.
- the computer-program product includes a computer-readable signal-bearing medium 1502 bearing program instructions 1504 for executing a computer process in a computing system.
- the computer-program product encodes the computer program for executing the computer process.
- the computer process includes monitoring a virtual world configured to interact with at least two participants over a network for an occurrence of a loss defined in an agreement.
- the agreement includes an obligation of a protection entity to provide a benefit to a participant of the at least two participants (hereafter referred to as “the participant”) upon an occurrence of the defined loss in the virtual world.
- the computer process also includes transmitting a signal indicative of a monitored occurrence of a loss defined in the agreement.
- the process of the program instructions may also include at least one additional process.
- the at least one additional process may include a process 1506 , a process 1508 , and/or a process 1510 .
- the program instructions at the process 1506 include operating the virtual world.
- the operating the virtual world may include managing the virtual world, controlling at least one aspect of the virtual world, directing the virtual world, running the virtual world, and/or activating the virtual world.
- the program instructions at the process 1508 include operating the protection entity.
- the program instructions at the process 1510 include responding to an inquiry corresponding to a monitored occurrence of a defined loss in the virtual world.
- the computer-readable signal-bearing medium includes a computer storage medium 1512 .
- the computer-readable signal-bearing medium includes a communication medium 1514 .
- FIG. 33 illustrates a partial view of an exemplary article of manufacture 1520 in which embodiments may be implemented.
- the article includes a computer-readable signal-bearing medium 1522 and a signal 1524 borne by the computer-readable signal-bearing medium.
- the signal is indicative of a detected occurrence of a defined loss described in an agreement, and generated in response to monitoring a virtual world for an occurrence of the defined loss described in an agreement.
- the virtual world includes a virtual world operable to interact with a plurality of participants over a network.
- the agreement includes an obligation of a protection entity to provide a benefit to a participant upon an occurrence of the defined loss by the participant in the virtual world in exchange for a consideration.
- the computer-readable signal-bearing medium includes at least a portion of digital network physical transmission medium 1526 . In another embodiment, the computer-readable signal-bearing medium includes at least a portion of digital network wireless transmission medium 1528 . In a further embodiment, the computer-readable signal-bearing medium includes a computer-readable signal-bearing medium 1532 .
- new and advantageous features provide benefits to those individuals who participate in virtual world environments, as well as benefits to participant entities that provide risk mitigation in virtual world environments.
- some embodiments detect occurrences of a defined loss in a virtual world environment suffered by a participant.
- a detection module may identify an instance of a damage to property in which the participant has an interest may be detected, or a loss of a power by an avatar managed by the participant.
- An example of damage to a property may include theft of a virtual world property of another participant, or flood damage to a virtual world property.
- a claims module may send a notice to the participant telling them their property was stolen, or that a flood has damaged their property.
- the notice may be sent to the virtual world environment and/or a participant protection entity.
- the detection module and the claims module are not associated with the virtual world environment.
- Theses modules may be associated with a third party, such as a trusted third party, or the protection entity. In another embodiment, the modules may be associated with the virtual world environment.
- FIG. 34 illustrates a partial view of an exemplary system 1550 in which embodiments may be implemented.
- the system includes a computing system 1552 couplable to a virtual world via a network.
- the system also includes instructions 1554 .
- the instructions when executed on the computing system cause the computing system to generate a signal responsive to a received participant input and operable to affect a character in the virtual world.
- the instructions also cause the computing device to identify an occurrence of a defined loss suffered by the character.
- the defined loss is described in a risk management agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence in the virtual world of the defined loss.
- the instructions that cause the computing system to identify an occurrence of a defined loss suffered by the character include instructions that cause the computing system to monitor the virtual world for an occurrence of the defined loss.
- the computing system may monitor the virtual world for a current and/or real time occurrence of the defined loss.
- the computing system may monitor the virtual world for a prior occurrence of the defined loss.
- the instructions further cause the computing system to display an information corresponding to the identified occurrence of the defined loss.
- the instructions further cause the computing system to display an information corresponding to the identified occurrence of the defined loss in response to a received input from the participant.
- the instructions further cause the computing system to transmit a signal indicative of a claim for a benefit based at least in part upon the identified occurrence of the defined loss.
- the instructions further cause the computing system to transmit a signal indicative of a claim for a benefit based at least in part upon the identified occurrence of the defined loss in response to a received input from the participant.
- FIG. 35 illustrates an exemplary operational flow 1600 in which embodiments may be implemented.
- the control operation sends a signal responsive to a received participant input and operable to affect a character in a virtual world.
- the participant input is physically received by a computing system, such as the computing system 20 of FIG. 1 or the computing system 100 of FIG. 2 , and the corresponding signal is transmitted to the virtual world via a network, such as the Internet.
- the signal is used by the virtual world to affect the character in the virtual world, such as moving an arm of an avatar.
- a detection operation 1620 identifies an occurrence in the virtual world of a loss defined in an agreement.
- the detection operation is performed by a computing system that physically received the participant input. In another embodiment, the detection operation is performed by a computing system or computing device remote from the computing device that physically received the participant input.
- a request operation 1630 sends a claim for a benefit corresponding to the identified occurrence of the defined loss.
- the claim for a benefit is transmitted to a non-participant protection entity associated with the virtual world.
- the claim for a benefit is transmitted to a participant protection entity.
- the operational flow proceeds to an end operation.
- FIG. 36 illustrates an alternative embodiment of the operational flow 1600 of FIG. 35 .
- the control operation 1610 may include at least one additional operation, such as an operation 1612 , and/or an operation 1614 .
- the operation 1612 sends a signal that corresponds to a received participant input and affects a representation of the participant in a virtual world.
- the operation 1614 sends a signal that corresponds to a received participant input and affects a virtual character that represents a real-world participant in a virtual world.
- the request operation 1630 may include at least one additional operation, such as an operation 1632 .
- the operation 1632 sends a claim for a benefit based at least in part upon the identified occurrence of the defined loss in response to a received participant input.
- FIG. 37 illustrates an alternative embodiment of the operational flow 1600 of FIG. 35 .
- the operational flow may include a communication operation 1642 that displays a benefit information related to the identified occurrence of the defined loss.
- FIG. 38 illustrates a partial view of an exemplary computer-program product 1650 in which embodiments may be implemented.
- the computer-program product includes a computer-readable signal-bearing medium 1652 bearing program instructions 1654 .
- the program instructions are operable to perform a process in a computer system.
- the process includes sending a signal that corresponds to a received participant input and affects a character in a virtual world.
- the process further includes identifying an occurrence of a defined loss suffered by the character, the defined loss described in a risk management agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence in the virtual world of the defined loss.
- the process also includes transmitting a signal indicative of a claim for a benefit based at least in part upon the identified occurrence of the defined loss.
- the computer-readable signal-bearing medium includes a computer storage medium 1656 .
- the computer-readable signal-bearing medium includes a communication medium 1658 .
- FIG. 39 illustrates a partial view of an exemplary system 1700 in which embodiments may be implemented.
- the system includes a computing system 1702 couplable to a virtual world via a network, and instructions 1710 .
- the instructions when executed by the computing system cause the computing system to send a signal corresponding to a received participant input and acceptable by a virtual world to influence a character in the virtual world.
- the instructions further cause the computing system to send a signal indicative of a benefit claim corresponding to an occurrence of a defined loss suffered by the character in the virtual world.
- the loss is defined in an agreement that includes an obligation of a protection entity to provide the benefit to the character upon the character suffering an occurrence of the defined loss in the virtual world.
- the instructions cause the computing system to perform at least one additional operation.
- the at least one additional operation may include an operation 1712 , an operation 1714 , an operation 1716 , an operation 1726 , and/or an operation 1728 .
- the instructions further cause the computing system to receive a signal indicative of the character suffering the occurrence of a defined loss in the virtual world.
- the instructions further cause the computing system to identify the occurrence of a defined loss suffered by the character in the virtual world.
- the instructions further cause the computing system to monitor the virtual world for the occurrence of a defined loss suffered by the character in the virtual world.
- the network includes at least one of a private computer network, a public computer network, and the Internet.
- the instructions that cause the computing system to send a signal indicative of a benefit claim corresponding to an occurrence of a defined loss suffered by the character in the virtual world include instructions that cause the computing system to send a signal indicative of a benefit claim corresponding to an occurrence of a defined loss suffered by the character in the virtual world to the protection entity at least one of the virtual world, or the protection entity.
- FIG. 40 illustrates an alternative embodiment of the instructions 1710 of the exemplary system 1700 of FIG. 39 .
- the instructions further cause the computing system to display information related to the occurrence of the defined loss.
- the operation 1720 may cause the computing system to perform at least one additional operation.
- the at least one additional operation may include an operation 1722 and/or an operation 1724 .
- the instructions cause the computing system to display at least one of visual, audible, and/or tactile information related to the occurrence of the defined loss.
- the instructions cause the computing system to display information related to the occurrence of the defined loss in a dialog box.
- FIG. 41 illustrates a partial view of an exemplary computer-program product 1740 in which embodiments may be implemented.
- the computer-program product includes a computer-readable signal-bearing medium 1742 bearing program instructions 1744 for executing a computer process in a computing system.
- the computer-program product encodes the computer program for executing the computer process.
- the computer process includes accepting a participant input operating a virtual character in a virtual world.
- the computer process also includes receiving a signal indicative of a monitored occurrence of a defined loss suffered by the character in the virtual world.
- the loss is described in an agreement that includes an obligation of a protection entity to provide the benefit to the character upon the character suffering an occurrence of the defined loss in the virtual world.
- the computer process further includes displaying information related to the monitored occurrence of the defined loss.
- the process of the program instructions may also include at least one additional operation, such as the operation 1746 .
- the process further includes sending a signal indicative of a benefit claim corresponding to the monitored occurrence of a defined loss suffered by the character in the virtual world.
- the computer-readable signal-bearing medium includes a computer storage medium 1748 .
- the computer-readable signal-bearing medium includes a communication medium 1749 .
- FIG. 42 illustrates an exemplary operational flow 1760 in which embodiments may be implemented.
- the request operation sends a claim for a benefit corresponding to a purported occurrence of a defined loss described in an agreement and suffered by a participant in a virtual world.
- the virtual world includes an operability to interact with at least two participants over a network.
- the agreement includes an obligation of a protection entity to provide the benefit to the participant upon an occurrence of the defined loss suffered in the virtual world by the participant.
- a communication operation 1780 receives a signal responsive to a correlation of the purported occurrence of a defined loss in the virtual world and an identified occurrence of a defined loss in the virtual world.
- a broadcast operation 1790 displays a participant information corresponding to the correlation of the purported occurrence of a defined loss in the virtual world and an identified occurrence of a defined loss in the virtual world.
- the broadcast operation provides a visual display, and/or an audible display.
- the broadcast operation displays a participant information in a dialog box. For example, in response to a received signal responsive to a positive correlation of the purported occurrence of a defined loss in the virtual world and an identified occurrence of a defined loss in the virtual world, the dialog box may visually communicate that the claim for a benefit is verified and/or allowed.
- the dialog box may visually communicate that the claim for a benefit is not verified and/or is therefore denied.
- the operational flow moves to an end operation.
- the operational flow 1760 may include at least one additional operation, such as an operation 1795 .
- the operation 1795 facilitates the participant obtaining the benefit corresponding to a purported occurrence of a defined loss described in an agreement and suffered by a participant in a virtual world.
- FIG. 43 illustrates a partial view of an exemplary system 1900 in which embodiments may be implemented.
- the system includes a monitoring module 1910 and a communication module 1920 .
- the monitoring module operable to identify an occurrence of an uncovered loss in a virtual world experienced by a participant and not covered in an existing risk mitigation arrangement between the participant and a protection entity (hereafter “uncovered loss”).
- the uncovered loss includes at least one of loss occurring by reason of harm, an injury, a death of the participant, a death of another participant, damage, a casualty, a disability, and an imposed punitive obligation.
- the uncovered loss includes a loss occurring by reason of determinable contingency.
- the uncovered loss includes a loss relative to a subject matter in which the participant has an interest.
- the communication module 1920 is operable to provide a signal indicative of the identified occurrence of an uncovered loss.
- the signal indicative of the identified occurrence of an uncovered loss is provided to the participant, and/or to the protection entity.
- the communication module 1920 may include at least one additional operability.
- the at least one additional operability includes an operability 1922 , an operability 1924 , and/or an operability 1926 .
- the communication module includes an operability to display information corresponding to the identified occurrence of an uncovered loss.
- the communication module includes an operability to provide a signal indicative of a proposed risk mitigation arrangement available to the participant.
- the communication module further includes a broadcast module operable to display a proposed risk mitigation arrangement available to the participant.
- FIG. 44 illustrates a partial view of an exemplary system 1950 in which embodiments may be implemented.
- the system includes an overseer module 1960 and a reporting module 1970 .
- the overseer module is operable to monitor a virtual world for an occurrence of a preselected loss suffered by a participant and not covered in an existing risk mitigation agreement between the participant and a protection entity.
- the preselected loss includes a preselected loss of at least two preselected losses.
- the system may be implemented in the thin computing device 20 of FIG. 1 , and/or the computing system environment 100 of FIG. 2 .
- the reporting module 1970 is operable to transmit a signal indicative of a monitored occurrence of a preselected loss not covered in the existing risk mitigation agreement.
- the signal may be transmitted to the protection entity, the participant, a third party, and/or a manager of the virtual world.
- the reporting module includes at least one additional module.
- the at least one additional module may include a first marking module 1982 , a second module 1984 , a negotiation module 1986 , and/or a third marketing module 1988 .
- the first marketing module 1982 includes a marketing module operable to promote a new risk mitigation arrangement to the participant.
- the first marketing module includes a marketing module operable to promote a risk mitigation arrangement to the participant covering the monitored occurrence of a preselected loss that is not otherwise covered in any risk management agreement between the participant and the protection entity.
- the first marketing module may be running on a computing system controlled by the participant, or another computing device.
- the second marketing module 1984 includes a marketing module operable to display a promotion of a proposed risk mitigation service to the participant.
- the negotiation module 1986 includes a negotiation module operable to facilitate a formation of a new arrangement that includes the protection entity providing a benefit to the participant upon a future occurrence of a loss.
- the future occurrence of a loss includes a future occurrence of the preselected loss.
- the future occurrence of a loss includes a future occurrence of the preselected loss, a future occurrence of another preselected loss, and/or a future occurrence of a loss other than the preselected loss.
- the third marketing module 1988 includes a marketing module operable to promote to the participant a proposed risk mitigation arrangement that includes the protection entity providing a benefit to the participant upon a future occurrence of a defined loss, and a negotiation module operable to facilitate formation of the proposed risk mitigation arrangement.
- FIG. 45 illustrates an exemplary operational flow 2000 in which embodiments may be implemented.
- the detection operation identifies an occurrence of a loss in a virtual world suffered by a participant and not covered by an existing risk mitigation arrangement between the participant and a protection entity (hereafter “uncovered loss”).
- the detection operation may be performed by at least one of a virtual world provider, a program operating on a computing device operated by the participant, and/or a third party.
- the virtual world includes a virtual world capable of interacting with the participant and at least one other participant over a network.
- a notification operation 2020 generates a signal indicative of the identified occurrence of the uncovered loss.
- the operational flow then proceeds to an end operation.
- the operational flow may include an additional operation 2030 .
- the additional operation may include at least one of a display operation 2032 , and/or a generating operation 2034 .
- the displaying operation includes displaying information corresponding to the identified occurrence of an uncovered loss in the virtual world.
- the generating operation includes generating a signal indicative of an opportunity for the participant to form a new risk mitigation arrangement that includes a benefit to the participant upon a future occurrence of a loss in the virtual world in exchange for a consideration.
- the loss in the virtual world includes at least one of the uncovered loss and/or any loss.
- the in exchange for a consideration includes in exchange for at least one of a new consideration, a virtual world consideration, and/or a real world consideration.
- the generating operation 2034 may include at least one additional operation.
- the at least one additional operation may include a displaying operation 2036 and/or a receiving operation 2038 .
- the displaying operation includes displaying an information corresponding to the opportunity for the participant to form a new risk mitigation arrangement.
- the receiving operation includes receiving a signal indicative of a participant-inputted response corresponding to the opportunity for the participant to form a new risk mitigation arrangement.
- FIG. 46 illustrates a partial view of an exemplary computer-program product 2050 in which embodiments may be implemented.
- the computer-program product includes a computer-readable signal-bearing medium 2052 bearing program instructions 2054 .
- the program instructions are operable to perform a process in a computer system.
- the process includes identifying an occurrence of a loss in a virtual world suffered by a participant and not covered by an existing risk mitigation arrangement between the participant and a protection entity (hereafter “uncovered loss”).
- the virtual world is operable to interact with the participant and at least one other participant over a network.
- the process also includes generating a signal indicative of the identified occurrence of the uncovered loss.
- the program instructions 2054 are further operable to perform at least one additional process in the computing system.
- the at least one additional process may include the process 2056 and/or the process 2058 .
- the process 2056 includes promoting a new risk mitigation relationship to the participant.
- the process 2058 includes facilitating formation of a new risk management arrangement that includes a benefit to the participant upon a future occurrence of a defined loss.
- the future occurrence of a defined loss may include a future occurrence of the uncovered loss and/or another loss.
- the computer-readable signal-bearing medium includes a computer storage medium 2062 .
- the computer-readable signal-bearing medium includes a communication medium 2064 .
- FIG. 47 illustrates a partial view of a system 2100 in which embodiments may be implemented.
- the system includes a virtual world in which a participant may participate.
- the virtual world also includes a loss event having a likelihood of occurrence.
- the virtual world is illustrated as a virtual world environment 2110 that includes a virtual world program 410 having at least one loss event 2112 .
- the system also includes a record of at least one protected loss corresponding to the loss event.
- the protected loss is described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant.
- the record of at least one protected loss is illustrated as a record of at least one protected loss of a first agreement 2122 .
- the first agreement may be saved in a record of arrangement(s)/agreement(s) 2120 of the computer storage medium 404 previously described in conjunction with FIG. 4 .
- the record of at least one protected loss may include a combination of at least two individual records of arrangement(s)/agreement(s).
- the combination of at least two individual records is illustrated as the record of at least one protected loss of the first agreement 2122 , a record of at least one protected loss of a second agreement 2124 , and through a record of at least one protected loss of an “N” agreement 2126 .
- the second agreement through the “N th ” agreement may likewise be saved in the record of arrangement(s)/agreement(s) 2120 of the computer storage medium 404 .
- the record of at least one protected loss is illustrated as a record of at least one protected loss 2140 .
- the record of at least one protected loss may include an aggregation of at least two individual records of at least one protected loss, such as the record of at least one protected loss of the first agreement 2122 , the record of at least one protected loss of the second agreement 2124 , and through the record of at least one protected loss of the “N th ” agreement 2126 .
- the system also includes a loss event regulator module 2150 operable to change the likelihood of occurrence of the loss event in response to the protected loss.
- the likelihood of occurrence of the loss event may be changed and/or adjusted in any manner.
- the likelihood of an occurrence of the loss event may be changed directly, changed indirectly, and/or changed by influencing the participant.
- the likelihood of a loss event may be changed directly by changing a likelihood that a loss event will occur.
- a likelihood that a participant will experience a loss event may be changed indirectly, such as by changing a likelihood that the participant will suffer another loss event before the loss event.
- a likelihood may be changed indirectly by altering a participant's experience.
- the participant's experience may be altered by limiting or expanding paths in a virtual world available to the participant, the different paths having a differing likelihood of occurrence of a loss event, thus changing a likelihood that a loss event will occur.
- a likelihood that a participant will experience a loss event may be changed by influencing the participant's behavior in the virtual world. Any type of influence may be used. For example, colors, sounds, signs, visual cues, a non-participant virtual world character (such as a Siren), diversions, pleasant experiences, environmental factors, and/or other conscious or subconscious influencing factors, manipulations, or methods may be used to steer the participant toward or away from a loss event.
- a selected influencer may also be targeted only at the participant, at the participant and another participant, or at a larger group of participants. In another embodiment, one selected influencer may be targeted toward the participant, and another selected influencer may be targeted toward another participant.
- the loss event regulator module 2150 is operable to change a likelihood of a participant becoming involved with a characteristic or aspect of a virtual world (hereafter “a virtual world event”).
- a virtual world event a likelihood of a participant becoming involved with a characteristic or aspect of a virtual world
- the likelihood is changed in response to an objective, which in an embodiment may be programmed into the loss event regulator module, or which in another embodiment may be programmed into another module operable to communicate with the loss event regulator module.
- the likelihood of occurrence of the virtual world event may be changed and/or adjusted in any manner.
- the likelihood of an occurrence of the virtual world event may be changed directly, changed indirectly, and/or changed by influencing the participant.
- the likelihood of a virtual world event may be changed directly by changing a likelihood that the virtual world event will occur.
- a likelihood that a participant will experience a virtual world event may be changed indirectly, such as by changing a likelihood that the participant will experience another virtual world event before the virtual world event.
- a likelihood may be changed indirectly by altering a participant's experience.
- the participant's experience may be altered by limiting or expanding paths in a virtual world available to the participant, the different paths having a differing likelihood of occurrence of a virtual world event, thus changing a likelihood that the virtual world event will occur.
- a likelihood that a participant will experience a virtual world event may be changed by influencing the participant's behavior in the virtual world. Any type of influence may be used.
- colors, sounds, signs, visual cues, a non-participant virtual world character such as a Siren
- diversions pleasant experiences, environmental factors, and/or other conscious or subconscious influencing factors, manipulations, or methods
- a selected influencer may also be targeted only at the participant, at the participant and another participant, or at a larger group of participants.
- one selected influencer may be targeted toward the participant, and another selected influencer may be targeted toward another participant.
- the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to an objective related to the protected loss.
- An objective may include any purpose.
- an objective includes at least one of maximizing the participant's involvement in the virtual world, and/or maximizing a profit generated by the agreement.
- the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss.
- the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another event in the virtual world.
- the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another event in the virtual world includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another loss event in the virtual world.
- the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another event in the virtual world.
- the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another event in the virtual world includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another loss event or a non-loss event in the virtual world.
- the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by leaving a likelihood of an occurrence of another event in the virtual world unchanged and decreasing the likelihood of an occurrence in the virtual world of the loss event.
- the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss.
- the loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to increase the likelihood of an occurrence of the loss event by decreasing a likelihood of another loss event occurrence in the virtual world.
- the loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to increase the likelihood of an occurrence of the loss event by leaving a likelihood of another loss event occurrence in the virtual world unchanged and increasing the likelihood of an occurrence of the loss event.
- the loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss and in response to a prediction of a result of changing the likelihood of occurrence of the loss event.
- the virtual world in which a participant may participate includes a virtual world in which at least two participants may participate.
- the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world further includes a virtual world in which a participant may participate and that includes at least two loss events each respectively having a likelihood of occurrence in the virtual world.
- the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world further includes a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world with respect to the participant.
- the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world farther includes a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world with respect to the participant and at least one other participant.
- the loss event includes a determinable contingency sufferable by the participant. In another embodiment, the loss event includes an indeterminable contingency sufferable by the participant. In a further embodiment, the loss event includes an unknown contingency sufferable by the participant. In another embodiment, the loss event includes at least one of an injury, a loss, a theft, a damage, a harm, a casualty, a disability, a loss of use, loss of income, a loss of life, a consequential loss, and/or an imposed punitive obligation suffered by the participant. In a further embodiment, the loss event includes an adverse effect on an attribute and/or association of an avatar controlled by the participant in the virtual world.
- the defined loss in the virtual world suffered by the participant includes a loss of a level privilege, an access privilege, a closing of a location, and/or a missed event.
- the loss event includes at least one of a harm, an injury, a loss of a life, a damage, a casualty, and/or a disability befalling another participant in the virtual world.
- the protected loss described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant further includes a protected loss described in an agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant.
- the protection entity is illustrated as a participant protection entity 2130 .
- the protection entity may include a non-participant protection entity, such as a protection entity associated with the virtual world environment.
- the protection entity includes a non-participant protection entity.
- the protection entity includes a non-participant protection entity.
- the non-participant protection entity includes a non-participant protection entity under a control of at least one of a provider of the virtual world, an operator of the virtual world, or a person associated with the virtual world.
- the benefit includes a compensation for the defined loss.
- the record of a protected loss corresponding to the loss event includes a record of the agreement.
- the record of a protected loss includes a record of a protected loss described in a first risk management agreement and in a second risk management agreement.
- the record of a protected loss includes a record of a protected loss described in a first agreement having an obligation of a first protection entity to provide a first benefit to a first participant upon an occurrence of the protected loss suffered by the first participant and the protected loss described in a second agreement having an obligation of a second protection entity to provide a second benefit to a second participant upon an occurrence of the protected loss suffered by the second participant.
- the first protection entity and the second protection entity are at least substantially similar.
- some embodiments enable a virtual world to mange occurrences of a loss event in the virtual world in response to outstanding risk mitigation agreements that cover the loss event.
- an owner, operator, or a manager of a virtual world may make a loss event less likely to occur in the virtual world when one or more instances of risk mitigation agreements describe the loss event as a protected loss.
- the virtual world may look at protected losses described in one or more records of risk management agreements.
- the risk management agreements may be maintained by the virtual world, and/or by a protection entity.
- an owner, operator, or a manager of a virtual world could make a loss event more likely to occur in the virtual world when one or more instances of risk mitigation agreements do not describe the loss event as a protected loss.
- FIG. 48 illustrates a partial view of an exemplary system 2200 in which embodiments may be implemented.
- the system includes a computing system 2252 couplable to a network and operable to interact with at least two participants via the network.
- the computing system includes a computing device 2254 .
- the computing device includes a program module 2260 operable to manage a virtual world that includes a loss event having a probability of occurrence.
- the computing device also includes a benefits exposure module 2270 operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants.
- the computing device further includes a loss management module 2280 operable to modify the probability of occurrence of the loss event in response to the protected loss.
- the benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants includes a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants, the risk management agreement including an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant.
- the benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants includes a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a first risk management agreement between a first protection entity and a first participant of the at least two participants, and described in a second risk management agreement between a second protection entity and a second participant of the at least two participants.
- the first protection entity and the second protection entity are at least substantially similar.
- the loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss includes a loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss and in response to a possible outcome of changing the probability of occurrence of the loss event.
- the loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss includes a loss management module operable to modify the probability of occurrence of the loss event in response to a goal related to the protected loss.
- the loss management module operable to modify the probability of occurrence of the loss event in response to a goal related to the protected loss includes a loss management module operable to modify the probability of occurrence of the loss event in response to a goal that includes at least one of increasing a satisfaction of the participant, motivating the participant, increasing revenue received by the virtual world, increasing income of the protection entity, and/or encouraging formation of another risk management agreement describing the protected loss.
- some embodiments may include managing occurrences of a loss event in a virtual world in response to outstanding risk mitigation agreements that cover the loss event.
- the virtual world is operated on a computing system, such as a server or a group of servers dedicated to operating the virtual world.
- the computing system communicates over a network, such as the Internet, with at least two individuals who participate in the virtual world.
- the virtual world may be a massive multiplayer online game, and the players may be able to act through their respective avatars in the virtual world, including competing against each other.
- the computing system includes a program module that manages the virtual world.
- the virtual world includes loss events having a probability of occurrence.
- a loss event may include a severe flood event that overwhelms and drowns an avatar.
- the program module may be programmed to implement the severe flood event on a temporally reoccurring basis.
- the severe flood event may be initially programmed to occur once each 60 minutes of a participant's avatar being active in a virtual world.
- the severe flood event may be initially programmed to occur 50% of the time a participant reaches a selected level or a selected portion of the virtual world.
- the benefits exposure module is operable to select a protected loss corresponding to a loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants.
- the benefits exposure module selects a loss event of the virtual world and then ascertains a correspondence with a protected loss.
- the benefits exposure module selects a protected loss and ascertains a correspondence with a loss event. For example, a first participant may have entered into a first agreement with a first risk management entity that provides the first participant a compensatory benefit if the first participant's avatar suffers a protected loss of drowning in a flood event.
- the benefit may include a replacement of the life of the drowned avatar.
- a second participant may have entered into a second risk management agreement that does not cover the second participant's avatar being drowned in a flood event.
- the benefit exposure module may select the flood event as a loss event and establish a positive correspondence with a protected loss of drowning in a flood event as described in the risk management agreement between the protection entity and the first participant.
- the benefit exposure module may select the flood event from a list of loss events having a probability of occurrence, and then find a positive correspondence between the flood event as a protected loss described in the first participant's agreement with the risk management entity.
- the benefit exposure module may select the flood event from a record of a protected loss described in the first participant's agreement with the risk management entity, and then find a positive correspondence from a list of loss events. Conversely, the benefit module may find a negative or no correspondence between the flood event and a protected loss of the second participant's agreement because a flood event is not a protected loss under the second agreement.
- the system further includes a loss management module.
- the loss management module modifies the probability of occurrence of the loss event in response to a correspondence found between the protected loss and the selected loss event. Continuing with the example, if the loss management module includes a goal to minimize instances of protected drowning losses, the loss management module will minimize the probability of flood type loss events.
- the loss management module may directly modify the probability of the flood event occurring to the avatar controlled by the first participant in response to the positive correspondence. The modification may be implemented by increasing the programmed time interval between flood events to once each 120 minutes of a participant's avatar being active in a virtual world.
- the modification may be implemented by programming the severe flood event to occur 30% of the time that the avatar controlled by the first participant reaches a selected level or a selected portion of the virtual world.
- the loss management module may indirectly modify the probability of the flood event occurring to the avatar controlled by the first participant.
- An indirect modification may include increasing other loss events such that the avatar controlled by the first participant is increasingly likely to lose a life through another loss event, for example, such as by a war, or as a bystander to a hostage situation.
- the modification may be implemented by influencing the first participant. For example, an overt influence may be used by blocking and/or obstructing a path to a portion of the virtual world where the flood event will occur.
- a subtle or manipulative technique may be used to influence the first participant away from the flood event, such as coloring a path away from the flood event in a commonly selected color, and/or such as associating an alluring figure or a Siren with the path away from the flood event:
- the loss management module may increase the probability of the flood event occurring to the avatar controlled by the second participant in response to the negative correspondence. For example, the interval between flood events may be reduced to 30 minutes.
- FIG. 49 illustrates an exemplary operational flow 2300 in which embodiments may be implemented.
- the administration operation manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world.
- a picking operation 2320 selects a protected loss corresponding to the at least one loss event, the protected loss described in an agreement that includes an obligation of a protection entity to provide a benefit to a participant of at least one participant upon an occurrence of the selected protected loss in the virtual world.
- An adjustment operation 2330 modifies the incidence of the at least one loss event in response to the selected protected loss.
- the operational flow then process to an end operation.
- a loss event having a modifiable incidence includes a loss event having a modifiable occurrence, a modifiable frequency, a modifiable rate, and/or a modifiable mode.
- FIG. 50 illustrates an alternative embodiment of the exemplary operational flow 2300 of FIG. 49 .
- the administration operation 2310 may include at least one additional operation.
- the at least one additional operation may include an operation 2312 , and/or an operation 2314 .
- the operation 2312 manages a virtual world operable to interact with at least one participant over a network and that includes at least two loss events each respectively having a modifiable incidence in the virtual world.
- the operation 2314 manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable temporal rate of occurrence in the virtual world.
- FIG. 51 illustrates another alternative embodiment of the exemplary operational flow 2300 of FIG. 49 .
- the administration operation 2310 may include at least one additional operation.
- the at least one additional operation may include an operation 2316 , and/or an operation 2318 .
- the operation 2316 manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable circumstance of occurrence in the virtual world.
- the operation 2318 manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence of occurrence in the virtual world.
- FIG. 52 illustrates a further alternative embodiment of the exemplary operational flow 2300 of FIG. 49 .
- the picking operation 2320 may include at least one additional operation, such as an operation 2322 .
- the protected loss described in an agreement includes a protected loss described in a first risk management agreement and in a second risk management agreement.
- the adjustment operation 2330 may include at least one additional operation, such as an operation 2332 and/or an operation 2334 .
- the modifying the incidence of the at least one loss event in response to the selected protected loss includes modifying the incidence of the at least one loss event in response to the selected protected loss and in response to a projected result of modifying the incidence of the loss event.
- the modifying the incidence of the at least one loss event in response to the selected protected loss includes modifying the incidence of the at least one loss event in response to the selected protected loss and in response to a goal corresponding to the protected loss.
- an implementer may opt for a mainly hardware and/or firmware vehicle; alternatively, if flexibility is paramount, the implementer may opt for a mainly software implementation; or, yet again alternatively, the implementer may opt for some combination of hardware, software, and/or firmware.
- any vehicle to be utilized is a choice dependent upon the context in which the vehicle may be deployed and the specific concerns (e.g., speed, flexibility, or predictability) of the implementer, any of which may vary.
- Those skilled in the art will recognize that optical aspects of implementations will require optically-oriented hardware, software, and or firmware.
- ASICs Application Specific Integrated Circuits
- FPGAs Field Programmable Gate Arrays
- DSPs digital signal processors
- ASICs Application Specific Integrated Circuits
- FPGAs Field Programmable Gate Arrays
- DSPs digital signal processors
- those skilled in the art will recognize that some aspects of the embodiments disclosed herein, in whole or in part, can be equivalently implemented in standard integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of skill in the art in light of this disclosure.
- a signal bearing media include, but are not limited to, the following: recordable type media such as floppy disks, hard disk drives, CD ROMs, digital tape, and computer memory; and transmission type media such as digital and analog communication links using TDM or IP based communication links (e.g., packet links).
- any two components herein combined to achieve a particular functionality can be seen as “associated with” each other such that the desired functionality is achieved, irrespective of architectures or intermedial components.
- any two components so associated can also be viewed as being “operably connected,” or “operably coupled,” to each other to achieve the desired functionality.
- operably couplable any two components capable of being so associated can also be viewed as being “operably couplable” to each other to achieve the desired functionality.
- operably couplable include but are not limited to physically mateable and/or physically interacting components and/or wirelessly interactable and/or wirelessly interacting components.
Abstract
Embodiments include an apparatus, device, system, computer-program product, and method. In an embodiment, a computer-implemented system includes a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence. The computer-implemented system also includes a record of a protected loss corresponding to the loss event, the protected loss described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant. The computer-implemented system further includes a loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss.
Description
- The present application is related to and claims the benefit of the earliest available effective filing date(s) from the following listed application(s) (the “Related Applications”) (e.g., claims earliest available priority dates for other than provisional patent applications or claims benefits under 35 USC § 119(e) for provisional patent applications, for any and all parent, grandparent, great-grandparent, etc. applications of the Related Application(s)).
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled VIRTUAL CREDIT IN SIMULATED ENVIRONMENTS, naming Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Feb. 4, 2005, Ser. No. 11/051,514, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled PAYMENT OPTIONS FOR VIRTUAL CREDIT, naming Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Feb. 28, 2005, Ser. No. 11/069,905, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled VIRTUAL CREDIT WITH TRANSFERABILITY, naming Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Mar. 30, 2005, Ser. No. 11/096,265, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled VIRTUAL WORLD ESCROW USER INTERFACE, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Aug. 26, 2005, Ser. No. 11/213,442, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled RISK MITIGATION IN A VIRTUAL WORLD, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Jul. 27, 2005, Ser. No. 11/191,252, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled PARTICIPATING IN RISK MITIGATION IN A VIRTUAL WORLD, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Jul. 27, 2005, Ser. No. 11/191,248, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled PROVIDING RISK MITIGATION IN A VIRTUAL WORLD, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Jul. 27, 2005, Ser. No. 11/191,233, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled TRACKING A PARTICIPANT LOSS IN A VIRTUAL WORLD, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Sep. 23, 2005, Serial No.______, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled REPORTING A PARTICIPANT LOSS IN A VIRTUAL WORLD, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Sep. 23, 2005, Serial No.______, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled IDENTIFYING A PARTICIPANT LOSS IN A VIRTUAL WORLD, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Sep. 23, 2005, Serial No.______, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled REPORTING A NON-MITIGATED LOSS IN A VIRTUAL WORLD, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Sep. 23, 2005, Serial No.______, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled REAL WORLD INTERACTION WITH VIRTUAL WORLD PRIVILEGES, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Sep. 15, 2005, Ser. No. 11/228,043, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled REAL-WORLD INCENTIVES OFFERED TO VIRTUAL WORLD PARTICIPANTS, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Sep. 27, 2005, Serial No.______, which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date;
- For purposes of the USPTO extra-statutory requirements, the present application constitutes a continuation in part of United States patent application entitled RATING TECHNIQUE FOR VIRTUAL WORLD ENVIRONMENT, naming Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, and John D. Rinaldo, Jr. as inventors, filed Aug. 12, 2005, Ser. No. 11/202,964 which is currently co-pending, or is an application of which a currently co-pending application listed as a Related Application is entitled to the benefit of the filing date.
- The United States Patent Office (USPTO) has published a notice to the effect that the USPTO's computer programs require that patent applicants reference both a serial number and indicate whether an application is a continuation or continuation-in-part. The present applicant entity has provided above a specific reference to the application(s) from which priority is being claimed as recited by statute. Applicant entity understands that the statute is unambiguous in its specific reference language and does not require either a serial number or any characterization, such as “continuation” or “continuation-in-part,” for claiming priority to U.S. patent applications. Notwithstanding the foregoing, applicant entity understands that the USPTO's computer programs have certain data entry requirements, and hence applicant entity is designating the present application as a continuation-in-part of its parent applications as set forth above, but expressly points out that such designations are not to be construed in any way as any type of commentary and/or admission as to whether or not the present application contains any new matter in addition to the matter of its parent application(s).
- All subject matter of the Related Applications and of any and all parent, grandparent, great-grandparent, etc. applications of the Related Applications is incorporated herein by reference to the extent such subject matter is not inconsistent herewith.
- An embodiment provides a computer-implemented system. The computer-implemented system includes a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence. The computer-implemented system also includes a record of a protected loss corresponding to the loss event, the protected loss described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant. The computer-implemented system further includes a loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss. In addition to the foregoing, other system embodiments are described in the claims, drawings, and text form a part of the present application.
- Another embodiment provides a system. The system includes a computing system couplable to a network and operable to interact with at least two participants via the network. The system also includes a program module operable to manage a virtual world that includes a loss event having a probability of occurrence. The system further includes a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants (hereafter “the participant”). The system also includes a loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss. In addition to the foregoing, other system embodiments are described in the claims, drawings, and text form a part of the present application.
- A further embodiment provides a computer-implemented method. The computer-implemented method includes managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world. The method also includes selecting a protected loss corresponding to the at least one loss event. The protected loss being described in an agreement that includes an obligation of a protection entity to provide a benefit to a participant of at least one participant upon an occurrence of the selected protected loss in the virtual world. The method further includes modifying the incidence of the at least one loss event in response to the selected protected loss. In addition to the foregoing, other method embodiments are described in the claims, drawings, and text form a part of the present application.
- The foregoing is a summary and thus by necessity contains simplifications, generalizations and omissions of detail. Consequently, those skilled in the art will appreciate that the summary is illustrative only and is not intended to be in any way limiting. Other aspects, inventive features, and advantages of the devices and/or processes described herein, as defined by the claims, will become apparent by reference to the drawings and the following detailed description.
-
FIG. 1 illustrates an exemplary system in which embodiments may be implemented, including a thin computing device; -
FIG. 2 illustrates another exemplary system in which embodiments may be implemented, including a general-purpose computing device; -
FIG. 3 illustrates a partial view of an exemplary system; -
FIG. 4 illustrates an exemplary environment that includes a partial view of a system; -
FIG. 5 illustrates an exemplary operational flow; -
FIG. 6 illustrates an alternative embodiment of the exemplary operational flow ofFIG. 5 ; -
FIG. 7 illustrates another alternative embodiment of the exemplary operational flow ofFIG. 5 ; -
FIG. 8 illustrates a partial view of an exemplary computer-program product; -
FIG. 9 illustrates a partial view of an exemplary environment in which embodiments may be implemented; -
FIG. 10 illustrates a partial view of an environment in which embodiments may be implemented; -
FIG. 11 illustrates a partial view of an exemplary networked environment; -
FIG. 12 illustrates an exemplary operational flow; -
FIG. 13 illustrates an alternative embodiment of the exemplary operational flow ofFIG. 12 ; -
FIG. 14 illustrates another alternative embodiment of the exemplary operational flow ofFIG. 12 ; -
FIG. 15 illustrates a partial view of an exemplary computer-program product; -
FIG. 16 illustrates an exemplary operational flow; -
FIG. 17 illustrates an alternative embodiment of the exemplary operational flow ofFIG. 16 ; -
FIG. 18 illustrates another alternative embodiment of the exemplary operational flow ofFIG. 16 ; -
FIG. 19 illustrates a further alternative embodiment of the exemplary operational flow ofFIG. 16 ; -
FIG. 20 illustrates an alternative embodiment of the exemplary operational flow ofFIG. 16 ; -
FIG. 21 illustrates another alternative embodiment of the exemplary operational flow ofFIG. 16 ; -
FIG. 22 illustrates a partial view of an exemplary system; -
FIG. 23 illustrates a partial view of an exemplary computer-program product; -
FIG. 24 illustrates an exemplary schematic timing diagram of risk management opportunities that are possible in a virtual world environment among participants and entities; -
FIG. 25 illustrates a partial view of a system in which embodiments may be implemented; -
FIG. 26 illustrates a partial view of an exemplary system in which embodiments may be implemented -
FIG. 27 illustrates an exemplary operational flow in which embodiments may be implemented; -
FIG. 28 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented; -
FIG. 29 illustrates a partial view of an exemplary system in which embodiments may be implemented; -
FIG. 30 illustrates a partial view of an exemplary system in which embodiments may be implemented; -
FIG. 31 illustrates an exemplary operational flow in which embodiments may be implemented; -
FIG. 32 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented; -
FIG. 33 illustrates a partial view of an exemplary article of manufacture in which embodiments may be implemented; -
FIG. 34 illustrates a partial view of an exemplary system in which embodiments may be implemented; -
FIG. 35 illustrates an exemplary operational flow in which embodiments may be implemented; -
FIG. 36 illustrates an alternative embodiment of the operational flow ofFIG. 35 ; -
FIG. 37 illustrates an alternative embodiment of the operational flow ofFIG. 35 ; -
FIG. 38 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented; -
FIG. 39 illustrates a partial view of an exemplary system in which embodiments may be implemented; -
FIG. 40 illustrates an alternative embodiment of the instructions of the exemplary system ofFIG. 39 ; -
FIG. 41 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented; -
FIG. 42 illustrates an exemplary operational flow in which embodiments may be implemented; -
FIG. 43 illustrates a partial view of an exemplary system in which embodiments may be implemented; -
FIG. 44 illustrates a partial view of an exemplary system in which embodiments may be implemented; -
FIG. 45 illustrates an exemplary operational flow in which embodiments may be implemented; -
FIG. 46 illustrates a partial view of an exemplary computer-program product in which embodiments may be implemented; -
FIG. 47 illustrates a partial view of a system in which embodiments may be implemented; -
FIG. 48 illustrates a partial view of an exemplary system in which embodiments may be implemented; -
FIG. 49 illustrates an exemplary operational flow in which embodiments may be implemented; -
FIG. 50 illustrates an alternative embodiment of the exemplary operational flow ofFIG. 49 ; -
FIG. 51 illustrates another alternative embodiment of the exemplary operational flow ofFIG. 49 ; and -
FIG. 52 illustrates a further alternative embodiment of the exemplary operational flow ofFIG. 49 . - In the following detailed description of exemplary embodiments, reference is made to the accompanying drawings, which form a part hereof. In the several figures, like referenced numerals identify like elements. The detailed description and the drawings illustrate exemplary embodiments. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented here. The following detailed description is therefore not to be taken in a limiting sense, and the scope of the claimed subject matter is defined by the appended claims.
-
FIGS. 1 and 2 are intended to provide a brief, general description of an illustrative and/or suitable exemplary environment in which embodiments may be implemented. An exemplary system may include athin computing device 20 ofFIG. 1 or thecomputing system environment 100 ofFIG. 2 .FIGS. 1 and 2 are examples of environments and are not intended to suggest any limitation as to the structure, scope of use, or functionality of an embodiment. An embodiment should not be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in an exemplary operating environment. For example, in certain instances, elements of an environment may be deemed not necessary and omitted. In other instances, other elements may be deemed necessary and added. -
FIG. 1 illustrates an exemplary system that includes athin computing device 20 that interfaces with an electronic device (not shown) that may include one or more functional elements 51. For example, the electronic device may include any item having electrical and/or electronic components playing a role in a functionality of the item, such as a limited resource computing device, a game console, a digital camera, a cell phone, a printer, a refrigerator, a car, and an airplane. Thethin computing device 20 includes aprocessing unit 21, asystem memory 22, and a system bus 23 that couples various system components including thesystem memory 22 to theprocessing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read-only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system (BIOS) 26, containing the basic routines that help to transfer information between sub-components within thethin computing device 20, such as during start-up, is stored in theROM 24. A number of program modules may be stored in theROM 24 and/orRAM 25, including anoperating system 28, one ormore application programs 29,other program modules 30, andprogram data 31. - A user may enter commands and information into the
computing device 20 through input devices, such as a number of switches and buttons, illustrated ashardware buttons 44, connected to the system via asuitable interface 45. Input devices may further include a touch-sensitive display screen 32 with suitableinput detection circuitry 33. The output circuitry of the touch-sensitive display 32 is connected to the system bus 23 via avideo driver 37. Other input devices may include amicrophone 34 connected through asuitable audio interface 35, and a physical hardware keyboard (not shown). In addition to thedisplay 32, thecomputing device 20 may include other peripheral output devices, such as at least onespeaker 38. - Other external input or
output devices 39, such as a joystick, game pad, satellite dish, scanner, or the like may be connected to theprocessing unit 21 through aUSB port 40 and USB port interface 41, to the system bus 23. Alternatively, the other external input andoutput devices 39 may be connected by other interfaces, such as a parallel port, game port or other port. Thecomputing device 20 may further include or be capable of connecting to a flash card memory (not shown) through an appropriate connection port (not shown). Thecomputing device 20 may further include or be capable of connecting with a network through anetwork port 42 andnetwork interface 43, and/or throughwireless port 46 andcorresponding wireless interface 47. Such a connection may be provided to facilitate communication with other peripheral devices, including other computers, printers, and so on (not shown). It will be appreciated that the various components and connections shown are exemplary and other components and means of establishing communications links may be used. - The
computing device 20 may be primarily designed to include a user interface having a character, key-based, other user data input via the touchsensitive display 32 using a stylus (not shown). Moreover, the user interface is not limited to an actual touch-sensitive panel arranged for directly receiving input, but may alternatively or in addition respond to another input device, such as themicrophone 34. For example, spoken words may be received at themicrophone 34 and recognized. Alternatively, thecomputing device 20 may be designed to include a user interface having a physical keyboard (not shown). - The device functional elements (not shown) are typically application specific and related to a function of the electronic device. The device functional elements are driven by a device functional element(s)
interface 50, which coupled with the system bus 23. A functional element may typically perform a single well-defined task with little or no user configuration or setup, such as a refrigerator keeping food cold, a cell phone connecting with an appropriate tower and transceiving voice or data information, and a camera capturing and saving an image. -
FIG. 2 illustrates another exemplary system in which embodiments may be implemented.FIG. 2 illustrates a general-purpose computing system, shown as acomputing system environment 100. Components of thecomputing system environment 100 may include, but are not limited to, acomputing device 110 having aprocessing unit 120, asystem memory 130, and asystem bus 121 that couples various system components including the system memory to theprocessing unit 120. Thesystem bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, also known as Mezzanine bus. - The
computing system environment 100 typically includes a variety of computer-readable media products. Computer-readable media may include any media that can be accessed by thecomputing device 110 and include both volatile and nonvolatile media, removable and non-removable media. By way of example, and not of limitation, computer-readable media may include computer storage media and communications media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. Computer storage media include, but are not limited to, random-access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory, or other memory technology, CD-ROM, digital versatile disks (DVD), or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage, or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by thecomputing device 110. Communications media typically embody computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communications media include wired media such as a wired network and a direct-wired connection and wireless media such as acoustic, RF, optical, and infrared media. Combinations of any of the above should also be included within the scope of computer-readable media. - The
system memory 130 includes computer storage media in the form of volatile and nonvolatile memory such asROM 131 andRAM 132. A basic input/output system (BIOS) 133, containing the basic routines that help to transfer information between elements within thecomputing device 110, such as during start-up, is typically stored inROM 131.RAM 132 typically contains data and program modules that are immediately accessible to or presently being operated on by processingunit 120. By way of example, and not limitation,FIG. 2 illustrates anoperating system 134, application programs 135,other program modules 136, andprogram data 137. Often, theoperating system 134 offers services to applications programs 135 by way of one or more application programming interfaces (APIs) (not shown). Because theoperating system 134 incorporates these services, developers of applications programs 135 need not redevelop code to use the services. Examples of APIs provided by operating systems such as Microsoft's “WINDOWS” are well known in the art. - The
computing device 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media products. By way of example only,FIG. 2 illustrates a non-removable non-volatile memory interface (hard disk interface) 140 that reads from and writes to non-removable, non-volatile magnetic media, amagnetic disk drive 151 that reads from and writes to a removable, non-volatilemagnetic disk 152, and anoptical disk drive 155 that reads from and writes to a removable, non-volatileoptical disk 156 such as a CD ROM. Other removable/nonremovable, volatile/non-volatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, DVDs, digital video tape, solid state RAM, and solid state ROM. Thehard disk drive 141 is typically connected to thesystem bus 121 through a non-removable memory interface, such as theinterface 140, andmagnetic disk drive 151 andoptical disk drive 155 are typically connected to thesystem bus 121 by a removable non-volatile memory interface, such asinterface 150. - The drives and their associated computer storage media discussed above and illustrated in
FIG. 2 provide storage of computer-readable instructions, data structures, program modules, and other data for thecomputing device 110. InFIG. 2 , for example,hard disk drive 141 is illustrated as storing anoperating system 144,application programs 145,other program modules 146, andprogram data 147. Note that these components can either be the same as or different from theoperating system 134, application programs 135,other program modules 136, andprogram data 137. Theoperating system 144,application programs 145,other program modules 146, andprogram data 147 are given different numbers here to illustrate that, at a minimum, they are different copies. A user may enter commands and information into thecomputing device 110 through input devices such as amicrophone 163,keyboard 162, andpointing device 161, commonly referred to as a mouse, trackball, or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, and scanner. These and other input devices are often connected to theprocessing unit 120 through auser input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port, or a universal serial bus (USB). Amonitor 191 or other type of display device is also connected to thesystem bus 121 via an interface, such as avideo interface 190. In addition to the monitor, computers may also include other peripheral output devices such asspeakers 197 andprinter 196, which may be connected through an outputperipheral interface 195. - The
computing system environment 100 may operate in a networked environment using logical connections to one or more remote computers, such as aremote computer 180. Theremote computer 180 may be a personal computer, a server, a router, a network PC, a peer device, or other common network node, and typically includes many or all of the elements described above relative to thecomputing device 110, although only amemory storage device 181 has been illustrated inFIG. 2 . The logical connections depicted inFIG. 2 include a local area network (LAN) 171 and a wide area network (WAN) 173, but may also include other networks such as a personal area network (PAN) (not shown). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. - When used in a LAN networking environment, the
computing system environment 100 is connected to theLAN 171 through a network interface oradapter 170. When used in a WAN networking environment, thecomputing device 110 typically includes amodem 172 or other means for establishing communications over theWAN 173, such as the Internet. Themodem 172, which may be internal or external, may be connected to thesystem bus 121 via theuser input interface 160, or via another appropriate mechanism. In a networked environment, program modules depicted relative to thecomputing device 110, or portions thereof, may be stored in a remote memory storage device. By way of example, and not limitation,FIG. 2 illustratesremote application programs 185 as residing oncomputer storage medium 181. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used. - In the description that follows, certain embodiments may be described with reference to acts and symbolic representations of operations that are performed by one or more computing devices, such as
computing device 110 ofFIG. 2 . As such, it will be understood that such acts and operations, which are at times referred to as being computer-executed, include the manipulation by the processing unit of the computer of electrical signals representing data in a structured form. This manipulation transforms the data or maintains them at locations in the memory system of the computer, which reconfigures or otherwise alters the operation of the computer in a manner well understood by those skilled in the art. The data structures in which data is maintained are physical locations of the memory that have particular properties defined by the format of the data. However, while an embodiment is being described in the foregoing context, it is not meant to be limiting as those of skill in the art will appreciate that the acts and operations described hereinafter may also be implemented in hardware. - Embodiments may be implemented with numerous other general-purpose or special-purpose computing devices, computing system environments, and/or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with an embodiment include, but are not limited to, personal computers, handheld or laptop devices, personal digital assistants, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network, minicomputers, server computers, game server computers, web server computers, mainframe computers, and distributed computing environments that include any of the above systems or devices.
- Embodiments may be described in a general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. An embodiment may also be practiced in a distributed computing environment where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
-
FIG. 3 illustrates a partial view of anexemplary system 300. Thesystem 300 includes aserver platform 302 and a client orparticipant platform 303. Theserver platform 302 may include a plurality ofindividual servers client platform 303 may include a plurality ofindividual clients server platform 302,client platform 303, and acommunications network 310 connecting the two. - Each of the
clients clients thin computing device 20 ofFIG. 1 , general-purpose computing systems such as thecomputing system 100 ofFIG. 2 , cellular telephones, wireless or palmtop computers, portable digital assistants, handheld game systems, and/or game consoles. Eachclient - In an embodiment, a computing system may include one or more computing devices operating in a coordinated and/or cooperative manner. In another embodiment, a computing system may include two or more computing systems operating in a coordinated and/or cooperative manner.
- Each of the
servers servers server - The
clients server platform 302 via thecommunication network 310. In an embodiment, thecommunication network 310 may include the Internet. In other embodiments, thecommunication network 310 may include an intranet, a WAN, a LAN, and/or any other type of network utilizable for communicating between theserver platform 302 and theclient platform 303. For example, thecommunications network 310 could include, without limitation, a wireless network, a cellular network, or any other system that facilitates transmission of data. Eachparticipant servers FIG. 3 , participant 1 (312) could communicate with server A (304) via acommunications link 322. Similarly, participant 2 (314) could communicate with server B (306) via communications link 324. Theservers communications network 310. - During operation of the
system 300, a particular client, for example participant 1 (312), who desires to enter a virtual world, communicates through a communications link 322 with an allocated server A (304). The determination of whichspecific server FIG. 3 , the number ofservers FIG. 3 illustrates operation of thesystem 300 when a number ofparticipants servers - When there are relatively
few clients 303 participating in the virtual world, only one server may be needed to serve theclients 303. During virtual world operation, there may be no need for direct communication between participants. Theserver platform 302 communicates with each participant positional, status, and event data (referred to as participant or participant data, or as a participant's attributes) for other participants and for objects that the participant may see or interact with the virtual world. Such participant data may include, but is not limited to, avatar attributes, type, physics modeling, scoring, position, orientation, motion vector, animation, background music, participant music, inventory, vehicle, call sign, or other participant or object attributes necessary for the particular virtual world. Typically, the server includes a database of information that is maintained and updated as the participants interact within the virtual world. Through the interaction between theclient platform 303 and theserver platform 302, the virtual world is facilitated. - A virtual world may include a virtual reality environment. A virtual world may include a computer-simulated environment. A virtual world may be intended for virtual inhabitation and interaction, often using avatars. In an embodiment, a participant may include a human user, a spectator, an entity (human or otherwise based), and/or an entity that provides a service to a virtual world. Inhabitation may include a representation of its participants in a form of two or three-dimensional graphical representations of humanoids, or other graphical or text-based avatars. In an embodiment, such as illustrated in
FIG. 3 , a virtual world allows for multiple participants. In further embodiments, a virtual world may include a limited environment. For example, a limited environment may include a classroom, a city, an organization, and/or a special purpose space. - In certain embodiments, a virtual world may include at least one of the following characteristics:
- 1. Shared Space: a virtual world may allow many participants to participate at once.
- 2. Graphical User Interface: a virtual world may depict space visually, ranging in style from 2D “cartoon” imagery to more immersive 3D environments.
- 3. Simulation: a virtual world may include a simulation of the real world or a simulation of an imaginary world.
- 4. Virtual identity: a participant may participate in a virtual world through a virtual identity. A virtual identity may include one or more attributes and/or associations utilized by a virtual world in managing a participation in the virtual world. Further, a participant may interact with objects that are part of the virtual world through their virtual identity. These objects may be representations of items or other participants, such as avatars.
- 5. Immediacy: a virtual world may include interaction in real time.
- 6. Interactivity: a world may allow participants to alter, develop, build, or submit customized content. A virtual world may allow inter-participant communication.
- 7. Persistence: a virtual world's existence may continue regardless of whether individual participants are logged in. In an embodiment, a virtual world includes an online persistent world, active and available 24 hours a day and seven days a week. In another embodiment, a virtual world may persist for less than a whole day, or less than a whole week.
- 8. Socialization/Community: a virtual world may allow and encourage the formation of in-world social groups like guilds, clubs, cliques, housemates, neighborhoods, etc.
- In certain embodiments, a virtual world may include a single player game. A virtual world may include a graphical reality as presently exists in multi-participant virtual worlds. In other embodiments, a virtual world may include communities and chat rooms. In further embodiments, a virtual world may include a training and/or classroom setting. A virtual world may be adapted for educational purposes. Educators may create an online community in which students log into and interact. Within an educational virtual world, students may use their avatar to learn about new assignments and to create projects that are viewable within the virtual world. For example, students taking a computer class may log into a virtual world in which they are the inhabitants of a village that needs their expertise. In other embodiments, a virtual world may be adapted for commerce, for professional, military, and vocational training, for medical consultation and psychotherapy, and even for social and economic experimentation.
- In other embodiments, a virtual world may include a virtual monetary system that constitutes a medium of exchange that allows virtual world transactions. The monetary system may include virtual currency, monetary chips, discount coupons, award points, access rights, entrance keys, experience medals, level permits, bonus vouchers, skill merits, character traits, health benefits, success awards, entrance tickets, authorization passes, eligibility credentials, benefit tokens, vested rights, licenses, permissions, decryption codes, bonus vouchers, test certificates, game time credits, additional characters, control over other player characters, control over non-player characters, aliases, privacy levels, visibility levels, and disguises.
-
FIG. 4 illustrates an exemplary environment that includes a partial view of asystem 400. The system may be incorporated in a server, for example, such as theserver 304 ofFIG. 3 . In another embodiment, the system may be incorporated into a local computer system, such as thethin computing device 20 ofFIG. 1 , and/or such as thecomputing system 100 ofFIG. 2 . - The system includes a
processor 402,computer storage medium 404,user interface 406,risk mitigation module 408, andvirtual world program 410. In an embodiment, these elements may be at least substantially similar to corresponding elements of thethin computing device 20 ofFIG. 1 and/or thecomputing system environment 100 ofFIG. 2 . A plurality of participants, such as the participants 1-4 associated withclients FIG. 3 , who may be at different locations, havebi-directional communication links 414 with the risk mitigation module via the user interface. The risk mitigation module may include one or more computer program products with a carrier medium having program instructions thereon. Such computer program products may run on multiple computer devices or run on an integrated computer system, depending on the circumstances. - The
computer storage medium 404 provides a storage capability. Various categories of data stored in thecomputer storage medium 404 may include a record or data indicative ofarrangements 416, consideration transfers 418,loss occurrences 422, andbenefit provisions 424. Thesystem 400 enables at least two participants to respectively form an arrangement with a protection entity (not shown) that includes the protection entity providing a respective benefit to a participant upon an occurrence of a defined loss in the virtual world in exchange for a consideration. - In an embodiment, the
system 400 includes aprogram 410 comprising computer-readable instructions operable to manage a virtual world configured to interact with at least two participants over a network. In an embodiment, the computer-readable instructions operable to manage a virtual world include computer-readable instructions operable to administer a virtual world. In another embodiment, the computer-readable instructions operable to manage a virtual world include computer-readable instructions operable to control a virtual world. In another embodiment, the computer-readable instructions operable to manage a virtual world include computer-readable instructions operable to provide a virtual world a virtual world experience to the at least two participants. For example, in an embodiment, the virtual world experience may be an experience such as that provided by Sony Online Entertainment's Everquest®, or an experience provided by Linden Research's Second Life®. - The system also includes a risk mitigation module, such as the
risk mitigation module 408. The risk mitigation module includes operability to facilitate an arrangement that includes a protection entity (not shown) providing a benefit to a participant, such as the participant 1 (312) ofFIG. 3 upon an occurrence of a defined loss in the virtual world in exchange for a consideration. The system also includes the computer storage medium, such as for example thecomputer storage medium 404, operable to save a record of the arrangement. - In an embodiment, the at least two participants may include at least two participants who control their respective virtual identity in the virtual world. The virtual identity may be embodied in an avatar. For example, a participant A would individually control their virtual identity A, which by way of further example may be an avatar representative of warrior. Participant B would individually control their virtual identity B, which by way of further example may be an avatar representative of a queen. The at least two participants who control their respective virtual identity in the virtual world include at least two participants who control their respective virtual identity having at least one attribute in the virtual world. The at least one attribute may include at least one of an attribute native to the virtual world, an attribute acquired from a source not native to the virtual world, an attribute created by another participant of the at least two participants, an attribute created by a third party, a weapon, a property, an asset, and or an item.
- The network may include at least one of a private computer network or a public computer network. The network may include the Internet.
- In another embodiment, the risk mitigation module operable to facilitate an arrangement may include a submodule operable to facilitate at least one of forming the arrangement, an interaction between the participant and the protection entity, creating the arrangement, negotiating a term of the arrangement, revising the arrangement, resolution of disputes, transferring the consideration, transferring a right of the participant in the arrangement, memorializing the arrangement, and notification regarding matters relevant to the arrangement.
- In a further embodiment, the protection entity (not shown) may include a participant protection entity. The participant protection entity may include at least one of a real-world entity, a real-world entity engaged in a real-world business of entering into agreements similar to the arrangement, a person, an individual, a virtual-world entity, a virtual-world entity engaged in a business of entering into contracts similar to the arrangement, a fictional protection entity, or an avatar of the virtual world.
- In an embodiment, the protection entity may include a non-participant protection entity. The non-participant protection entity may include at least one of a provider of the virtual world, an operator of the virtual world, a person associated with the virtual world, or a program associated with the
virtual world program 410. - The providing a benefit to the participant may include providing a virtual-world benefit to the participant. The providing a benefit to the participant may include providing a real-world benefit to the participant. The providing a benefit to the participant may include providing a compensation to the participant. For example, the compensation may include payment in a form of a real world currency, and/or a virtual world currency. The providing a benefit to the participant may include providing an agreed-upon benefit to the participant. The providing a benefit to the participant may include providing a predetermined benefit to the participant. For example, a predetermined benefit for a loss of an avatar attribute, such as a life, an arm, or weapon, may include restoration of the life, arm, or weapon. In another example, a predetermined benefit may include extending a participant's subscription to a virtual world for a predetermined length of time. In a further example, a predetermined benefit may include a fixed amount of virtual-world compensation. The providing a benefit to the participant may include providing a compensation determined with relative to a circumstance existing at an occurrence of the loss. For example, a loss of life of an avatar having a high-attained level in a virtual world may receive a greater benefit than a loss of an avatar life at a low attained level in the virtual world. In a further example, a loss of life of an avatar owning significant attributes and/or associations may receive a greater benefit than loss of a life of an avatar owning insignificant attributes and/or associations.
- The providing a benefit to the participant may include providing a compensation that is a function of a participant attribute and/or environmental attribute measured at an occurrence of the loss. The providing a benefit to the participant may include providing an attribute replacement to the participant. The providing an attribute replacement to the participant may include providing at least one of a replacement of an attribute, a resurrection of a virtual identity of the participant in the virtual world, a replacement of a virtual-world property, a payment of a virtual-world fine, and a satisfaction of a virtual-world punishment.
- In another embodiment, the defined loss may include a determinable contingency. The defined loss may include at least one of loss suffered by a participant occurring by reason of a harm, an injury, a death, a damaging, a casualty, a disability, and an imposed punitive obligation. The defined loss may include a loss relative to a subject matter of the arrangement in which the participant has an interest. The defined loss may include at least one of loss suffered by another participant having a relationship with the participant. For example, a loss suffered by another participant may include a loss suffered by another participant with whom the participant has a business relationship, a community relationship, and/or a familial relationship.
- In an embodiment, a first participant may have an interest in a subject matter of the arrangement when a loss or damage to it would cause the first participant to suffer a financial loss or other kind of loss. For example, if a property owned by the first participant is damaged, the value of the property is reduced, and whether the first participant pays to have the property repaired or sells it at a reduced price, the first participant has suffered a financial loss resulting from the damage. By contrast, if a second participant's property is damaged, the first participant may be emotionally upset or disadvantaged, but the first participant would not directly suffer any loss by the damage. The first participant has an interest in their own property, but in this example the first participant does not have an insurable interest in the second participant's property.
- In a further embodiment, the consideration may include a virtual-world consideration. The virtual-world consideration may include virtual-world money. The virtual-world consideration may include at least one of an attribute, a right, a body part, a weapon, or a token. The consideration may include a real-world consideration. The real-world consideration may include a real-world money. The consideration may include anything having a value. The consideration may include a consideration provided by the participant. The consideration may include a consideration provided by another participant of the at least two participants.
- In an embodiment, the
computer storage medium 404 operable to save a record of the arrangement may include a computer storage medium operable to save at least one of a record of a conveyance of theconsideration 418 to the protection entity, a record ofassents 416 to the arrangement, such as for example a record of the protection entity's assent to the arrangement, a record of an occurrence of theloss 422, or a record of any provision of thebenefit 424. The computer storage medium operable to save a record of the arrangement may for example include the computer storage media described in conjunction withFIG. 2 . - In an embodiment, the
system 400 further includes amonetary module 412 operable to manage a medium of exchange in the virtual world expressed as a virtual-world currency unit. In an embodiment, thevirtual world program 410 may include the monetary module. In another embodiment, the monetary module may not be included in the virtual world program. The virtual-world currency unit may include a virtual-world currency having a value in the virtual world and facilitating an exchange for goods and services. The virtual-world currency having a value in the virtual world and facilitating an exchange for goods and services may include a virtual-world currency having a value in the virtual world and usable as at least one of the consideration and the benefit. - In another embodiment, the
system 400 further includes themonetary module 412 providing a native virtual-world medium of exchange expressed as a native virtual-world currency unit having a value in the virtual world. The system also includes a secondarymonetary module 444 coupled with the virtual world. In an embodiment, the secondary monetary module may be an integral component of thesystem 400. In an alternative embodiment, the secondary monetary module may be coupled with the system, such as for example, it may be coupled by communication via a computer network. The secondary money module includes an operability to manage a secondary virtual-world medium of exchange expressed as a secondary virtual-world currency unit having a value in the virtual world and facilitating at least one of the benefit and the consideration. The monetary module coupled with the virtual world may include a monetary module coupled with the virtual world and subject to control of the virtual world. The monetary module coupled with the virtual world and subject to control of another participant of the at least two participants may include a monetary module coupled with the virtual world and subject to control of a participant protection entity. The secondary virtual world currency may include a secondary virtual world currency having a value in another virtual world. - Although a participant may be illustrated and/or described herein as a single illustrated figure, a participant may be representative of a human user, a robotic user (e.g., computational entity), and/or substantially any combination thereof (e.g., a participant may be assisted by one or more robotic agents). In addition, a participant, as set forth herein, although shown as a single entity may in fact be composed of two or more entities. Those skilled in the art will appreciate that, in general, the same may be said of “player,” “protection entity,” and/or other entity-oriented terms as such terms are used herein. Further, a participant may include an agent, a program agent, a proxy, and/or a representative of the participant.
- The following includes a series of illustrations depicting implementations of processes. For ease of understanding, certain illustrations are organized such that initial illustrations present implementations from an overall “big picture” viewpoint, and following illustrations present alternate implementations and/or expansions of the “big picture” illustrations as either sub-steps or additional steps building on one or more earlier-presented illustrations.
-
FIG. 5 illustrates an exemplaryoperational flow 500. After a start operation, the operational flow moves to a managingoperation 510. The managing operation operates a virtual world in communication with a plurality of players over a network. Afacilitation operation 520 enables a player of the plurality of players (hereafter referred to as “the player”) and a risk distribution entity to form an agreement whereby a thing of value is conveyed to the risk distribution entity and the risk distribution entity undertakes to provide a benefit upon the player experiencing a specified loss in the virtual world. - In an embodiment, the thing of value may include virtual world thing of value, or a real world thing of value. The thing of value may be conveyed to the risk distribution entity by the player. The thing of value may be conveyed to the risk distribution entity by another player of the plurality of players. The risk distribution entity may undertake to provide a benefit to the player, or to another player of the plurality of players. The risk distribution entity may undertake to provide a benefit upon the player experiencing a specified loss in the virtual world, or upon to another player of the plurality of players experiencing a specified loss in the virtual world.
- A documenting
operation 530 makes a digital record of the arrangement. The digital record of the arrangement may include at least one of a digital record of a conveyance of a thing of value to the protection entity, the protection entity's assent to the arrangement, the player's assent to the arrangement, a provision of the benefit in the virtual world or in the real world, or an occurrence of the specified loss in the virtual world. The operational flow then moves to an end operation. - The
operational flow 500 may include at least one additional operation, such as anassistance operation 540. The assistance operation facilitates a transfer of the benefit in response to an indication that the player experienced the specified loss in the virtual world. -
FIG. 6 illustrates an alternative embodiment of the exemplaryoperational flow 500 ofFIG. 5 . The managingoperation 510 may include at least one additional operation. An additional operation may include anoperation 512, and/or anoperation 514. Theoperation 512 operates at least one of an online interactive gaming environment, a massive multiplayer online game, or a massive multiplayer on-line role-playing game. Theoperation 514 operates at least one of a learning environment, an online community, and/or a participant interactive environment. -
FIG. 7 illustrates an alternative embodiment of the exemplaryoperational flow 500 ofFIG. 5 . Thefacilitation operation 520 may include at least one additional operation. An additional operation may include anoperation 522, anoperation 524, and anoperation 526. At theoperation 522, the enabling a player and a risk distribution entity to form an agreement includes at least one of creating an opportunity for an interaction between the player and the risk distribution entity, providing a capability for the player and the risk distribution entity to form the arrangement, assisting an interaction between the player and the risk distribution entity, creating the agreement, negotiating a term of the agreement, revising a term of the agreement, resolving the agreement, transferring the consideration, transferring a right of the player in the agreement, and memorializing the agreement. At theoperation 524, the risk distribution entity includes an entity that shifts and/or distributes a risk of the specified loss among the plurality of players. At theoperation 526, the thing of value includes at least one of a thing having a value in the virtual world and a thing having a value in the real world. -
FIG. 8 illustrates a partial view of an exemplary computer-program product 550. The computer-program product includes acomputer program 554 for executing a computer process in a computing system. An embodiment of the exemplary computer-program product may be provided using a computer-readable signal-bearingmedium 552, and includes computer executable instructions. The computer product encodes the computer program for executing a computer process. The computer process includes communicating with virtual world and a participant. The computer process also includes providing an opportunity for the participant to make an arrangement with a protection entity that includes the protection entity providing a compensation upon a described loss being experienced in the virtual world in exchange for a consideration. The process further includes creating a record of the arrangement. - In an alternative embodiment, the
computer process 554 may further include an additional process, such as aprocess 556, aprocess 558, and/or aprocess 560. At theprocess 556, the communicating with a virtual world and with a participant may include communicating with a virtual world and with a participant via a network. At theprocess 558, the computer process may further include communicating between the virtual world and the protection entity. At theprocess 560, the computer process may further include providing a notification of an occurrence of the described loss. - In another embodiment, the computer-readable signal-bearing medium 552 may include a
computer storage medium 562, which may be carried by a computer-readable carrier (not shown). The computer-readable signal-bearing medium 552 may include acommunications medium 564. In an alternative embodiment, thecomputer program 554 may be implemented in hardware, software, and/or firmware, and/or a combination thereof. -
FIG. 9 illustrates a partial view of an exemplary environment in which embodiments may be implemented.FIG. 9 includes acomputing device 600 having aprocessor 602 andcomputer storage medium 604 for saving aprogram 605. In an embodiment, the computing device may include elements at least substantially similar to thethin computing device 20 ofFIG. 1 and/or thecomputing device 110 ofFIG. 2 . Theprogram 605 may be incorporated in one or more computer program products having a carrier medium with program instructions thereon. Peripheral components may includedisplay 606, as well as input devices such askeyboard 610 andmouse 612. Anactive participant 614 may have access to features disclosed in the exemplary operational flows described in conjunction withFIGS. 12-14 by running theprogram 605.Inactive participants program 605 including non-real time interaction through the program with each other and/or withactive participant 614 in order to participate in the benefits and advantages of the methods and processes disclosed herein. -
FIG. 10 illustrates a partial view of anenvironment 601 in which embodiments may be implemented.FIG. 10 includes a networked system having anetwork server 620 with communication links to differentvirtual world environments cable connection 630, terminal 632 has access through dial-upline 634, terminal 636 has access throughwireless connection 638, and terminal 640 uses transmission signals 642 (e.g., radio or television signals) viasatellite 644 for access to a network, illustrated as a computer network, the Internet, a WAN, and/or a LAN. Thenetwork server 620 is coupled with the network. Participants may be logged on to participate simultaneously in risk mitigation arrangements in virtual world environments, or be respectively logged on during non-overlapping or partially overlapping time periods. Such participation may be directly with other parties or indirectly through intermediaries, depending on the circumstances involved. -
FIG. 11 illustrates a partial view of an exemplarynetworked environment 660. The networked environment is interactive withparticipants 650 via anetwork 652 having aninteractive communication link 654 through I/O interface 656. Such anetwork 660 may include avirtual lobby arcade 662 with various types of virtual opportunities. The categories for such virtual opportunities are almost unlimited, and may for example include shops, competitions, journeys, test, battles, entertainment, careers, vehicles, training, auctions, communication manager, events, awards, skills, health, and homes. Anon-participant protection entity 672 operating, for example, as a storefront business, interacts with participants to facilitate an arrangement with them to mitigate, manage, and/or distribute risk in a virtual world, for example, such as thegame environment 664, thevirtual world 666, and/or the role-playingvirtual community 668. Arisk management element 670 enables the non-participant protection entity. - In an alternative embodiment, the
networked environment 600 may include aparticipant protection entity 674. The participant protection entity may be coupled with the networked environment via thenetwork 652. - It will be understood that separately owned virtual environments may be included as part of the
virtual network environment 660, including thevirtual game environment 664, thevirtual world 666, and/or the role-playingvirtual community 668. The services of thenon-participant protection entity 672 may also be usable in these separate individual virtual environments based on appropriate agreements with their owners and/or operators. - A system embodiment may be implemented employing the environments illustrated in
FIGS. 9-11 . The system includes a computer-simulated environment wherein a participant is able to take part. In an embodiment, the computer-simulated environment may include the virtual world I 622, the virtual world II 624, and/or thevirtual world III 626 ofFIG. 10 . In another embodiment, the computer-simulated environment may include thevirtual game environment 664, thevirtual world 666, and/or the role-playingvirtual community 668 ofFIG. 11 . - The system also includes a risk management element of the computer-simulated environment. In an embodiment, the risk management element may include the
risk management element 670 ofFIG. 11 . The risk management element includes an operability that facilitates an arrangement that includes a protection entity providing a future benefit to the participant upon an occurrence of a defined loss in the computer-simulated environment in exchange for a transfer of a thing of value to the protection entity. In an embodiment, the future benefit may include at least one of a compensation, or an attribute replacement. In another embodiment, the defined loss may include at least one of harm, damage, injury, death, damage to others, damage to property of others, or criminal penalties, or punishment. In a further embodiment, the thing of value may include at least one of a virtual world or a real world thing of value. In an embodiment, the transfer may be procured by the participant, or by another participant. - The system includes a computer storage medium operable to save a record of the arrangement. In an embodiment, the record of the arrangement may include at least one of a record of any provision of the benefit to the participant.
- In an embodiment, the system may further include a participant interface communication link that enables the participant to access to the computer-simulated environment and participate in the risk management element. In another embodiment, the system may further include a protection entity interface communications link that enables the protection entity to access to the computer-simulated environment and participate in the risk management element.
- Returning to
FIG. 9 , the figure illustrates another embodiment that provides a system. The system includes a computing device couplable to a virtual world via a public network. The computing device is illustrated as thecomputing device 600. The system also includes instructions, illustrated as theprogram 605. The instructions, when executed on the computing device, cause the computing device to activate a virtual character that represents a participant in the virtual world. The instructions also enable participation by the virtual character in an arrangement with a protection entity that includes the protection entity providing a compensation to the virtual character upon a future occurrence of a described loss in the virtual world in exchange for a consideration transferred to the protection entity. The instructions further make a record of the arrangement. - In an embodiment, the protection entity includes a participant protection entity. In another embodiment, the protection entity includes a non-participant protection entity.
-
FIG. 12 illustrates an exemplaryoperational flow 700. After a start operation, the operational flow moves to acontrol operation 710 that accepts an input operating a virtual character in a virtual world. Anegotiation operation 720 participates in an arrangement with a protection entity. The arrangement includes the protection entity providing a compensation to the virtual character upon a future occurrence of a described loss in the virtual world in exchange for a consideration transferred to the protection entity. Amemory operation 750 saves data indicative of the arrangement in a computer-readable medium. The operational flow proceeds to an end operation. - In an embodiment, the
control operation 710 may include at least one additional operation, such as theoperation 712. Theadditional operation 712 includes operating an avatar that represents a participant in a virtual world. - In an alternative embodiment, the
operational flow 700 may include at least oneadditional operation 760. An additional operation may include anoperation 762 and/or anoperation 764. Theoperation 762 includes establishing a communication link via a network between the virtual world and the participant. Theoperation 764 includes receiving a notification of an occurrence of the described loss. -
FIG. 13 illustrates an alternative embodiment of the exemplaryoperational flow 700 ofFIG. 12 . Thenegotiation operation 720 may include at least one additional operation. An additional operation may include an operation 722. The operation 722 receives a communication related to at least one of offering, accepting, or negotiating an opportunity to form the arrangement. The operation 722 may include at least one additional operation. An additional operation may include anoperation 724 and/oroperation 726. Theoperation 724 receives a communication originating from the virtual world and related to an opportunity to form the arrangement. Theoperation 726 receives a communication originating from the protection entity and related to an opportunity to form the arrangement. Theoperation 726 may include at least one additional operation. An additional operation may include anoperation 728 and/oroperation 732. At theoperation 728, the protection entity includes a participant protection entity. At theoperation 732, the protection entity includes a non-participant protection entity. -
FIG. 14 illustrates an alternative embodiment of the exemplaryoperational flow 700 ofFIG. 12 . Thenegotiation operation 720 may include at least one additional operation. An additional operation may include anoperation 734, anoperation 736, anoperation 738, anoperation 742, anoperation 744, and/or anoperation 746. Theoperation 734 sends a communication related to at least one of offering, accepting, or negotiating an opportunity to form the arrangement. At theoperation 736, the exchange for a consideration transferred to the protection entity includes an exchange for a consideration having a value in the virtual world. At theoperation 738, the exchange for a consideration transferred to the protection entity includes an exchange for a consideration having a value in the real world. At theoperation 742, the exchange for a consideration transferred includes an exchange for a consideration transferred by the participant. At theoperation 744, the exchange for a consideration transferred includes an exchange for a consideration transferred by a third party. At theoperation 746, the participating in an arrangement with a protection entity includes sending an authorization to transfer the consideration to the protection entity. -
FIG. 15 illustrates a partial view of an exemplary computer-program product 780. The computer-program product includes acomputer program 784 for executing a computer process in a computing system. An embodiment of the exemplary computer-program product may be provided using a computer-readable signal-bearingmedium 782, and includes computer executable instructions. The computer product encodes the computer program for executing a computer process. The computer process includes sending an instruction to a virtual world related to a virtual character that represents a participant. The process also includes enabling a participation by the virtual character in an arrangement with a risk distribution entity that includes the risk distribution entity providing a compensation to the virtual character upon a future occurrence of a described loss in the virtual world in exchange for a consideration transferred to the risk distribution entity. The process further includes saving data representative of the arrangement. - In another embodiment, the computer-readable signal-bearing medium 782 may include a
computer storage medium 786, which may be carried by a computer-readable carrier (not shown). The computer-readable signal-bearing medium may include acommunications medium 788. In an alternative embodiment, thecomputer program 784 may be implemented in hardware, software, and/or firmware, and/or a combination thereof. -
FIG. 16 illustrates an exemplaryoperational flow 800. After a start operation, the operational flow moves to anadministration operation 810. The administration operation operates a protection entity associated with a virtual world configured to interact with a participant via a network. Anegotiating operation 830 participates in an arrangement with the participant that includes the protection entity providing a compensation to the participant upon a future occurrence of a described loss in the virtual world in exchange for receiving a consideration. Astorage operation 850 saves a record of the arrangement. The operational flow then moves to an end operation. - In an embodiment, the
operational flow 800 may include at least one additional operation, such as anoperation 870. Theoperation 870 receives an evidence of a transfer of the compensation. -
FIG. 17 illustrates an alternative embodiment of the exemplaryoperational flow 800 ofFIG. 16 . Theadministration operation 810 may include at least one additional operation. An additional operation may include anoperation 812, anoperation 814, and/or anoperation 816. Theoperation 812 operates a protection entity that is associated with a virtual world and configured to interact with a participant via a network. Theoperation 814 operates a protection entity associated with a virtual world that is configured to interact with a participant via a network. Theoperation 816 operates a protection entity involved in a business of entering into risk mitigation agreements in at least one of the virtual world, the real world, or both the virtual world and the real world. -
FIG. 18 illustrates an alternative embodiment of the exemplaryoperational flow 800 ofFIG. 16 . Theadministration operation 810 may include at least one additional operation. An additional operation may include anoperation 818, anoperation 822, anoperation 824, and/or anoperation 826. Theoperation 818 operates a virtual world participant protection entity. Theoperation 822 operates a virtual world non-participant protection entity. Theoperation 824 operates a protection entity authorized by the virtual world to participate in the arrangement with the participant. Theoperation 826 operates a protection entity associated with a virtual world configured to interact with at least one of a program agent, a proxy, or a representative of the participant via a network. -
FIG. 19 illustrates an alternative embodiment of the exemplaryoperational flow 800 ofFIG. 16 . Thenegotiation operation 830 may include at least one additional operation. An additional operation may include an operation 832, and/or anoperation 838. The operation 832 receives a communication related to at least one of offering, accepting, or negotiating an opportunity to form an arrangement. The operation 832 may include at least one additional operation. An additional operation may include an operation 834, and/or anoperation 836. The operation 834 receives a communication originating from the virtual world and related to an opportunity to form an arrangement. Theoperation 836 receives a communication originating from the participant and related to an opportunity to form an arrangement. Theoperation 838 sends a communication related to at least one of offering, accepting, or negotiating an opportunity to form an arrangement. -
FIG. 20 illustrates an alternative embodiment of the exemplaryoperational flow 800 ofFIG. 16 . Thenegotiation operation 830 may include at least one additional operation. An additional operation may include anoperation 842, anoperation 844, anoperation 846, and/or anoperation 848. Theoperation 842 receives a consideration having a value in the virtual world. Theoperation 844 receives a consideration having a value in the real world. Theoperation 846 receives a consideration transferred by the participant. Theoperation 848 receives a consideration transferred by a third party. -
FIG. 21 illustrates an alternative embodiment of the exemplaryoperational flow 800 ofFIG. 16 . The operational flow includesclaims operation 860 that receives an indication of an occurrence of the described loss in the virtual world, and provides the compensation to the participant. Theclaims operation 860 may include at least one additional operation. An additional operation may include anoperation 862, and/or anoperation 864. Theoperation 862 provides a virtual-world compensation to the participant. Theoperation 864 provides a real-world compensation to the participant. -
FIG. 22 illustrates a partial view of anexemplary system 900. The system includes a computing system 910 that includes acomputing device 920. In an embodiment, the computing system may be at least substantially similar to thethin computing device 20 ofFIG. 1 and/or thecomputing system environment 100 ofFIG. 2 . The computing system includes configuration to communicate with a virtual world via a network, the virtual world including an operability to interact with a participant via the network. In another embodiment, the computing device may be at least substantially similar to thethin computing device 20 ofFIG. 1 and/or thecomputing device 110 ofFIG. 2 . The system further includes computer-executable instructions 930 that when executed on the computing device cause the computing system to operate a protection entity having an association with the virtual world. The instructions further cause the computing system to participate in an arrangement with the participant that includes the protection entity providing a compensation to the participant upon a future occurrence of a described loss in the virtual world in exchange for receiving a consideration. The instructions also save data indicative of the arrangement. - In an alternative embodiment, the computer-executable instructions may include an additional instruction. Additional instructions may include
instructions 932,instructions 934,instructions 936,instructions 938, and/orinstructions 942. Theinstructions 932 operate a protection entity having a presence within the virtual world. In a further embodiment, the protection entity may be under control of the virtual world operator or a player participant. In another embodiment, the player participant may be an individual or a company. Theinstructions 934 operate a protection entity having a presence within the virtual world and under a control of the virtual world. Theinstructions 936 operate a protection entity having a presence within the real world and an operability to interact with the virtual world via the network. Theinstructions 938 operate a protection entity involved in a business of a risk mitigation in the real world and having an operability to interact with the virtual world via the network. Theinstruction 942 operates a protection entity having a presence in the real world and having an operability to interact with the participant via the network in response to a referral from the virtual world. - In an embodiment, the protection entity may include a participant protection entity. The participant protection entity may include at least one of a real-world entity, a real-world entity engaged in a business of entering into contracts similar to the arrangement, a person, an individual, a virtual-world entity, a virtual-world entity engaged in a business of entering into contracts similar to the arrangement, a fictional protection entity, or an avatar of the virtual world. In another embodiment, the protection entity may include a non-participant protection entity. The non-participant protection entity includes at least one of a provider of the virtual world, an operator of the virtual world, or a person associated with the virtual world.
-
FIG. 23 illustrates a partial view of an exemplary computer-program product 960. The computer-program product includes acomputer program 964 for executing a computer process in a computing system. An embodiment of the exemplary computer-program product may be provided using a computer-readable signal-bearingmedium 962, and includes computer executable instructions. The computer product encodes the computer program for executing a computer process. The computer process includes operating a protection entity having an association with the virtual world that includes an operability to interact with a participant via a network. The process also includes participating in an arrangement with the participant that includes the protection entity providing a compensation to the participant upon a future occurrence of a described loss in the virtual world in exchange for receiving a consideration. The process further includes saving data indicative of the arrangement. - In another embodiment, the computer-readable signal-bearing medium 962 may include a
computer storage medium 966, which may be carried by a computer-readable carrier (not shown). The computer-readable signal-bearing medium may include acommunications medium 968. In an alternative embodiment, thecomputer program 964 may be implemented in hardware, software, and/or firmware, and/or a combination thereof. -
FIG. 24 illustrates an exemplary schematic timing diagram 1060 of risk management opportunities that are possible in a virtual world environment among participants and entities. Atime line 1062 provides a reference for real time and delayed time accessibility for different virtual world and real-world entities, including a protection entity with anactive time period 1064 commencing at 1065, a third party virtual provider with anactive time period 1066 commencing at 1067, a virtual world provider with anactive time period 1068 commencing at astarting time 1069, and a programmed virtual character role with anactive time period 1070 commencing attime 1071 and terminating attime 1073. Because of the benefits of computerized technology, real time and delayed time interaction between entities are possible for purposes of practicing the methods and implementing the systems for virtual credit opportunities as disclosed herein. - For example, as shown in
FIG. 24 , aparticipant John 1072 having an actuallogon time period 1074 commencing attime 1075 and terminating attime 1077 has the capability of having real time interaction duringlogon time period 1074 withparticipant David 1076. It is noted that David's actuallogon time period 1080 commencing attime 1083 and terminating attime 1085 partially overlaps with John'slogon time period 1074, and similarly withactive time 1066 of the third party virtual provider, as well as with an active time period of a real-world group participant 1086. It is further noted that John'slogon time period 1074 completely overlaps withactive period 1064 of the protection entity, and with theactive period 1068 of the virtual world provider, and further with an active period of aparticipant character role 1088. This enables real time interaction between entities, including repeated dialogue communications if deemed appropriate, while risk mitigation arrangements are being negotiated, arranged, implemented, transferred, resolved, and/or canceled. Of course, it is understood that time delays between real time interactive messages may also occur intentionally, or because of system limitations. - Even though
John 1072 is logged off between histermination time 1077 and hisre-commencement time 1079, other entities that are active or logged on during the interim period may respond to any of John's requests, actions or questions that have been appropriately stored in memory, or may pursue their own dialogue with respect to new, pending or existing risk mitigation arrangements. Such other entities may includeMary 1082 whoselogon period 1084 commences attime 1087 and terminates attime 1089. Similarly, John can resume his virtual world risk mitigation arrangement participation during his newlogon time period 1078 until termination attime 1081. This new period may include responses to requests, action or question previously made byMary 1082 whoselogon period 1084 does not overlap either of John'slogon time periods - Further real time interaction may be initiated or received by participants or other entities in the virtual world environment through links in the virtual world environment as shown by a real-
world website link 1090 activated to commence attime 1091 and terminate attime 1093, avirtual environment link 1092 activated to commence attime 1095 and terminate attime 1097, and a real-worldprotection entity link 1094 activated to commence attime 1098 and terminate attime 1099. It is therefore to be understood that both unidirectional and bi-directional links across a boundary between a virtual world environment and a real-world location or real-world entity may be used to facilitate, effect, implement, resolve, or perpetuate a risk mitigation arrangement. - As illustrated in
FIG. 24 , participation in a virtual world environment may include activities, events and transactions that are wholly within the simulated or virtual world environment as well as activities, events and transactions that are initiated or partly pursued in the simulated or virtual world environment. A virtual world participant or participant taking a class, for example, could mean a virtual character taking a class in the virtual world to increase his virtual world skill level, as well as a participant using his virtual character to interact with a real-world course (for example, to take an online class), or some combination of these. -
FIG. 25 illustrates a partial view of asystem 1200 in which embodiments may be implemented. The system includes a virtual world in which a participant may participate, illustrated as avirtual world environment 1210 that includes avirtual world program 410. The system also includes a covered-loss detection module 1222 operable to identify an occurrence of a defined loss in the virtual world suffered by the participant. The defined loss is described in an arrangement and/or agreement (hereafter “agreement”) and includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence in the virtual world of the defined loss. The agreement may have any form or format, and may or may not be negotiated. In an embodiment, the agreement may include a risk management agreement. The agreement may be saved as a record of arrangement(s)/agreement(s) 1216 of thecomputer storage medium 404. - In an embodiment, the participant is able to influence at least one aspect of a virtual identity in a virtual world created by the
virtual world program 410. The virtual identity being uniquely associated with the participant. For example, an aspect of the virtual identity affected by the participant may include the participant controlling a movement of an avatar through a virtual world space, and/or affecting the avatar's use of a weapon. The participant may not be able to control another aspect of the avatar, such as aging, or time remaining in a session involving the avatar. In another embodiment, the avatar may be considered an alter ego in the virtual world of the participant. In another embodiment, an avatar may include a surrogate in the virtual world of a participant and whose actions, associations, and/or attributes are attributed to the participant. In a further embodiment, the participant may place an extrinsic and/or an intrinsic value on the avatar for any reason. For example, the participant may value the avatar because the participant likes a graphical image of the avatar, because of the participant's opportunity to control a particular avatar, and/or because the participant values the associations and/or attributes of the avatar. In another embodiment, the participant may have an interest in an aspect of a property and/or a virtual world object. For example, the participant may be able to possess and/or control a virtual world property and/or a virtual world object, which may be implemented through the participant's identity or through an avatar uniquely associated with the participant. - The participant may suffer a loss in the virtual world in a variety of manners. For example, a losses suffered by a virtual identity and/or an avatar may be considered to be a loss suffered by the participant. A loss suffered by a participant may include a loss of a feature and/or attribute of an avatar controlled and/or affected by the participant, such as for example a life, limb, or weapon associated with the avatar. A loss suffered by a participant may include a loss of a feature and/or attribute of the avatar valued by the participant. A loss suffered by a participant may include a loss of a feature and/or attribute of an avatar that is not controlled by the participant, such as for example a loss of a life, limb, or weapon associated with an avatar controlled by another participant. A loss suffered by the participant may include a damaging or loss of a virtual world property and/or a virtual world object in which the participant has an interest.
- In an embodiment, the defined loss includes a determinable contingency. For example, a determinable contingency may include a contingency that may be ascertained with respect to an aspect of the virtual world, such as a flood event programmed into the
virtual world program 410. In another embodiment, the defined loss includes an indeterminable contingency. For example, an indeterminable contingency may include a contingency that may not be ascertained or readily ascertained with respect to an aspect of the virtual world, such as a success in a combat situation with an avatar controlled by another participant. - In an embodiment, the defined loss in the virtual world suffered by the participant includes at least one of a harm, an injury, a loss of life, a damage, a casualty, a disability, and/or an imposed punitive obligation. For example, a punitive obligation may include a banishment from the virtual world, such as a punishment imposed by the
virtual world environment 1210 for engaging in prohibited behavior or conduct in the virtual world. In another embodiment, the defined loss in the virtual world suffered by the participant includes an adverse effect on an attribute and/or association of an avatar in the virtual world controlled by the participant. An adverse effect may include a diminution in value of an asset or attribute, and/or a degradation in a performance of an asset or attribute. In a further embodiment, the defined loss in the virtual world suffered by the participant includes at least one of a harm, an injury, a loss of a life, a damage, a casualty, and/or a disability befalling another participant in the virtual world with whom the participant has a relationship. In another embodiment, the defined loss includes an incident relative to a subject matter in which the participant has an interest. - In an embodiment, the protection entity includes a participant protection entity, illustrated as a
participant protection entity 1230. The participant protection entity may be coupled to thevirtual world environment 1210 via a computer network, such as a WAN or LAN. In another embodiment, the protection entity includes a non-participant protection entity, illustrated as thenon-participant protection entity 1232. While the non-participant protection entity is illustrated as part of thevirtual world environment 1210 and coextensive with thevirtual world program 410, in another embodiment, the non-participant protection entity may be functionally and/or structurally separate from the virtual world environment and/or thesystem 1200. In a further embodiment, the non-participant protection entity includes a non-participant protection entity under a control of at least one of a provider of the virtual world, an operator of the virtual world, or a person associated with the virtual world. - In an embodiment, the benefit includes a compensation for the defined loss. A compensation may include anything having a value in the
virtual world environment 1210, and/or a value in the real world. In another embodiment, the benefit includes a replacement of the defined loss. In a further embodiment, the benefit to the participant includes a compensation to the participant, and/or a compensation to a non-participant. In an embodiment, the benefit to the participant includes a virtual-world benefit to the participant. In another embodiment, the benefit to the participant includes a real-world benefit to the participant. In a further embodiment, the benefit to the participant includes an agreed upon benefit to the participant. In another embodiment, the benefit to the participant includes a predetermined benefit to the participant. In an embodiment, the benefit to the participant includes a benefit determined relative to a circumstance existing at an occurrence of the loss. In another embodiment, the benefit to the participant includes a benefit that is a function of a participant attribute and/or environmental attribute measured at an occurrence of the loss. In a further embodiment, the benefit to the participant includes a replacement to the participant. In another embodiment, the replacement to the participant includes providing at least one of a replacement of an attribute, a restoration in the virtual world of a lost life, a replacement of a virtual-world property, a payment of a virtual-world fine, and a satisfaction of a virtual-world punishment. - In an embodiment, the covered-
loss detection module 1222 further includes an event-tracking module 1224 operable to monitor the virtual world for an occurrence of the defined loss. For example, the operable to monitor in the virtual world may include overseeing thevirtual world environment 1210 for purpose of tracking usage and reporting on events. In another embodiment, the event-tracking module includes operability to monitor the virtual world for at least one of an anticipated, forecast, current, and/or prior occurrence of the defined loss. For example, the event-tracking module may contemporaneously monitor the virtual world in real time for an occurrence of the defined loss suffered by the participant. In another example, the event-tracking module may monitor a record of participant's activities in the virtual world, such as activities of an avatar controlled by the participant, and/or incidents related to a property and/or object owned or controlled by the participant. In a further example, the event-tracking module may predict and/or anticipate an occurrence of the defined loss likely to be suffered by the participant in the virtual world. In a further embodiment, the covered-loss detection module further includes an operability to track the virtual world environment for an occurrence of the defined loss suffered by the participant. In an alternative embodiment, the covered-loss detection module 1222 and/or the event-tracking module 1224 may be remote to thevirtual world environment 1210 and coupled with the virtual world via thebi-directional communication link 414. - In another embodiment, the
system 1200 includes aquery module 1226. The query module includes a query module operable to respond to an inquiry corresponding to a claimed occurrence of a defined loss. The inquiry may be submitted by a participant, and/or by theparticipant protection entity 1230. In an embodiment, the inquiry may include an inquiry whether an occurrence of a loss in the virtual world suffered by the participant is an occurrence of a defined loss described in an agreement between the participant and the protection entity. In another embodiment, the inquiry may include requesting the benefit in response to a claimed occurrence of a defined loss. In a further embodiment, the inquiry may include a request for assistance in obtaining the benefit in response to a claimed occurrence of a defined loss. In an embodiment, the inquiry may include a request for an explanation why no benefit is being provided in response to a claimed occurrence of a defined loss. In another embodiment, the inquiry may include an inquiry by a protection entity whether the participant has requested the benefit for a claimed occurrence of a defined loss. - In a further embodiment, the
query module 1226 includes a query module operable to confirm the occurrence of the claimed occurrence of a defined loss. In another embodiment, the query module includes a query module operable to confirm the occurrence of the claimed occurrence of a defined loss by reference to a record of an identified occurrence maintained by the covered-loss detection module 1222. In a further embodiment, the query module includes a query module operable to deny the occurrence of the claimed occurrence of a defined loss. In an embodiment, the query module includes a query module operable to facilitate a provision of the benefit to the participant for the participant claimed occurrence of the defined loss. - In an embodiment, the
system 1200 further includes areporting module 1228 operable to transmit a signal indicative of an occurrence of a defined loss. In an embodiment, the signal indicative of an occurrence of a defined loss may include a signal generated in response to the identified occurrence of a defined loss by the covered-loss detection module 1222. The signal may be transmitted via thebi-directional communication link 414 to the participant, theparticipant protection entity 1230, a third party (not shown), and/or a manager of thevirtual world environment 1210. In another embodiment, thereporting module 1228 further includes a reporting module operable to transmit a signal indicative of an identified occurrence of a defined loss. -
FIG. 26 illustrates a partial view of anexemplary system 1250 in which embodiments may be implemented. The system includes acomputing system 1252 couplable to a network and operable to interact with at least two participants via the network. The computing system includes aprogram module 1260 operable to manage a virtual world. The system also includes aquery module 1270 operable to respond to a benefit inquiry corresponding to a claimed occurrence of a defined loss in the virtual world by a participant of the at least two participants (hereafter referred to as “the participant”). The claimed occurrence of a defined loss may include a claimed occurrence of the defined loss by the participant. The claimed occurrence of a defined loss may include a claimed occurrence of the defined loss by an entity other than the participant. - In an embodiment, the defined loss in the virtual world includes a defined loss described in an agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the defined loss in the virtual world. In another embodiment, the defined loss includes a preselected loss of at least two preselected losses.
- In an embodiment, the query module includes a query module operable to confirm the occurrence of a participant-claimed occurrence of a defined loss. In another embodiment, the query module includes a query module operable to deny the occurrence of the claimed occurrence of a defined loss. In a further embodiment, the query module includes a query module operable to facilitate a provision of the benefit to the participant for the claimed occurrence of the defined loss. In another embodiment, the query module includes a query module operable to report a confirmation decision related to the occurrence of the claimed occurrence of a defined loss. The confirmation decision may include any decision responsive to the benefit inquiry, such as confirming the occurrence of a defined loss, denying the occurrence of a defined loss, and/or requesting more information.
- In an embodiment, the
system 1250 includes an occurrence-tracking module 1280 operable to monitor the virtual world for an occurrence of the defined loss. -
FIG. 27 illustrates an exemplaryoperational flow 1300 in which embodiments may be implemented. After a start operation, the operational flow moves to a detectingoperation 1310. The detecting operation identifies an occurrence in a virtual world of a loss defined in an agreement. The virtual world includes a virtual world operable to interact with a plurality of participants over a network. The agreement includes an obligation of a protection entity to provide a benefit to a participant of at least two participants (hereafter referred to as “the participant”) upon an occurrence of the defined loss in the virtual world. Ananswer operation 1320 responds to a benefit claim corresponding to a purported occurrence of a loss suffered by the participant in the virtual world based at least in part on the identified occurrence in the virtual world of a loss defined in the agreement. The operational flow moves to an end operation. - In an alternative embodiment, the
operational flow 1300 may include at least oneadditional operation 1330. The at least one additional operation may include anoperation 1332, anoperation 1334, and/or anoperation 1336. Theoperation 1332 monitors the virtual world for the occurrence of a loss defined in the agreement. Theoperation 1334 manages the virtual world. Theoperation 1336 accepts a participant input operating a character in the virtual world. In a further embodiment, the participant input operating a character in the virtual world includes any participant input that ultimately affects a character or avatar in the virtual world associated with the participant. -
FIG. 28 illustrates a partial view of an exemplary computer-program product 1350 in which embodiments may be implemented. The computer-program product includes a computer-readable signal-bearing medium 1352bearing program instructions 1354. The program instructions are operable to perform a process in a computer system. The process includes receiving a claim for a benefit based upon a purported occurrence in a virtual world of a defined loss described in an agreement and suffered by a participant of at least two participants (hereafter referred to as “the participant”). The virtual world is operable to interact with at the least two participants over a network. The agreement includes an obligation of a protection entity to provide the benefit to the participant upon an occurrence of the defined loss in the virtual world. The claim for a benefit may be received from the participant, from the protection entity, or from a third party. The process further includes verifying the purported occurrence of the defined loss in the virtual world. The process further includes responding to the claim for a benefit based upon the verifying the purported occurrence of the defined loss in the virtual world. - In an embodiment, the responding to the claim for the benefit based upon the verifying the purported occurrence of the defined loss in the virtual world includes responding that the purported occurrence of the defined loss in the virtual world is verified 1356. In another embodiment, the responding that the purported occurrence of the defined loss in the virtual world is verified includes responding that the purported occurrence of the defined loss in the virtual world is verified and the claim is allowed 1358. In a further embodiment, the responding to the claim for the benefit based upon the verifying the purported occurrence of the defined loss in the virtual world includes responding that the purported occurrence of the defined loss in the virtual world is not verified 1360. In another embodiment, the verifying the purported occurrence of the defined loss in the virtual world includes correlating the purported occurrence of the defined loss in the virtual world and a computing-machine-identified occurrence of the defined loss experienced by the participant in the
virtual world 1362. In a further embodiment, the correlating the purported occurrence of the defined loss in the virtual world and a computing-machine-identified occurrence of the defined loss experienced by the participant in the virtual world includes correlating the purported occurrence of the defined loss in the virtual world and a computing-machine-monitored occurrence of the defined loss experienced by the participant in thevirtual world 1364. - In an embodiment, the computer-readable signal-bearing medium includes a
computer storage medium 1366. In another embodiment, the computer-readable signal-bearing medium includes acommunication medium 1368. - Based on the foregoing descriptions and drawing disclosures of exemplary embodiments, new and advantageous features provide benefits to those individuals who participate in virtual world environments, and benefits to operators of virtual world environments. In that regard, some embodiments enable identifying occurrences of a covered loss in a virtual world environment, and keeping a record of the identified occurrences. For example, instances of property damage and loss of a power in the virtual world environment may be identified. The identified occurrences of a covered loss may be used as a basis on which a participant may claim benefits for the occurrence of a covered loss, notice may be provided of the occurrence of a covered loss, and/or protection entity may allow or deny a claim for benefits for the occurrence of a covered loss. Continuing with the example, a participant may receive a notification that a loss of a power or a property is a loss described in a risk mitigation agreement. In response to the notice, the participant may decide to request the benefit for the loss under the risk mitigation agreement. In a preferred embodiment, the identifying and/or keeping a record of the identified occurrences is performed by a program and/or module associated with the virtual world. In another embodiment, the identifying and/or keeping a record of the identified occurrences is performed by a program and/or module not associated with the virtual world.
- In another regard, some embodiments enable a participant to submit an inquiry whether an occurrence of a loss has been identified by a system implementing an embodiment as a loss described in a risk mitigation agreement. For example, a participant may inquire whether a recent loss of a power or a property experienced by the participant is a loss described in a risk mitigation agreement, and/or whether benefits will be transferred under the risk mitigation agreement. Other embodiments enable a participant to submit an inquiry directed toward whether an occurrence of a loss was identified as a loss described in a risk mitigation agreement. Continuing with the example, the participant may receive a response to their query confirming or denying that the recent loss of a power or a property experienced by the participant is a loss described in a risk mitigation agreement, and/or whether benefits will be transferred under the risk mitigation agreement.
-
FIG. 29 illustrates a partial view of anexemplary system 1380 in which embodiments may be implemented. The system includes a covered-loss detection module 1384 and aclaims module 1390. The covered-loss detection module includes an operability to identify an occurrence of a defined loss in a virtual world suffered by a participant of at least two participants (hereafter referred to as “the participant”) that participate in the virtual world. The defined loss is described in a risk management agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the defined loss in the virtual world. The claims module includes an operability to send a signal indicative of the occurrence of a defined loss in the virtual world. - In an embodiment, the covered-
loss detection module 1384 further includes an event-checkingmodule 1386 operable to monitor the virtual world for an occurrence of a loss in the virtual world suffered by the participant. In another embodiment, the event-checking module may include a loss table 1388 that includes at least two preselected losses that the participant might suffer in the virtual world. The event-checking module monitors the participant's activity in the virtual world and may generate event data indicative of one or more events correlating to one or more preselected losses of the loss table. Periodically, the event data may be searched for an instance of the defined loss, and any found instances of a defined loss may be saved in astorage medium 1392 and/or provided to a data recipient. In another embodiment, the covered-loss detection module includes a defined loss table 1385 corresponding with at least the defined loss. - In a further embodiment, the
claims module 1390 includes a claims module operable to receive a benefit claim corresponding to the occurrence of a defined loss in thevirtual world 1397. In an embodiment, the claims module includes a claims module operable to approve a benefit claim corresponding to the occurrence of a defined loss in thevirtual world 1398. -
FIG. 30 illustrates a partial view of anexemplary system 1400 in which embodiments may be implemented. The system includes acomputing system 1402 couplable to a network. The system also includes anoverseer module 1406 operable to monitor a virtual world for an occurrence of a loss defined in an agreement. The virtual world includes a virtual world configured to interact with at least two participants via a network. The agreement includes an obligation of a protection entity to provide a benefit to a participant of the at least two participants (hereafter referred to as “the participant”) upon an occurrence of the defined loss in the virtual world. The system further includes areporting module 1408 operable to transmit via the network a signal indicative of an occurrence of a loss defined in the agreement. - In an embodiment, the
overseer module 1406 operable to monitor a virtual world for an occurrence of a loss defined in an agreement includes an overseer module operable to monitor a virtual world for at least one of a prior, a current, and/or an anticipated occurrence of a loss defined in an agreement. In another embodiment, thereporting module 1408 operable to transmit via the network a signal indicative of a monitored occurrence of a loss defined in the agreement includes a reporting module operable to transmit via the network a signal indicative of a monitored occurrence of a loss defined in the agreement to at least one of the protection entity, to the participant, a third-party, and/or manager of the virtual world. - In another embodiment, the
system 1400 includes aclaim module 1412 operable to respond to an inquiry corresponding to the monitored occurrence of a defined loss in the virtual world. In an alternative embodiment, the claims module is operable to verify and/or deny the inquiry. In an embodiment, the claims module is operable to respond to a participant and/or a participant protection entity. -
FIG. 31 illustrates an exemplaryoperational flow 1450 in which embodiments may be implemented. After a start operation, the operational flow moves to asupervision operation 1460. The supervision operation monitors a virtual world operable to interact with a participant over a network. Adissemination operation 1470 transmits a reporting signal indicative of an identified occurrence of a protected loss in the virtual world suffered by the participant. In an embodiment, the reporting signal may be transmitted to at least one of the protection entity, the participant, a third party, and/or a manager of the virtual world. In another embodiment, the protected loss includes a protectedloss 1472 described in an agreement that includes an obligation of a protection entity to provide a benefit to the participant upon the participant suffering an occurrence of the protected loss in the virtual world. The operational flow proceeds to an end operation. - The operational flow may include at least one
additional operation 1480. The at least one additional operation may include anoperation 1482, and/or anoperation 1484. Theoperation 1482 monitors the virtual world for the occurrence of a protected loss. Theoperation 1484 responds to a benefit claim corresponding to a purported occurrence of a protected loss suffered by the participant in the virtual world based at least in part on the identified occurrence of a protected loss in the virtual world. In a further embodiment, theoperation 1484 response includes at least one of verifying, denying, and/or explaining a benefit claim corresponding to a purported occurrence of a protected loss suffered by the participant. -
FIG. 32 illustrates a partial view of an exemplary computer-program product 1500 in which embodiments may be implemented. The computer-program product includes a computer-readable signal-bearing medium 1502 bearing program instructions 1504 for executing a computer process in a computing system. The computer-program product encodes the computer program for executing the computer process. The computer process includes monitoring a virtual world configured to interact with at least two participants over a network for an occurrence of a loss defined in an agreement. The agreement includes an obligation of a protection entity to provide a benefit to a participant of the at least two participants (hereafter referred to as “the participant”) upon an occurrence of the defined loss in the virtual world. The computer process also includes transmitting a signal indicative of a monitored occurrence of a loss defined in the agreement. - In an embodiment, the process of the program instructions may also include at least one additional process. The at least one additional process may include a
process 1506, aprocess 1508, and/or aprocess 1510. The program instructions at theprocess 1506 include operating the virtual world. The operating the virtual world may include managing the virtual world, controlling at least one aspect of the virtual world, directing the virtual world, running the virtual world, and/or activating the virtual world. The program instructions at theprocess 1508 include operating the protection entity. The program instructions at theprocess 1510 include responding to an inquiry corresponding to a monitored occurrence of a defined loss in the virtual world. - In another embodiment, the computer-readable signal-bearing medium includes a
computer storage medium 1512. In a further embodiment, the computer-readable signal-bearing medium includes acommunication medium 1514. -
FIG. 33 illustrates a partial view of an exemplary article ofmanufacture 1520 in which embodiments may be implemented. The article includes a computer-readable signal-bearing medium 1522 and a signal 1524 borne by the computer-readable signal-bearing medium. The signal is indicative of a detected occurrence of a defined loss described in an agreement, and generated in response to monitoring a virtual world for an occurrence of the defined loss described in an agreement. The virtual world includes a virtual world operable to interact with a plurality of participants over a network. The agreement includes an obligation of a protection entity to provide a benefit to a participant upon an occurrence of the defined loss by the participant in the virtual world in exchange for a consideration. - In an embodiment, the computer-readable signal-bearing medium includes at least a portion of digital network
physical transmission medium 1526. In another embodiment, the computer-readable signal-bearing medium includes at least a portion of digital networkwireless transmission medium 1528. In a further embodiment, the computer-readable signal-bearing medium includes a computer-readable signal-bearing medium 1532. - Based on the foregoing descriptions and drawing disclosures of exemplary embodiments, new and advantageous features provide benefits to those individuals who participate in virtual world environments, as well as benefits to participant entities that provide risk mitigation in virtual world environments. In that regard, some embodiments detect occurrences of a defined loss in a virtual world environment suffered by a participant. For example, a detection module may identify an instance of a damage to property in which the participant has an interest may be detected, or a loss of a power by an avatar managed by the participant. An example of damage to a property may include theft of a virtual world property of another participant, or flood damage to a virtual world property. A claims module may send a notice to the participant telling them their property was stolen, or that a flood has damaged their property. The notice may be sent to the virtual world environment and/or a participant protection entity. In a preferred embodiment, the detection module and the claims module are not associated with the virtual world environment. Theses modules may be associated with a third party, such as a trusted third party, or the protection entity. In another embodiment, the modules may be associated with the virtual world environment.
-
FIG. 34 illustrates a partial view of anexemplary system 1550 in which embodiments may be implemented. The system includes acomputing system 1552 couplable to a virtual world via a network. The system also includes instructions 1554. The instructions when executed on the computing system cause the computing system to generate a signal responsive to a received participant input and operable to affect a character in the virtual world. The instructions also cause the computing device to identify an occurrence of a defined loss suffered by the character. The defined loss is described in a risk management agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence in the virtual world of the defined loss. - In an alternative embodiment, at the
operation 1556, the instructions that cause the computing system to identify an occurrence of a defined loss suffered by the character include instructions that cause the computing system to monitor the virtual world for an occurrence of the defined loss. For example, the computing system may monitor the virtual world for a current and/or real time occurrence of the defined loss. Alternatively, the computing system may monitor the virtual world for a prior occurrence of the defined loss. In a further embodiment, at theoperation 1558, the instructions further cause the computing system to display an information corresponding to the identified occurrence of the defined loss. In an embodiment, at theoperation 1562, the instructions further cause the computing system to display an information corresponding to the identified occurrence of the defined loss in response to a received input from the participant. In another embodiment, at theoperation 1564, the instructions further cause the computing system to transmit a signal indicative of a claim for a benefit based at least in part upon the identified occurrence of the defined loss. In a further embodiment, at theoperation 1566, the instructions further cause the computing system to transmit a signal indicative of a claim for a benefit based at least in part upon the identified occurrence of the defined loss in response to a received input from the participant. -
FIG. 35 illustrates an exemplaryoperational flow 1600 in which embodiments may be implemented. After a start operation, the operational flow moves to acontrol operation 1610. The control operation sends a signal responsive to a received participant input and operable to affect a character in a virtual world. In an embodiment, the participant input is physically received by a computing system, such as thecomputing system 20 ofFIG. 1 or thecomputing system 100 ofFIG. 2 , and the corresponding signal is transmitted to the virtual world via a network, such as the Internet. The signal is used by the virtual world to affect the character in the virtual world, such as moving an arm of an avatar. Adetection operation 1620 identifies an occurrence in the virtual world of a loss defined in an agreement. The agreement including an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the defined loss in the virtual world suffered by the character in exchange for a consideration. In an embodiment, the detection operation is performed by a computing system that physically received the participant input. In another embodiment, the detection operation is performed by a computing system or computing device remote from the computing device that physically received the participant input. - A
request operation 1630 sends a claim for a benefit corresponding to the identified occurrence of the defined loss. In an embodiment, the claim for a benefit is transmitted to a non-participant protection entity associated with the virtual world. In another embodiment, the claim for a benefit is transmitted to a participant protection entity. The operational flow proceeds to an end operation. -
FIG. 36 illustrates an alternative embodiment of theoperational flow 1600 ofFIG. 35 . Thecontrol operation 1610 may include at least one additional operation, such as anoperation 1612, and/or anoperation 1614. Theoperation 1612 sends a signal that corresponds to a received participant input and affects a representation of the participant in a virtual world. Theoperation 1614 sends a signal that corresponds to a received participant input and affects a virtual character that represents a real-world participant in a virtual world. Therequest operation 1630 may include at least one additional operation, such as anoperation 1632. Theoperation 1632 sends a claim for a benefit based at least in part upon the identified occurrence of the defined loss in response to a received participant input. -
FIG. 37 illustrates an alternative embodiment of theoperational flow 1600 ofFIG. 35 . The operational flow may include acommunication operation 1642 that displays a benefit information related to the identified occurrence of the defined loss. -
FIG. 38 illustrates a partial view of an exemplary computer-program product 1650 in which embodiments may be implemented. The computer-program product includes a computer-readable signal-bearing medium 1652bearing program instructions 1654. The program instructions are operable to perform a process in a computer system. The process includes sending a signal that corresponds to a received participant input and affects a character in a virtual world. The process further includes identifying an occurrence of a defined loss suffered by the character, the defined loss described in a risk management agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence in the virtual world of the defined loss. The process also includes transmitting a signal indicative of a claim for a benefit based at least in part upon the identified occurrence of the defined loss. In an embodiment, the computer-readable signal-bearing medium includes acomputer storage medium 1656. In another embodiment, the computer-readable signal-bearing medium includes acommunication medium 1658. -
FIG. 39 illustrates a partial view of anexemplary system 1700 in which embodiments may be implemented. The system includes acomputing system 1702 couplable to a virtual world via a network, and instructions 1710. The instructions when executed by the computing system cause the computing system to send a signal corresponding to a received participant input and acceptable by a virtual world to influence a character in the virtual world. The instructions further cause the computing system to send a signal indicative of a benefit claim corresponding to an occurrence of a defined loss suffered by the character in the virtual world. The loss is defined in an agreement that includes an obligation of a protection entity to provide the benefit to the character upon the character suffering an occurrence of the defined loss in the virtual world. - In an alternative embodiment, the instructions cause the computing system to perform at least one additional operation. The at least one additional operation may include an operation 1712, an operation 1714, an operation 1716, an
operation 1726, and/or an operation 1728. At the operation 1712, the instructions further cause the computing system to receive a signal indicative of the character suffering the occurrence of a defined loss in the virtual world. At the operation 1714, the instructions further cause the computing system to identify the occurrence of a defined loss suffered by the character in the virtual world. At the operation 1716, the instructions further cause the computing system to monitor the virtual world for the occurrence of a defined loss suffered by the character in the virtual world. At theoperation 1726, the network includes at least one of a private computer network, a public computer network, and the Internet. At the operation 1728, the instructions that cause the computing system to send a signal indicative of a benefit claim corresponding to an occurrence of a defined loss suffered by the character in the virtual world include instructions that cause the computing system to send a signal indicative of a benefit claim corresponding to an occurrence of a defined loss suffered by the character in the virtual world to the protection entity at least one of the virtual world, or the protection entity. -
FIG. 40 illustrates an alternative embodiment of the instructions 1710 of theexemplary system 1700 ofFIG. 39 . At the operation 1720, the instructions further cause the computing system to display information related to the occurrence of the defined loss. In a further embodiment, the operation 1720 may cause the computing system to perform at least one additional operation. The at least one additional operation may include an operation 1722 and/or an operation 1724. At the operation 1722, the instructions cause the computing system to display at least one of visual, audible, and/or tactile information related to the occurrence of the defined loss. At the operation 1724, the instructions cause the computing system to display information related to the occurrence of the defined loss in a dialog box. -
FIG. 41 illustrates a partial view of an exemplary computer-program product 1740 in which embodiments may be implemented. The computer-program product includes a computer-readable signal-bearing medium 1742bearing program instructions 1744 for executing a computer process in a computing system. The computer-program product encodes the computer program for executing the computer process. The computer process includes accepting a participant input operating a virtual character in a virtual world. The computer process also includes receiving a signal indicative of a monitored occurrence of a defined loss suffered by the character in the virtual world. The loss is described in an agreement that includes an obligation of a protection entity to provide the benefit to the character upon the character suffering an occurrence of the defined loss in the virtual world. The computer process further includes displaying information related to the monitored occurrence of the defined loss. - In an embodiment, the process of the program instructions may also include at least one additional operation, such as the
operation 1746. At theoperation 1746, the process further includes sending a signal indicative of a benefit claim corresponding to the monitored occurrence of a defined loss suffered by the character in the virtual world. In another embodiment, the computer-readable signal-bearing medium includes acomputer storage medium 1748. In a further embodiment, the computer-readable signal-bearing medium includes acommunication medium 1749. -
FIG. 42 illustrates an exemplaryoperational flow 1760 in which embodiments may be implemented. After a start operation, the operational flow moves to arequest operation 1770. The request operation sends a claim for a benefit corresponding to a purported occurrence of a defined loss described in an agreement and suffered by a participant in a virtual world. The virtual world includes an operability to interact with at least two participants over a network. The agreement includes an obligation of a protection entity to provide the benefit to the participant upon an occurrence of the defined loss suffered in the virtual world by the participant. Acommunication operation 1780 receives a signal responsive to a correlation of the purported occurrence of a defined loss in the virtual world and an identified occurrence of a defined loss in the virtual world. Abroadcast operation 1790 displays a participant information corresponding to the correlation of the purported occurrence of a defined loss in the virtual world and an identified occurrence of a defined loss in the virtual world. In an embodiment, the broadcast operation provides a visual display, and/or an audible display. In another embodiment, the broadcast operation displays a participant information in a dialog box. For example, in response to a received signal responsive to a positive correlation of the purported occurrence of a defined loss in the virtual world and an identified occurrence of a defined loss in the virtual world, the dialog box may visually communicate that the claim for a benefit is verified and/or allowed. Conversely, in response to a received signal responsive to a negative correlation of the purported occurrence of a defined loss in the virtual world and an identified occurrence of a defined loss in the virtual world, the dialog box may visually communicate that the claim for a benefit is not verified and/or is therefore denied. The operational flow moves to an end operation. - In an alternative embodiment, the
operational flow 1760 may include at least one additional operation, such as anoperation 1795. Theoperation 1795 facilitates the participant obtaining the benefit corresponding to a purported occurrence of a defined loss described in an agreement and suffered by a participant in a virtual world. -
FIG. 43 illustrates a partial view of anexemplary system 1900 in which embodiments may be implemented. The system includes amonitoring module 1910 and acommunication module 1920. The monitoring module operable to identify an occurrence of an uncovered loss in a virtual world experienced by a participant and not covered in an existing risk mitigation arrangement between the participant and a protection entity (hereafter “uncovered loss”). In an embodiment, the uncovered loss includes at least one of loss occurring by reason of harm, an injury, a death of the participant, a death of another participant, damage, a casualty, a disability, and an imposed punitive obligation. In another embodiment, the uncovered loss includes a loss occurring by reason of determinable contingency. In a further embodiment, the uncovered loss includes a loss relative to a subject matter in which the participant has an interest. - The
communication module 1920 is operable to provide a signal indicative of the identified occurrence of an uncovered loss. In an embodiment, the signal indicative of the identified occurrence of an uncovered loss is provided to the participant, and/or to the protection entity. In an embodiment, thecommunication module 1920 may include at least one additional operability. The at least one additional operability includes anoperability 1922, anoperability 1924, and/or anoperability 1926. At theoperability 1922, the communication module includes an operability to display information corresponding to the identified occurrence of an uncovered loss. At theoperability 1924, the communication module includes an operability to provide a signal indicative of a proposed risk mitigation arrangement available to the participant. At theoperability 1926, the communication module further includes a broadcast module operable to display a proposed risk mitigation arrangement available to the participant. -
FIG. 44 illustrates a partial view of anexemplary system 1950 in which embodiments may be implemented. The system includes anoverseer module 1960 and areporting module 1970. The overseer module is operable to monitor a virtual world for an occurrence of a preselected loss suffered by a participant and not covered in an existing risk mitigation agreement between the participant and a protection entity. In an embodiment, the preselected loss includes a preselected loss of at least two preselected losses. In another embodiment, the system may be implemented in thethin computing device 20 ofFIG. 1 , and/or thecomputing system environment 100 ofFIG. 2 . - The
reporting module 1970 is operable to transmit a signal indicative of a monitored occurrence of a preselected loss not covered in the existing risk mitigation agreement. In an embodiment, the signal may be transmitted to the protection entity, the participant, a third party, and/or a manager of the virtual world. In an embodiment, the reporting module includes at least one additional module. The at least one additional module may include afirst marking module 1982, asecond module 1984, anegotiation module 1986, and/or athird marketing module 1988. - The
first marketing module 1982 includes a marketing module operable to promote a new risk mitigation arrangement to the participant. In another embodiment, the first marketing module includes a marketing module operable to promote a risk mitigation arrangement to the participant covering the monitored occurrence of a preselected loss that is not otherwise covered in any risk management agreement between the participant and the protection entity. The first marketing module may be running on a computing system controlled by the participant, or another computing device. Thesecond marketing module 1984 includes a marketing module operable to display a promotion of a proposed risk mitigation service to the participant. - The
negotiation module 1986 includes a negotiation module operable to facilitate a formation of a new arrangement that includes the protection entity providing a benefit to the participant upon a future occurrence of a loss. In an embodiment, the future occurrence of a loss includes a future occurrence of the preselected loss. In another embodiment, the future occurrence of a loss includes a future occurrence of the preselected loss, a future occurrence of another preselected loss, and/or a future occurrence of a loss other than the preselected loss. Thethird marketing module 1988 includes a marketing module operable to promote to the participant a proposed risk mitigation arrangement that includes the protection entity providing a benefit to the participant upon a future occurrence of a defined loss, and a negotiation module operable to facilitate formation of the proposed risk mitigation arrangement. -
FIG. 45 illustrates an exemplaryoperational flow 2000 in which embodiments may be implemented. After a start operation, the operational flow moves to adetection operation 2010. The detection operation identifies an occurrence of a loss in a virtual world suffered by a participant and not covered by an existing risk mitigation arrangement between the participant and a protection entity (hereafter “uncovered loss”). In an embodiment, the detection operation may be performed by at least one of a virtual world provider, a program operating on a computing device operated by the participant, and/or a third party. The virtual world includes a virtual world capable of interacting with the participant and at least one other participant over a network. Anotification operation 2020 generates a signal indicative of the identified occurrence of the uncovered loss. The operational flow then proceeds to an end operation. - In an alternative embodiment, the operational flow may include an
additional operation 2030. The additional operation may include at least one of adisplay operation 2032, and/or agenerating operation 2034. The displaying operation includes displaying information corresponding to the identified occurrence of an uncovered loss in the virtual world. The generating operation includes generating a signal indicative of an opportunity for the participant to form a new risk mitigation arrangement that includes a benefit to the participant upon a future occurrence of a loss in the virtual world in exchange for a consideration. In a further embodiment, the loss in the virtual world includes at least one of the uncovered loss and/or any loss. In another embodiment, the in exchange for a consideration includes in exchange for at least one of a new consideration, a virtual world consideration, and/or a real world consideration. - In another embodiment, the
generating operation 2034 may include at least one additional operation. The at least one additional operation may include a displayingoperation 2036 and/or areceiving operation 2038. The displaying operation includes displaying an information corresponding to the opportunity for the participant to form a new risk mitigation arrangement. The receiving operation includes receiving a signal indicative of a participant-inputted response corresponding to the opportunity for the participant to form a new risk mitigation arrangement. -
FIG. 46 illustrates a partial view of an exemplary computer-program product 2050 in which embodiments may be implemented. The computer-program product includes a computer-readable signal-bearing medium 2052bearing program instructions 2054. The program instructions are operable to perform a process in a computer system. The process includes identifying an occurrence of a loss in a virtual world suffered by a participant and not covered by an existing risk mitigation arrangement between the participant and a protection entity (hereafter “uncovered loss”). The virtual world is operable to interact with the participant and at least one other participant over a network. The process also includes generating a signal indicative of the identified occurrence of the uncovered loss. - In an alternative embodiment, the
program instructions 2054 are further operable to perform at least one additional process in the computing system. The at least one additional process may include theprocess 2056 and/or theprocess 2058. Theprocess 2056 includes promoting a new risk mitigation relationship to the participant. Theprocess 2058 includes facilitating formation of a new risk management arrangement that includes a benefit to the participant upon a future occurrence of a defined loss. In an embodiment, the future occurrence of a defined loss may include a future occurrence of the uncovered loss and/or another loss. In another embodiment, the computer-readable signal-bearing medium includes acomputer storage medium 2062. In an embodiment, the computer-readable signal-bearing medium includes acommunication medium 2064. -
FIG. 47 illustrates a partial view of asystem 2100 in which embodiments may be implemented. The system includes a virtual world in which a participant may participate. The virtual world also includes a loss event having a likelihood of occurrence. In an embodiment, the virtual world is illustrated as avirtual world environment 2110 that includes avirtual world program 410 having at least oneloss event 2112. - The system also includes a record of at least one protected loss corresponding to the loss event. The protected loss is described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant. In an embodiment, the record of at least one protected loss is illustrated as a record of at least one protected loss of a
first agreement 2122. The first agreement may be saved in a record of arrangement(s)/agreement(s) 2120 of thecomputer storage medium 404 previously described in conjunction withFIG. 4 . In another embodiment, the record of at least one protected loss may include a combination of at least two individual records of arrangement(s)/agreement(s). For example, the combination of at least two individual records is illustrated as the record of at least one protected loss of thefirst agreement 2122, a record of at least one protected loss of asecond agreement 2124, and through a record of at least one protected loss of an “N”agreement 2126. The second agreement through the “Nth” agreement may likewise be saved in the record of arrangement(s)/agreement(s) 2120 of thecomputer storage medium 404. In a further embodiment, the record of at least one protected loss is illustrated as a record of at least one protectedloss 2140. The record of at least one protected loss may include an aggregation of at least two individual records of at least one protected loss, such as the record of at least one protected loss of thefirst agreement 2122, the record of at least one protected loss of thesecond agreement 2124, and through the record of at least one protected loss of the “Nth”agreement 2126. - In an alternative embodiment, the system also includes a loss
event regulator module 2150 operable to change the likelihood of occurrence of the loss event in response to the protected loss. The likelihood of occurrence of the loss event may be changed and/or adjusted in any manner. In an embodiment, the likelihood of an occurrence of the loss event may be changed directly, changed indirectly, and/or changed by influencing the participant. For example, the likelihood of a loss event may be changed directly by changing a likelihood that a loss event will occur. In another embodiment, a likelihood that a participant will experience a loss event may be changed indirectly, such as by changing a likelihood that the participant will suffer another loss event before the loss event. A likelihood may be changed indirectly by altering a participant's experience. The participant's experience may be altered by limiting or expanding paths in a virtual world available to the participant, the different paths having a differing likelihood of occurrence of a loss event, thus changing a likelihood that a loss event will occur. In a further embodiment, a likelihood that a participant will experience a loss event may be changed by influencing the participant's behavior in the virtual world. Any type of influence may be used. For example, colors, sounds, signs, visual cues, a non-participant virtual world character (such as a Siren), diversions, pleasant experiences, environmental factors, and/or other conscious or subconscious influencing factors, manipulations, or methods may be used to steer the participant toward or away from a loss event. A selected influencer may also be targeted only at the participant, at the participant and another participant, or at a larger group of participants. In another embodiment, one selected influencer may be targeted toward the participant, and another selected influencer may be targeted toward another participant. - In another embodiment, the loss
event regulator module 2150 is operable to change a likelihood of a participant becoming involved with a characteristic or aspect of a virtual world (hereafter “a virtual world event”). The likelihood is changed in response to an objective, which in an embodiment may be programmed into the loss event regulator module, or which in another embodiment may be programmed into another module operable to communicate with the loss event regulator module. The likelihood of occurrence of the virtual world event may be changed and/or adjusted in any manner. In an embodiment, the likelihood of an occurrence of the virtual world event may be changed directly, changed indirectly, and/or changed by influencing the participant. For example, the likelihood of a virtual world event may be changed directly by changing a likelihood that the virtual world event will occur. In another embodiment, a likelihood that a participant will experience a virtual world event may be changed indirectly, such as by changing a likelihood that the participant will experience another virtual world event before the virtual world event. A likelihood may be changed indirectly by altering a participant's experience. The participant's experience may be altered by limiting or expanding paths in a virtual world available to the participant, the different paths having a differing likelihood of occurrence of a virtual world event, thus changing a likelihood that the virtual world event will occur. In a further embodiment, a likelihood that a participant will experience a virtual world event may be changed by influencing the participant's behavior in the virtual world. Any type of influence may be used. For example, colors, sounds, signs, visual cues, a non-participant virtual world character (such as a Siren), diversions, pleasant experiences, environmental factors, and/or other conscious or subconscious influencing factors, manipulations, or methods may be used to steer the participant toward or away from a virtual world event. A selected influencer may also be targeted only at the participant, at the participant and another participant, or at a larger group of participants. In another embodiment, one selected influencer may be targeted toward the participant, and another selected influencer may be targeted toward another participant. - In another embodiment, the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to an objective related to the protected loss. An objective may include any purpose. In an embodiment, an objective includes at least one of maximizing the participant's involvement in the virtual world, and/or maximizing a profit generated by the agreement.
- In an embodiment, the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss. In another embodiment, the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another event in the virtual world. In a further embodiment, the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another event in the virtual world includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another loss event in the virtual world. In an embodiment, the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another event in the virtual world. In a further embodiment, the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another event in the virtual world includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another loss event or a non-loss event in the virtual world. In an embodiment, the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by leaving a likelihood of an occurrence of another event in the virtual world unchanged and decreasing the likelihood of an occurrence in the virtual world of the loss event.
- In an embodiment, the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss. In a further embodiment, the loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to increase the likelihood of an occurrence of the loss event by decreasing a likelihood of another loss event occurrence in the virtual world. In another embodiment, the loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to increase the likelihood of an occurrence of the loss event by leaving a likelihood of another loss event occurrence in the virtual world unchanged and increasing the likelihood of an occurrence of the loss event. In a further embodiment, the loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss includes a loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss and in response to a prediction of a result of changing the likelihood of occurrence of the loss event.
- In an embodiment, the virtual world in which a participant may participate includes a virtual world in which at least two participants may participate. In another embodiment, the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world further includes a virtual world in which a participant may participate and that includes at least two loss events each respectively having a likelihood of occurrence in the virtual world. In a further embodiment, the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world further includes a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world with respect to the participant. In another embodiment, the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world farther includes a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world with respect to the participant and at least one other participant.
- In an embodiment, the loss event includes a determinable contingency sufferable by the participant. In another embodiment, the loss event includes an indeterminable contingency sufferable by the participant. In a further embodiment, the loss event includes an unknown contingency sufferable by the participant. In another embodiment, the loss event includes at least one of an injury, a loss, a theft, a damage, a harm, a casualty, a disability, a loss of use, loss of income, a loss of life, a consequential loss, and/or an imposed punitive obligation suffered by the participant. In a further embodiment, the loss event includes an adverse effect on an attribute and/or association of an avatar controlled by the participant in the virtual world. In another embodiment, the defined loss in the virtual world suffered by the participant includes a loss of a level privilege, an access privilege, a closing of a location, and/or a missed event. In a further embodiment, the loss event includes at least one of a harm, an injury, a loss of a life, a damage, a casualty, and/or a disability befalling another participant in the virtual world.
- In an embodiment, the protected loss described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant further includes a protected loss described in an agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant. In another embodiment, the protection entity is illustrated as a
participant protection entity 2130. In a further embodiment, the protection entity may include a non-participant protection entity, such as a protection entity associated with the virtual world environment. In another embodiment, the protection entity includes a non-participant protection entity. In a further embodiment, the protection entity includes a non-participant protection entity. In another embodiment, the non-participant protection entity includes a non-participant protection entity under a control of at least one of a provider of the virtual world, an operator of the virtual world, or a person associated with the virtual world. In a further embodiment, the benefit includes a compensation for the defined loss. - In an embodiment, the record of a protected loss corresponding to the loss event includes a record of the agreement. In another embodiment, the record of a protected loss includes a record of a protected loss described in a first risk management agreement and in a second risk management agreement. In a further embodiment, the record of a protected loss includes a record of a protected loss described in a first agreement having an obligation of a first protection entity to provide a first benefit to a first participant upon an occurrence of the protected loss suffered by the first participant and the protected loss described in a second agreement having an obligation of a second protection entity to provide a second benefit to a second participant upon an occurrence of the protected loss suffered by the second participant. In another embodiment, the first protection entity and the second protection entity are at least substantially similar.
- Based on the foregoing, some embodiments enable a virtual world to mange occurrences of a loss event in the virtual world in response to outstanding risk mitigation agreements that cover the loss event. For example, an owner, operator, or a manager of a virtual world may make a loss event less likely to occur in the virtual world when one or more instances of risk mitigation agreements describe the loss event as a protected loss. In making a decision to make a loss event less likely to occur in the virtual world, the virtual world may look at protected losses described in one or more records of risk management agreements. The risk management agreements may be maintained by the virtual world, and/or by a protection entity. By way of another example, an owner, operator, or a manager of a virtual world could make a loss event more likely to occur in the virtual world when one or more instances of risk mitigation agreements do not describe the loss event as a protected loss.
-
FIG. 48 illustrates a partial view of anexemplary system 2200 in which embodiments may be implemented. The system includes acomputing system 2252 couplable to a network and operable to interact with at least two participants via the network. The computing system includes acomputing device 2254. The computing device includes aprogram module 2260 operable to manage a virtual world that includes a loss event having a probability of occurrence. The computing device also includes abenefits exposure module 2270 operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants. The computing device further includes aloss management module 2280 operable to modify the probability of occurrence of the loss event in response to the protected loss. - In an embodiment, the benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants includes a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants, the risk management agreement including an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant. In another embodiment, the benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants includes a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a first risk management agreement between a first protection entity and a first participant of the at least two participants, and described in a second risk management agreement between a second protection entity and a second participant of the at least two participants. In a further embodiment, the first protection entity and the second protection entity are at least substantially similar.
- In an embodiment, the loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss includes a loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss and in response to a possible outcome of changing the probability of occurrence of the loss event. In another embodiment, the loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss includes a loss management module operable to modify the probability of occurrence of the loss event in response to a goal related to the protected loss. In a further embodiment, the loss management module operable to modify the probability of occurrence of the loss event in response to a goal related to the protected loss includes a loss management module operable to modify the probability of occurrence of the loss event in response to a goal that includes at least one of increasing a satisfaction of the participant, motivating the participant, increasing revenue received by the virtual world, increasing income of the protection entity, and/or encouraging formation of another risk management agreement describing the protected loss.
- Based on the foregoing, some embodiments may include managing occurrences of a loss event in a virtual world in response to outstanding risk mitigation agreements that cover the loss event. For example, in an embodiment, the virtual world is operated on a computing system, such as a server or a group of servers dedicated to operating the virtual world. The computing system communicates over a network, such as the Internet, with at least two individuals who participate in the virtual world. In an embodiment, the virtual world may be a massive multiplayer online game, and the players may be able to act through their respective avatars in the virtual world, including competing against each other. The computing system includes a program module that manages the virtual world. The virtual world includes loss events having a probability of occurrence. For example, a loss event may include a severe flood event that overwhelms and drowns an avatar. The program module may be programmed to implement the severe flood event on a temporally reoccurring basis. For example, the severe flood event may be initially programmed to occur once each 60 minutes of a participant's avatar being active in a virtual world. Alternatively, the severe flood event may be initially programmed to occur 50% of the time a participant reaches a selected level or a selected portion of the virtual world.
- Continuing with the above example, the benefits exposure module is operable to select a protected loss corresponding to a loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants. In an embodiment, the benefits exposure module selects a loss event of the virtual world and then ascertains a correspondence with a protected loss. In another embodiment, the benefits exposure module selects a protected loss and ascertains a correspondence with a loss event. For example, a first participant may have entered into a first agreement with a first risk management entity that provides the first participant a compensatory benefit if the first participant's avatar suffers a protected loss of drowning in a flood event. The benefit may include a replacement of the life of the drowned avatar. Continuing with the example, a second participant may have entered into a second risk management agreement that does not cover the second participant's avatar being drowned in a flood event. The benefit exposure module may select the flood event as a loss event and establish a positive correspondence with a protected loss of drowning in a flood event as described in the risk management agreement between the protection entity and the first participant. In an alternative embodiment, the benefit exposure module may select the flood event from a list of loss events having a probability of occurrence, and then find a positive correspondence between the flood event as a protected loss described in the first participant's agreement with the risk management entity. In another embodiment, the benefit exposure module may select the flood event from a record of a protected loss described in the first participant's agreement with the risk management entity, and then find a positive correspondence from a list of loss events. Conversely, the benefit module may find a negative or no correspondence between the flood event and a protected loss of the second participant's agreement because a flood event is not a protected loss under the second agreement.
- The system further includes a loss management module. The loss management module modifies the probability of occurrence of the loss event in response to a correspondence found between the protected loss and the selected loss event. Continuing with the example, if the loss management module includes a goal to minimize instances of protected drowning losses, the loss management module will minimize the probability of flood type loss events. In an embodiment, the loss management module may directly modify the probability of the flood event occurring to the avatar controlled by the first participant in response to the positive correspondence. The modification may be implemented by increasing the programmed time interval between flood events to once each 120 minutes of a participant's avatar being active in a virtual world. In an alternative embodiment, the modification may be implemented by programming the severe flood event to occur 30% of the time that the avatar controlled by the first participant reaches a selected level or a selected portion of the virtual world. In another embodiment, the loss management module may indirectly modify the probability of the flood event occurring to the avatar controlled by the first participant. An indirect modification may include increasing other loss events such that the avatar controlled by the first participant is increasingly likely to lose a life through another loss event, for example, such as by a war, or as a bystander to a hostage situation. In another alternative embodiment, the modification may be implemented by influencing the first participant. For example, an overt influence may be used by blocking and/or obstructing a path to a portion of the virtual world where the flood event will occur. In another example, a subtle or manipulative technique may be used to influence the first participant away from the flood event, such as coloring a path away from the flood event in a commonly selected color, and/or such as associating an alluring figure or a Siren with the path away from the flood event:
- In a further embodiment, the loss management module may increase the probability of the flood event occurring to the avatar controlled by the second participant in response to the negative correspondence. For example, the interval between flood events may be reduced to 30 minutes.
-
FIG. 49 illustrates an exemplaryoperational flow 2300 in which embodiments may be implemented. After a start operation, the operational flow moves to anadministration operation 2310. The administration operation manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world. Apicking operation 2320 selects a protected loss corresponding to the at least one loss event, the protected loss described in an agreement that includes an obligation of a protection entity to provide a benefit to a participant of at least one participant upon an occurrence of the selected protected loss in the virtual world. Anadjustment operation 2330 modifies the incidence of the at least one loss event in response to the selected protected loss. The operational flow then process to an end operation. - A loss event having a modifiable incidence includes a loss event having a modifiable occurrence, a modifiable frequency, a modifiable rate, and/or a modifiable mode.
-
FIG. 50 illustrates an alternative embodiment of the exemplaryoperational flow 2300 ofFIG. 49 . Theadministration operation 2310 may include at least one additional operation. The at least one additional operation may include anoperation 2312, and/or anoperation 2314. Theoperation 2312 manages a virtual world operable to interact with at least one participant over a network and that includes at least two loss events each respectively having a modifiable incidence in the virtual world. Theoperation 2314 manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable temporal rate of occurrence in the virtual world. -
FIG. 51 illustrates another alternative embodiment of the exemplaryoperational flow 2300 ofFIG. 49 . Theadministration operation 2310 may include at least one additional operation. The at least one additional operation may include anoperation 2316, and/or anoperation 2318. Theoperation 2316 manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable circumstance of occurrence in the virtual world. Theoperation 2318 manages a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence of occurrence in the virtual world. -
FIG. 52 illustrates a further alternative embodiment of the exemplaryoperational flow 2300 ofFIG. 49 . Thepicking operation 2320 may include at least one additional operation, such as anoperation 2322. At theoperation 2322, the protected loss described in an agreement includes a protected loss described in a first risk management agreement and in a second risk management agreement. - The
adjustment operation 2330 may include at least one additional operation, such as anoperation 2332 and/or anoperation 2334. At theoperation 2332, the modifying the incidence of the at least one loss event in response to the selected protected loss includes modifying the incidence of the at least one loss event in response to the selected protected loss and in response to a projected result of modifying the incidence of the loss event. At theoperation 2334, the modifying the incidence of the at least one loss event in response to the selected protected loss includes modifying the incidence of the at least one loss event in response to the selected protected loss and in response to a goal corresponding to the protected loss. - Those having skill in the art will recognize that the state of the art has progressed to the point where there is little distinction left between hardware and software implementations of aspects of systems; the use of hardware or software is generally (but not always, in that in certain contexts the choice between hardware and software can become significant) a design choice representing cost versus efficiency tradeoffs. Those having skill in the art will appreciate that there are various vehicles by which processes and/or systems and/or other technologies described herein can be effected (e.g., hardware, software, and/or firmware), and that the preferred vehicle may vary with the context in which the processes and/or systems and/or other technologies are deployed. For example, if an implementer determines that speed and accuracy are paramount, the implementer may opt for a mainly hardware and/or firmware vehicle; alternatively, if flexibility is paramount, the implementer may opt for a mainly software implementation; or, yet again alternatively, the implementer may opt for some combination of hardware, software, and/or firmware. Hence, there are several possible vehicles by which the processes and/or devices and/or other technologies described herein may be effected, none of which is inherently superior to the other in that any vehicle to be utilized is a choice dependent upon the context in which the vehicle may be deployed and the specific concerns (e.g., speed, flexibility, or predictability) of the implementer, any of which may vary. Those skilled in the art will recognize that optical aspects of implementations will require optically-oriented hardware, software, and or firmware.
- The foregoing detailed description has set forth various embodiments of the devices and/or processes via the use of block diagrams, flow diagrams, operation diagrams, flowcharts, illustrations, and/or examples. Insofar as such block diagrams, operation diagrams, flowcharts, illustrations, and/or examples contain one or more functions and/or operations, it will be understood by those within the art that each function and/or operation within such block diagrams, operation diagrams, flowcharts, illustrations, or examples can be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof. In one embodiment, several portions of the subject matter described herein may be implemented via Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), digital signal processors (DSPs), or other integrated formats. However, those skilled in the art will recognize that some aspects of the embodiments disclosed herein, in whole or in part, can be equivalently implemented in standard integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of skill in the art in light of this disclosure. In addition, those skilled in the art will appreciate that the mechanisms of the subject matter described herein are capable of being distributed as a program product in a variety of forms, and that an illustrative embodiment of the subject matter described herein applies equally regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of a signal bearing media include, but are not limited to, the following: recordable type media such as floppy disks, hard disk drives, CD ROMs, digital tape, and computer memory; and transmission type media such as digital and analog communication links using TDM or IP based communication links (e.g., packet links).
- It will be understood by those within the art that, in general, terms used herein, and especially in the appended claims (e.g., bodies of the appended claims) are generally intended as “open” terms (e.g., the term “including” should be interpreted as “including but not limited to,” the term “having” should be interpreted as “having at least,” the term “includes” should be interpreted as “includes but is not limited to,” etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present. For example, as an aid to understanding, the following appended claims may contain usage of the introductory phrases “at least one” and “one or more” to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim recitation to inventions containing only one such recitation, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an” (e.g., “a” and/or “an” should typically be interpreted to mean “at least one” or “one or more”); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should typically be interpreted to mean at least the recited number (e.g., the bare recitation of “two recitations,” without other modifiers, typically means at least two recitations, or two or more recitations). Furthermore, in those instances where a convention analogous to “at least one of A, B, and C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, and C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). In those instances where a convention analogous to “at least one of A, B, or C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, or C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.).
- The herein described aspects depict different components contained within, or connected with, different other components. It is to be understood that such depicted architectures are merely exemplary, and that in fact many other architectures can be implemented which achieve the same functionality. In a conceptual sense, any arrangement of components to achieve the same functionality is effectively “associated” such that the desired functionality is achieved. Hence, any two components herein combined to achieve a particular functionality can be seen as “associated with” each other such that the desired functionality is achieved, irrespective of architectures or intermedial components. Likewise, any two components so associated can also be viewed as being “operably connected,” or “operably coupled,” to each other to achieve the desired functionality. Any two components capable of being so associated can also be viewed as being “operably couplable” to each other to achieve the desired functionality. Specific examples of operably couplable include but are not limited to physically mateable and/or physically interacting components and/or wirelessly interactable and/or wirelessly interacting components.
- While particular aspects of the present subject matter described herein have been shown and described, it will be apparent to those skilled in the art that, based upon the teachings herein, changes and modifications may be made without departing from this subject matter described herein and its broader aspects and, therefore, the appended claims are to encompass within their scope all such changes and modifications as are within the true spirit and scope of this subject matter described herein. Furthermore, it is to be understood that the invention is defined by the appended claims.
Claims (50)
1. A computer-implemented system comprising:
a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence;
a record of a protected loss corresponding to the loss event, the protected loss described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant; and
a loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss.
2. The system of claim 1 , wherein the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss.
3. The system of claim 2 , wherein the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another event in the virtual world.
4. The system of claim 3 , wherein the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another event in the virtual world includes
a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by changing a likelihood of an occurrence of another loss event in the virtual world.
5. The system of claim 2 , wherein the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another event in the virtual world.
6. The system of claim 5 , wherein the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another event in the virtual world includes
a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another loss event or a non-loss event in the virtual world.
7. The system of claim 5 , wherein the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by decreasing a likelihood of an occurrence of another event in the virtual world includes
a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by increasing a likelihood of an occurrence of another loss event or a non-loss event in the virtual world.
8. The system of claim 2 , wherein the loss event regulator module operable to decrease the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to decrease the likelihood of an occurrence of the loss event by leaving a likelihood of an occurrence of another loss event in the virtual world unchanged and decreasing the likelihood of an occurrence in the virtual world of the loss event.
9. The system of claim 1 , wherein the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss.
10. The system of claim 9 , wherein the loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to increase the likelihood of an occurrence of the loss event by decreasing a likelihood of another event occurrence in the virtual world.
11. The system of claim 9 , wherein the loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to increase the likelihood of an occurrence of the loss event by increasing a likelihood of another event occurrence in the virtual world.
12. The system of claim 9 , wherein the loss event regulator module operable to increase the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to increase the likelihood of an occurrence of the loss event by leaving a likelihood of another loss event occurrence in the virtual world unchanged and increasing the likelihood of an occurrence of the loss event.
13. The system of claim 1 , wherein the loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to change the likelihood of occurrence of the loss event in response to the protected loss and in response to a prediction of a result of changing the likelihood of occurrence of the loss event.
14. The system of claim 1 , wherein the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss by influencing a behavior of the participant in the virtual world.
15. The system of claim 14 , wherein the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss by influencing a behavior of the participant in the virtual world includes
a loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss by influencing a behavior of the participant in the virtual world using at least one of a color, a sound, a sign, a visual cue, a non-participant virtual world character, a diversion, a substantially pleasant experience, and/or an environmental factor.
16. The system of claim 1 , wherein the loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to the protected loss includes
a loss event regulator module operable to change the likelihood of an occurrence of the loss event in response to an objective related to the protected loss.
17. The system of claim 1 , wherein the virtual world in which a participant may participate includes a virtual world in which at least two participants may participate.
18. The system of claim 1 , wherein the virtual world in which a participant may participate and that includes
a loss event having a likelihood of occurrence in the virtual world further includes a virtual world in which a participant may participate and that includes at least two loss events each respectively having a likelihood of occurrence in the virtual world.
19. The system of claim 1 , wherein the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world further includes
a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world with respect to the participant.
20. The system of claim 1 , wherein the virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world further includes
a virtual world in which a participant may participate and that includes a loss event having a likelihood of occurrence in the virtual world with respect to the participant and at least one other participant.
21. The system of claim 1 , wherein the loss event includes a determinable contingency sufferable by the participant.
22. The system of claim 1 , wherein the loss event includes an indeterminable contingency sufferable by the participant.
23. The system of claim 1 , wherein the loss event includes an unknown contingency sufferable by the participant.
24. The system of claim 1 , wherein the loss event includes at least one of a harm, an injury, a loss of life, a damage, a casualty, a disability, and/or an imposed punitive obligation suffered by the participant.
25. The system of claim 1 , wherein the loss event includes an adverse effect on an attribute and/or association of an avatar controlled by the participant in the virtual world.
26. The system of claim 1 , wherein the loss event includes at least one of a harm, an injury, a loss of a life, a damage, a casualty, and/or a disability befalling another participant in the virtual world.
27. The system of claim 1 , wherein the protected loss described in an agreement that includes an obligation to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant further includes
a protected loss described in an agreement that includes an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant.
28. The system of claim 27 , wherein the protection entity includes a participant protection entity.
29. The system of claim 27 , wherein the protection entity includes a non-participant protection entity.
30. The system of claim 29 , wherein the non-participant protection entity includes a non-participant protection entity under a control of at least one of a provider of the virtual world, an operator of the virtual world, or a person associated with the virtual world.
31. The system of claim 1 , wherein the benefit includes a compensation for the defined loss.
32. The system of claim 1 , wherein the record of a protected loss corresponding to the loss event includes a record of the agreement.
33. The system of claim 1 , wherein record of a protected loss includes
a record of a protected loss described in a first risk management agreement and in a second risk management agreement.
34. The system of claim 1 , wherein record of a protected loss includes
a record of a protected loss described in a first agreement having an obligation of a first protection entity to provide a first benefit to a first participant upon an occurrence of the protected loss suffered by the first participant and the protected loss is described in a second agreement having an obligation of a second protection entity to provide a second benefit to a second participant upon an occurrence of the protected loss suffered by the second participant.
35. The system of claim 34 , wherein the first protection entity and the second protection entity are at least substantially similar protection entities.
36. A system comprising:
a computing system couplable to a network and operable to interact with at least two participants via the network;
a program module operable to manage a virtual world that includes a loss event having a probability of occurrence;
a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and a participant of the at least two participants (hereafter “the participant”); and
a loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss.
37. The system of claim 36 , wherein the benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and the participant includes
a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and the participant, the risk management agreement including an obligation of a protection entity to provide a benefit to the participant upon an occurrence of the protected loss suffered in the virtual world by the participant.
38. The system of claim 36 , wherein the benefits exposure module operable to select a protected loss corresponding to the loss event and described in a risk management agreement between a protection entity and the participant includes
a benefits exposure module operable to select a protected loss corresponding to the loss event and described in a first risk management agreement between a first protection entity and the participant, and described in a second risk management agreement between a second protection entity and another participant of the at least two participants.
39. The system of claim 38 , wherein the first protection entity and the second protection entity are at least substantially similar.
40. The system of claim 36 , wherein the loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss includes
a loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss and in response to a possible outcome of changing the probability of occurrence of the loss event.
41. The system of claim 36 , wherein the loss management module operable to modify the probability of occurrence of the loss event in response to the protected loss includes
a loss management module operable to modify the probability of occurrence of the loss event in response to a goal related to the protected loss.
42. The system of claim 41 , wherein the loss management module operable to modify the probability of occurrence of the loss event in response to a goal related to the protected loss includes
a loss management module operable to modify the probability of occurrence of the loss event in response to a goal that includes at least one of increasing a satisfaction of the participant, motivating the participant, increasing revenue received by the virtual world, increasing income of the protection entity, and/or encouraging formation of another risk management agreement describing the protected loss.
43. A computer-implemented method comprising:
managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world;
selecting a protected loss corresponding to the at least one loss event, the protected loss described in an agreement that includes an obligation of a protection entity to provide a benefit to a participant of at least one participant upon an occurrence of the selected protected loss in the virtual world; and
modifying the incidence of the at least one loss event in response to the selected protected loss.
44. The method of claim 43 , wherein the managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world further includes
managing a virtual world operable to interact with at least one participant over a network and that includes at least two loss events each respectively having a modifiable incidence in the virtual world.
45. The method of claim 43 , wherein the managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world further includes
managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable temporal rate of occurrence in the virtual world.
46. The method of claim 43 , wherein the managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world further includes
managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable circumstance of occurrence in the virtual world.
47. The method of claim 43 , wherein the managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence in the virtual world further includes
managing a virtual world operable to interact with at least one participant over a network and that includes at least one loss event having a modifiable incidence of occurrence in the virtual world.
48. The method of claim 43 , wherein the protected loss described in an agreement includes
a protected loss described in a first risk management agreement and in a second risk management agreement.
49. The method of claim 43 , wherein the modifying the incidence of the at least one loss event in response to the selected protected loss includes
modifying the incidence of the at least one loss event in response to the selected protected loss and in response to a projected result of modifying the incidence of the loss event.
50. The method of claim 43 , wherein the modifying the incidence of the at least one loss event in response to the selected protected loss includes
modifying the incidence of the at least one loss event in response to the selected protected loss and in response to a goal corresponding to the protected loss.
Priority Applications (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/238,684 US20070143119A1 (en) | 2005-02-28 | 2005-09-29 | Probability adjustment of a virtual world loss event |
US11/251,624 US20060178967A1 (en) | 2005-02-04 | 2005-10-14 | Disposition of proprietary virtual rights |
PCT/US2006/027389 WO2007011738A2 (en) | 2005-07-18 | 2006-07-12 | Security arrangements for virtual world obligations |
EP06787314A EP1920410A2 (en) | 2005-07-18 | 2006-07-12 | Security arrangements for virtual world obligations |
PCT/US2006/027424 WO2007011752A2 (en) | 2005-07-18 | 2006-07-14 | Disposition of proprietary virtual rights |
US12/004,110 US20080177558A1 (en) | 2005-02-04 | 2007-12-18 | Resolution of virtual world revocable transfers |
US12/221,446 US8566111B2 (en) | 2005-02-04 | 2008-07-31 | Disposition of component virtual property rights |
US12/290,653 US20090132297A1 (en) | 2005-02-04 | 2008-10-31 | Probability adjustment of a virtual world loss event |
US12/290,674 US20090144073A1 (en) | 2005-02-04 | 2008-10-31 | Probability adjustment of a virtual world loss event |
US12/661,997 US8977566B2 (en) | 2005-02-04 | 2010-03-26 | Virtual world reversion rights |
US14/508,881 US20150120533A1 (en) | 2005-02-04 | 2014-10-07 | Real-world profile data for making virtual world contacts |
Applications Claiming Priority (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/069,905 US7774275B2 (en) | 2005-02-28 | 2005-02-28 | Payment options for virtual credit |
US11/096,265 US20060229976A1 (en) | 2005-03-30 | 2005-03-30 | Virtual credit with transferability |
US11/191,252 US8096882B2 (en) | 2005-02-04 | 2005-07-27 | Risk mitigation in a virtual world |
US11/191,248 US20060190283A1 (en) | 2005-02-04 | 2005-07-27 | Participating in risk mitigation in a virtual world |
US11/191,233 US20060190282A1 (en) | 2005-02-04 | 2005-07-27 | Providing risk mitigation in a virtual world |
US11/202,964 US20070035548A1 (en) | 2005-08-12 | 2005-08-12 | Rating technique for virtual world environment |
US11/213,442 US20060178218A1 (en) | 2005-02-04 | 2005-08-26 | Virtual world escrow user interface |
US11/228,043 US20070073614A1 (en) | 2005-09-15 | 2005-09-15 | Real world interaction with virtual world privileges |
US11/234,878 US20060178965A1 (en) | 2005-02-04 | 2005-09-23 | Tracking a participant loss in a virtual world |
US11/234,867 US20060190284A1 (en) | 2005-02-04 | 2005-09-23 | Reporting a participant loss in a virtual world |
US11/234,848 US20060178964A1 (en) | 2005-02-04 | 2005-09-23 | Reporting a non-mitigated loss in a virtual world |
US11/234,847 US20060178899A1 (en) | 2005-02-04 | 2005-09-23 | Identifying a participant loss in a virtual world |
US11/236,875 US20070073582A1 (en) | 2005-09-27 | 2005-09-27 | Real-world incentives offered to virtual world participants |
US11/238,684 US20070143119A1 (en) | 2005-02-28 | 2005-09-29 | Probability adjustment of a virtual world loss event |
Related Parent Applications (16)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/069,905 Continuation US7774275B2 (en) | 2004-12-17 | 2005-02-28 | Payment options for virtual credit |
US11/069,905 Continuation-In-Part US7774275B2 (en) | 2004-12-17 | 2005-02-28 | Payment options for virtual credit |
US11/096,265 Continuation US20060229976A1 (en) | 2004-12-17 | 2005-03-30 | Virtual credit with transferability |
US11/191,252 Continuation US8096882B2 (en) | 2004-12-17 | 2005-07-27 | Risk mitigation in a virtual world |
US11/191,248 Continuation US20060190283A1 (en) | 2004-12-17 | 2005-07-27 | Participating in risk mitigation in a virtual world |
US11/191,233 Continuation US20060190282A1 (en) | 2004-12-17 | 2005-07-27 | Providing risk mitigation in a virtual world |
US11/202,964 Continuation US20070035548A1 (en) | 2005-02-04 | 2005-08-12 | Rating technique for virtual world environment |
US11/213,442 Continuation US20060178218A1 (en) | 2004-12-17 | 2005-08-26 | Virtual world escrow user interface |
US11/228,043 Continuation US20070073614A1 (en) | 2005-02-04 | 2005-09-15 | Real world interaction with virtual world privileges |
US11/234,867 Continuation US20060190284A1 (en) | 2004-12-17 | 2005-09-23 | Reporting a participant loss in a virtual world |
US11/234,847 Continuation US20060178899A1 (en) | 2004-12-17 | 2005-09-23 | Identifying a participant loss in a virtual world |
US11/234,878 Continuation US20060178965A1 (en) | 2004-12-17 | 2005-09-23 | Tracking a participant loss in a virtual world |
US11/234,848 Continuation US20060178964A1 (en) | 2004-12-17 | 2005-09-23 | Reporting a non-mitigated loss in a virtual world |
US11/236,875 Continuation US20070073582A1 (en) | 2005-02-04 | 2005-09-27 | Real-world incentives offered to virtual world participants |
US11/242,619 Continuation-In-Part US20060178966A1 (en) | 2005-02-04 | 2005-10-03 | Virtual world property disposition after virtual world occurence |
US11/242,647 Continuation-In-Part US7720687B2 (en) | 2005-02-04 | 2005-10-03 | Virtual world property disposition after real-world occurrence |
Related Child Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/234,878 Continuation-In-Part US20060178965A1 (en) | 2004-12-17 | 2005-09-23 | Tracking a participant loss in a virtual world |
US11/236,875 Continuation-In-Part US20070073582A1 (en) | 2005-02-04 | 2005-09-27 | Real-world incentives offered to virtual world participants |
US11/251,624 Continuation-In-Part US20060178967A1 (en) | 2005-02-04 | 2005-10-14 | Disposition of proprietary virtual rights |
US12/290,674 Continuation-In-Part US20090144073A1 (en) | 2005-02-04 | 2008-10-31 | Probability adjustment of a virtual world loss event |
US12/290,653 Continuation-In-Part US20090132297A1 (en) | 2005-02-04 | 2008-10-31 | Probability adjustment of a virtual world loss event |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070143119A1 true US20070143119A1 (en) | 2007-06-21 |
Family
ID=36932970
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/069,905 Expired - Fee Related US7774275B2 (en) | 2004-12-17 | 2005-02-28 | Payment options for virtual credit |
US11/238,684 Abandoned US20070143119A1 (en) | 2005-02-04 | 2005-09-29 | Probability adjustment of a virtual world loss event |
US12/658,618 Expired - Fee Related US7991691B2 (en) | 2005-02-28 | 2010-02-05 | Payment options for virtual credit |
US12/658,609 Abandoned US20100223117A1 (en) | 2005-02-04 | 2010-02-05 | Payment options for virtual credit |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/069,905 Expired - Fee Related US7774275B2 (en) | 2004-12-17 | 2005-02-28 | Payment options for virtual credit |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/658,618 Expired - Fee Related US7991691B2 (en) | 2005-02-28 | 2010-02-05 | Payment options for virtual credit |
US12/658,609 Abandoned US20100223117A1 (en) | 2005-02-04 | 2010-02-05 | Payment options for virtual credit |
Country Status (1)
Country | Link |
---|---|
US (4) | US7774275B2 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070218987A1 (en) * | 2005-10-14 | 2007-09-20 | Leviathan Entertainment, Llc | Event-Driven Alteration of Avatars |
US20090167787A1 (en) * | 2007-12-28 | 2009-07-02 | Microsoft Corporation | Augmented reality and filtering |
US20090287640A1 (en) * | 2008-05-16 | 2009-11-19 | Hamilton Ii Rick A | Providing notification of a real-world event to a virtual universe user |
US20090286605A1 (en) * | 2008-05-19 | 2009-11-19 | Hamilton Ii Rick A | Event determination in a virtual universe |
US20100060648A1 (en) * | 2008-09-10 | 2010-03-11 | International Business Machines Corporation | Method for Determining Valued Excursion Corridors in Virtual Worlds |
US20100070807A1 (en) * | 2008-09-17 | 2010-03-18 | Hamilton Ii Rick A | System and method for managing server performance degradation in a virtual universe |
US20100115422A1 (en) * | 2008-11-05 | 2010-05-06 | At&T Intellectual Property I, L.P. | System and method for conducting a communication exchange |
US20100124360A1 (en) * | 2008-11-14 | 2010-05-20 | International Business Machines Corporation | Method and apparatus for recording events in virtual worlds |
US20110055726A1 (en) * | 2009-08-27 | 2011-03-03 | International Business Machines Corporation | Providing alternative representations of virtual content in a virtual universe |
US20110112662A1 (en) * | 2008-04-02 | 2011-05-12 | Thompson Scott Edward | System and method for providing real world value in a virtual world environment |
US20130173673A1 (en) * | 2011-12-28 | 2013-07-04 | Cbs Interactive Inc. | Techniques for providing a narrative summary for fantasy games |
US10540430B2 (en) | 2011-12-28 | 2020-01-21 | Cbs Interactive Inc. | Techniques for providing a natural language narrative |
US20220207606A1 (en) * | 2020-12-31 | 2022-06-30 | The Toronto-Dominion Bank | Prediction of future occurrences of events using adaptively trained artificial-intelligence processes |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7837100B2 (en) * | 2005-07-05 | 2010-11-23 | American Express Travel Related Services Company, Inc. | System, method, and computer program product for issuing and using debit cards |
US20070087831A1 (en) * | 2005-10-14 | 2007-04-19 | Van Luchene Andrew S | Multiple Purchase Options for Virtual Purchases |
US7651395B2 (en) * | 2005-10-14 | 2010-01-26 | Leviathan Entertainment, Llc | Video game with venture capital funding voting |
US7666095B2 (en) * | 2005-10-14 | 2010-02-23 | Leviathan Entertainment, Llc | Securing contracts in a virtual world |
US20080070690A1 (en) * | 2005-10-14 | 2008-03-20 | Leviathan Entertainment, Llc | Credit Cards in a Virtual Environment |
US7686691B2 (en) * | 2005-10-14 | 2010-03-30 | Leviathan Entertainment, Llc | Satisfaction of financial obligations in a virtual environment via virtual and real world currency |
US7690990B2 (en) * | 2005-10-14 | 2010-04-06 | Leviathan Entertainment, Llc | Financial institutions and instruments in a virtual environment |
US20070191103A1 (en) * | 2006-02-14 | 2007-08-16 | Van Luchene Andrew S | Online game environment that facilitates binding contracts between player characters |
US7677973B2 (en) | 2005-10-14 | 2010-03-16 | Leviathan Entertainment, Llc | Securing virtual contracts with credit |
US7677975B2 (en) * | 2005-10-14 | 2010-03-16 | Leviathan Entertainment, Llc | Video game with registration of funding sources |
US20070087822A1 (en) * | 2005-10-14 | 2007-04-19 | Leviathan Entertainment, Llc | Financing Options in a Virtual Environment |
US20070117601A1 (en) * | 2005-10-14 | 2007-05-24 | Leviathan Entertainment, Llc | Video Game with Venture Capital Funding Management |
US8574065B2 (en) * | 2006-02-14 | 2013-11-05 | Leviathan Entertainment, Llc | Controlling player-to-player commerce in video game environment |
US8668146B1 (en) | 2006-05-25 | 2014-03-11 | Sean I. Mcghie | Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds |
US8342399B1 (en) | 2006-05-25 | 2013-01-01 | Mcghie Sean I | Conversion of credits to funds |
US10062062B1 (en) | 2006-05-25 | 2018-08-28 | Jbshbm, Llc | Automated teller machine (ATM) providing money for loyalty points |
US8684265B1 (en) | 2006-05-25 | 2014-04-01 | Sean I. Mcghie | Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds |
US8376224B2 (en) | 2006-05-25 | 2013-02-19 | Sean I. Mcghie | Self-service stations for utilizing non-negotiable credits earned from a game of chance |
US7703673B2 (en) | 2006-05-25 | 2010-04-27 | Buchheit Brian K | Web based conversion of non-negotiable credits associated with an entity to entity independent negotiable funds |
US8267315B1 (en) | 2006-05-25 | 2012-09-18 | Mcghie Sean I | Exchange of non-negotiable credits for entity independent funds |
US8162209B2 (en) | 2006-05-25 | 2012-04-24 | Buchheit Brian K | Storefront purchases utilizing non-negotiable credits earned from a game of chance |
US9704174B1 (en) | 2006-05-25 | 2017-07-11 | Sean I. Mcghie | Conversion of loyalty program points to commerce partner points per terms of a mutual agreement |
US8693737B1 (en) * | 2008-02-05 | 2014-04-08 | Bank Of America Corporation | Authentication systems, operations, processing, and interactions |
US20100131843A1 (en) * | 2008-11-26 | 2010-05-27 | International Business Machines Corporation | Transforming Business Process Data to Generate a Virtual World Client for Human Interactions |
JP4955729B2 (en) | 2009-04-30 | 2012-06-20 | 株式会社コナミデジタルエンタテインメント | Charge payment system using virtual currency |
JP4951648B2 (en) * | 2009-04-30 | 2012-06-13 | 株式会社コナミデジタルエンタテインメント | Charge payment system using virtual currency |
US8266058B1 (en) * | 2011-03-31 | 2012-09-11 | International Business Machines Corporation | Virtual accounts linked to financial accounts |
RU2018128778A (en) | 2016-01-08 | 2020-02-10 | Виза Интернэшнл Сервис Ассосиэйшн | PROTECTED AUTHENTICATION USING BIOMETRIC INPUT DATA |
US20200074491A1 (en) * | 2018-09-05 | 2020-03-05 | Mastercard International Incorporated | Driver monitoring system and method |
CA3082339A1 (en) * | 2018-09-18 | 2020-03-26 | Mx Technologies, Inc. | Apparatus and method for creating virtual subaccounts |
CN112129692A (en) * | 2020-10-09 | 2020-12-25 | 中车青岛四方机车车辆股份有限公司 | Method and system for compensating material simulation aging degree deviation |
Citations (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4569526A (en) * | 1980-07-02 | 1986-02-11 | Gamma-Delta Games, Inc. | Vectorial and Mancala-like games, apparatus and methods |
US5008853A (en) * | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5203848A (en) * | 1992-01-16 | 1993-04-20 | Myson Technology, Inc. | Television game console and electronic control device for controlling the allowable playing time of the television game console |
US5220657A (en) * | 1987-12-02 | 1993-06-15 | Xerox Corporation | Updating local copy of shared data in a collaborative system |
US5323315A (en) * | 1991-08-02 | 1994-06-21 | Vintek, Inc. | Computer system for monitoring the status of individual items of personal property which serve as collateral for securing financing |
US5388196A (en) * | 1990-09-07 | 1995-02-07 | Xerox Corporation | Hierarchical shared books with database |
US5513129A (en) * | 1993-07-14 | 1996-04-30 | Fakespace, Inc. | Method and system for controlling computer-generated virtual environment in response to audio signals |
US5761485A (en) * | 1995-12-01 | 1998-06-02 | Munyan; Daniel E. | Personal electronic book system |
US5802296A (en) * | 1996-08-02 | 1998-09-01 | Fujitsu Software Corporation | Supervisory powers that provide additional control over images on computers system displays to users interactings via computer systems |
US5884029A (en) * | 1996-11-14 | 1999-03-16 | International Business Machines Corporation | User interaction with intelligent virtual objects, avatars, which interact with other avatars controlled by different users |
US5890995A (en) * | 1993-02-02 | 1999-04-06 | Tectrix Fitness Equipment, Inc. | Interactive exercise apparatus |
US5970479A (en) * | 1992-05-29 | 1999-10-19 | Swychco Infrastructure Services Pty. Ltd. | Methods and apparatus relating to the formulation and trading of risk management contracts |
US6024643A (en) * | 1997-03-04 | 2000-02-15 | Intel Corporation | Player profile based proxy play |
US6036601A (en) * | 1999-02-24 | 2000-03-14 | Adaboy, Inc. | Method for advertising over a computer network utilizing virtual environments of games |
US6055563A (en) * | 1997-02-03 | 2000-04-25 | Fujitsu Limited | Transfer and display of virtual-world data |
US6057856A (en) * | 1996-09-30 | 2000-05-02 | Sony Corporation | 3D virtual reality multi-user interaction with superimposed positional information display for each user |
US6169544B1 (en) * | 1996-06-13 | 2001-01-02 | Canon Kabushiki Kaisha | Image edit device |
US6229533B1 (en) * | 1996-08-02 | 2001-05-08 | Fujitsu Limited | Ghost object for a virtual world |
US6246991B1 (en) * | 1996-10-15 | 2001-06-12 | Pfu Limited | Will information management and disclosure system and method, and program storage medium thereof |
US6251017B1 (en) * | 1999-04-21 | 2001-06-26 | David Leason | Game or lottery with a reward validated and/or redeemed online |
WO2001058548A1 (en) * | 2000-02-11 | 2001-08-16 | Robertson Kevin I | System and method for integrating virtual representation of a real event with a remote participant |
US20020016655A1 (en) * | 2000-08-01 | 2002-02-07 | Joao Raymond Anthony | Apparatus and method for processing and/or for providing vehicle information and/or vehicle maintenance information |
US20020019744A1 (en) * | 2000-08-01 | 2002-02-14 | Nec Corporation | Last will and testament service method, last will and testament service system, and storage medium storing programs to control same |
US20020022516A1 (en) * | 2000-07-17 | 2002-02-21 | Forden Christopher Allen | Advertising inside electronic games |
US20020026350A1 (en) * | 1995-12-19 | 2002-02-28 | Brad Wendkos | Automated method and apparatus to package digital content for electronic distribution using the identity of the source content |
US20020032037A1 (en) * | 1999-06-02 | 2002-03-14 | Fujitsu Limited | System for providing a virtual communication space corresponding to sensed information from the real world |
US6375466B1 (en) * | 1999-04-23 | 2002-04-23 | Milan Juranovic | Method for teaching economics, management and accounting |
US6380952B1 (en) * | 1998-04-07 | 2002-04-30 | International Business Machines Corporation | System for continuous display and navigation in a virtual-reality world |
US6396509B1 (en) * | 1998-02-21 | 2002-05-28 | Koninklijke Philips Electronics N.V. | Attention-based interaction in a virtual environment |
US20020073043A1 (en) * | 1998-12-12 | 2002-06-13 | Gary Herman | Smart electronic receipt system |
US20020095317A1 (en) * | 2000-08-10 | 2002-07-18 | Miralink Corporation | Data/presence insurance tools and techniques |
US20030014266A1 (en) * | 2001-01-26 | 2003-01-16 | Funeral.Com, Inc. | Automated transactions of the funeral process |
US20030037101A1 (en) * | 2001-08-20 | 2003-02-20 | Lucent Technologies, Inc. | Virtual reality systems and methods |
US6523829B1 (en) * | 2000-05-04 | 2003-02-25 | Walker Digital, Llc | Method and apparatus for playing a card game including a mortgaging option |
US20030046689A1 (en) * | 2000-09-25 | 2003-03-06 | Maria Gaos | Method and apparatus for delivering a virtual reality environment |
US20030050831A1 (en) * | 1998-12-22 | 2003-03-13 | John Klayh | System for distribution and redemption of loyalty points and coupons |
US20030054328A1 (en) * | 1996-09-25 | 2003-03-20 | John Stuppy | Learning system for enabling separate teacher-student interaction over selected interactive channels |
US20030064807A1 (en) * | 2001-09-25 | 2003-04-03 | Walker Jay S. | Method and apparatus for linked play gaming |
US6545682B1 (en) * | 2000-05-24 | 2003-04-08 | There, Inc. | Method and apparatus for creating and customizing avatars using genetic paradigm |
US6561811B2 (en) * | 1999-08-09 | 2003-05-13 | Entertainment Science, Inc. | Drug abuse prevention computer game |
US6571216B1 (en) * | 2000-01-14 | 2003-05-27 | International Business Machines Corporation | Differential rewards with dynamic user profiling |
US20030105705A1 (en) * | 2001-09-24 | 2003-06-05 | Eyre Ethan B. | Computer web-based auction platform |
US20030107173A1 (en) * | 2001-11-20 | 2003-06-12 | Satloff James E. | System for using trading cards interactively through an electronic network |
US20040024641A1 (en) * | 2000-06-20 | 2004-02-05 | Shawn Cartwright | Computing environment transaction system to transact computing environment circumventions |
US20040051718A1 (en) * | 2000-10-09 | 2004-03-18 | Bennett Stephen James | Authoring system |
US20040058731A1 (en) * | 1998-05-11 | 2004-03-25 | Rossides Michael T. | Communications system using bets |
US20040073488A1 (en) * | 2002-07-11 | 2004-04-15 | Etuk Ntiedo M. | System and method for rewards-based education |
US6729884B1 (en) * | 2001-11-13 | 2004-05-04 | Metavante Corporation | E-Critter game for teaching personal values and financial responsibility to a child |
US20050003887A1 (en) * | 2003-07-02 | 2005-01-06 | Atlantic City Coin & Slot Service Company, Inc. | Method and apparatus for cashless gaming |
US20050010534A1 (en) * | 2002-12-12 | 2005-01-13 | Groz Marc Michael | Programmable financial instruments |
US20050021472A1 (en) * | 2003-07-25 | 2005-01-27 | David Gettman | Transactions in virtual property |
US6850643B1 (en) * | 1999-09-08 | 2005-02-01 | Ge Capital Commercial Finance, Inc. | Methods and apparatus for collateral risk monitoring |
US20050043094A1 (en) * | 2003-08-18 | 2005-02-24 | Igt | System and method for permitting a tournament game on different computing platforms |
US20050051965A1 (en) * | 2003-06-26 | 2005-03-10 | Prem Gururajan | Apparatus and method for a card dispensing system |
US20050055296A1 (en) * | 2003-09-08 | 2005-03-10 | Michael Hattersley | Method and system for underwriting and servicing financial accounts |
US20050059480A1 (en) * | 2003-09-11 | 2005-03-17 | Konami Gaming, Inc. | System and method for awarding incentive awards to a player of a gaming device |
US20050086069A1 (en) * | 2003-07-15 | 2005-04-21 | Kaleidescape, Inc. | Separable presentation control rules with distinct control effects |
US20050086605A1 (en) * | 2002-08-23 | 2005-04-21 | Miguel Ferrer | Method and apparatus for online advertising |
US6884166B2 (en) * | 2001-07-13 | 2005-04-26 | Gameaccount Limited | System and method for establishing a wager for a gaming application |
US20050131808A1 (en) * | 2003-12-10 | 2005-06-16 | Edgar Villa | Method for establishing control over credit card transactions |
US20060026044A1 (en) * | 2004-07-28 | 2006-02-02 | Smith Donald X Ii | Electronic content insurance system |
US20060027961A1 (en) * | 2004-08-09 | 2006-02-09 | Mcallister Robert F | Gasoline game card: a game of chance |
US7006983B1 (en) * | 2000-02-16 | 2006-02-28 | Walker Digital, Llc | Method and system for processing a rebate |
US20060060260A1 (en) * | 2002-07-05 | 2006-03-23 | Hirosato Amano | Toner filling device and toner production management system |
US7020632B1 (en) * | 1999-01-11 | 2006-03-28 | Lawrence Kohls | Trading system for fixed-value contracts |
US7025674B2 (en) * | 2000-01-21 | 2006-04-11 | Igt | Method and apparatus for awarding and redeeming promotional points at an electronic game |
US20060080613A1 (en) * | 2004-10-12 | 2006-04-13 | Ray Savant | System and method for providing an interactive social networking and role playing game within a virtual community |
US7036082B1 (en) * | 2000-09-21 | 2006-04-25 | Nortel Networks Limited | Controlling communications through a virtual reality environment |
US20060111934A1 (en) * | 2004-11-08 | 2006-05-25 | Meggs Anthony F | Virtual share exchange apparatus and method |
US7054830B1 (en) * | 1997-10-20 | 2006-05-30 | York Eggleston | System and method for incentive programs and award fulfillment |
US20070011273A1 (en) * | 2000-09-21 | 2007-01-11 | Greenstein Bret A | Method and Apparatus for Sharing Information in a Virtual Environment |
US7169501B2 (en) * | 2002-12-16 | 2007-01-30 | Shinko Electric Industries Co., Ltd. | Fuel cell |
US7169051B1 (en) * | 2003-07-09 | 2007-01-30 | Tim Mossbarger | Player confidence points method and system of implementation in a multiplayer software application |
US20070061202A1 (en) * | 2000-11-29 | 2007-03-15 | Ellis Richard D | Method and system for dynamically incorporating advertising content into multimedia environments |
US20070087820A1 (en) * | 2005-10-14 | 2007-04-19 | Leviathan Entertainment, Llc | Financial institutions and instruments in a virtual environment |
US20070117615A1 (en) * | 2005-10-14 | 2007-05-24 | Leviathan Entertainment, Llc | Securing Contracts in a Virtual World |
US7249139B2 (en) * | 2001-07-13 | 2007-07-24 | Accenture Global Services Gmbh | Secure virtual marketplace for virtual objects and services |
US7333943B1 (en) * | 2000-08-11 | 2008-02-19 | The Prudential Insurance Company Of America | Method and system for managing real property transactions having internet access and control |
US7373377B2 (en) * | 2002-10-16 | 2008-05-13 | Barbaro Technologies | Interactive virtual thematic environment |
US20080139318A1 (en) * | 2005-10-14 | 2008-06-12 | Leviathan Entertainment, Llc | Virtual Environment with Formalized Inter-Character Relationships |
US20090048918A1 (en) * | 2007-08-16 | 2009-02-19 | Dawson Christopher J | Acquisition of avatar rewards through advertisement exposure |
US7494416B2 (en) * | 1997-02-21 | 2009-02-24 | Walker Digital, Llc | Method and apparatus for providing insurance policies for gambling losses |
US7523486B1 (en) * | 2004-03-05 | 2009-04-21 | Sprint Communications Company Lp | User administration tool |
US7539747B2 (en) * | 2001-03-14 | 2009-05-26 | Microsoft Corporation | Schema-based context service |
US20100028844A1 (en) * | 2008-07-29 | 2010-02-04 | Wiseman Daneya L | Method for transforming an under-achieving student into a superior student |
US7660778B1 (en) * | 1998-12-22 | 2010-02-09 | Accenture Global Services Gmbh | Runtime program analysis tool for a simulation engine |
US7680694B2 (en) * | 2004-03-11 | 2010-03-16 | American Express Travel Related Services Company, Inc. | Method and apparatus for a user to shop online in a three dimensional virtual reality setting |
US20100081475A1 (en) * | 2008-09-26 | 2010-04-01 | Ching-Liang Chiang | Mobile device interface with dual windows |
US7698178B2 (en) * | 2003-01-24 | 2010-04-13 | Massive Incorporated | Online game advertising system |
US7721307B2 (en) * | 1992-12-09 | 2010-05-18 | Comcast Ip Holdings I, Llc | Method and apparatus for targeting of interactive virtual objects |
US7865566B2 (en) * | 2004-01-30 | 2011-01-04 | Yahoo! Inc. | Method and apparatus for providing real-time notification for avatars |
US7901288B2 (en) * | 2006-04-20 | 2011-03-08 | International Business Machines Corporation | Embedded advertising enhancements in interactive computer game environments |
US7908554B1 (en) * | 2003-03-03 | 2011-03-15 | Aol Inc. | Modifying avatar behavior based on user action or mood |
US7913176B1 (en) * | 2003-03-03 | 2011-03-22 | Aol Inc. | Applying access controls to communications with avatars |
US7925703B2 (en) * | 2000-12-26 | 2011-04-12 | Numedeon, Inc. | Graphical interactive interface for immersive online communities |
US20110137718A1 (en) * | 1995-12-26 | 2011-06-09 | Supermarkets Online, Inc. | System and method for providing shopping aids and incentives to customers through a computer network |
US8090618B1 (en) * | 2002-12-12 | 2012-01-03 | Massive Incorporated | Online game commerce system |
US8171556B2 (en) * | 2000-10-17 | 2012-05-01 | Mieko Ishii | Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program |
US8473334B2 (en) * | 2005-03-10 | 2013-06-25 | Sony Corporation | System and method for issuing and redeeming incentives on electronic data cards |
US20140011595A1 (en) * | 2010-12-03 | 2014-01-09 | Solocron Entertainment, Llc | Collaborative electronic game play employing player classification and aggregation |
US8639571B1 (en) * | 1999-12-29 | 2014-01-28 | David Leason | Rebate transaction system |
US8738375B2 (en) * | 2011-05-09 | 2014-05-27 | At&T Intellectual Property I, L.P. | System and method for optimizing speech recognition and natural language parameters with user feedback |
Family Cites Families (153)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5192854A (en) * | 1990-07-26 | 1993-03-09 | Counts Reginald D | System for electronically recording and redeeming coupons |
US5241466A (en) | 1991-06-26 | 1993-08-31 | Perry Victor A | System for administering a central depository for living wills and other associated information |
US5337407A (en) * | 1991-12-31 | 1994-08-09 | International Business Machines Corporation | Method and system for identifying users in a collaborative computer-based system |
US5333868A (en) | 1993-03-01 | 1994-08-02 | Simon Goldfarb | Method of playing a game of chance at locations remote from the game site |
US6135646A (en) | 1993-10-22 | 2000-10-24 | Corporation For National Research Initiatives | System for uniquely and persistently identifying, managing, and tracking digital objects |
CA2182596C (en) | 1994-02-04 | 2004-04-20 | James E. Biorge | Method and system for allocating and redeeming incentive credits between a portable device and a base device |
RU95103479A (en) | 1994-03-11 | 1996-12-27 | Уолкер Эссет Мэнеджмент Лимитед Партнершип (US) | Game system, game computer, method for playing or drawing lottery when player participates in it |
US5649117A (en) * | 1994-06-03 | 1997-07-15 | Midwest Payment Systems | System and method for paying bills and other obligations including selective payor and payee controls |
US5696965A (en) | 1994-11-03 | 1997-12-09 | Intel Corporation | Electronic information appraisal agent |
CN100452071C (en) | 1995-02-13 | 2009-01-14 | 英特特拉斯特技术公司 | Systems and methods for secure transaction management and electronic rights protection |
US5788574A (en) | 1995-02-21 | 1998-08-04 | Mao, Inc. | Method and apparatus for playing a betting game including incorporating side betting which may be selected by a game player |
US5651117A (en) * | 1995-03-03 | 1997-07-22 | Arbuckle; Gilbert B. | Method and system for disseminating obituaries and administering a depository to achieve this |
US5643088A (en) | 1995-05-31 | 1997-07-01 | Interactive Network, Inc. | Game of skill or chance playable by remote participants in conjunction with a common game event including inserted interactive advertising |
JP4040117B2 (en) * | 1995-06-30 | 2008-01-30 | ソニー株式会社 | Game machine and game machine control method |
CA2180891C (en) | 1995-07-12 | 2010-01-12 | Junichi Rekimoto | Notification of updates in a three-dimensional virtual reality space sharing system |
US6031549A (en) * | 1995-07-19 | 2000-02-29 | Extempo Systems, Inc. | System and method for directed improvisation by computer controlled characters |
US5791991A (en) * | 1995-11-15 | 1998-08-11 | Small; Maynard E. | Interactive consumer product promotion method and match game |
US5964661A (en) | 1995-11-24 | 1999-10-12 | Dodge; Samuel D. | Apparatus and method for timing video games |
GB2309105A (en) | 1996-01-12 | 1997-07-16 | Ibm | Intuitive GUI in the form of a representation of a physical environment |
US5823879A (en) | 1996-01-19 | 1998-10-20 | Sheldon F. Goldberg | Network gaming system |
US5850442A (en) | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US5870030A (en) * | 1996-04-04 | 1999-02-09 | Motorola, Inc. | Advertiser pays information and messaging system and apparatus |
EP0958002A4 (en) | 1996-05-08 | 2001-03-28 | Real Vision Corp | Real time simulation using position sensing |
US6009458A (en) | 1996-05-09 | 1999-12-28 | 3Do Company | Networked computer game system with persistent playing objects |
US5947747A (en) * | 1996-05-09 | 1999-09-07 | Walker Asset Management Limited Partnership | Method and apparatus for computer-based educational testing |
US5795228A (en) | 1996-07-03 | 1998-08-18 | Ridefilm Corporation | Interactive computer-based entertainment system |
US5937391A (en) * | 1996-07-11 | 1999-08-10 | Fujitsu Limited | Point-service system in online shopping mall |
US6476830B1 (en) | 1996-08-02 | 2002-11-05 | Fujitsu Software Corporation | Virtual objects for building a community in a virtual world |
US5926179A (en) * | 1996-09-30 | 1999-07-20 | Sony Corporation | Three-dimensional virtual reality space display processing apparatus, a three-dimensional virtual reality space display processing method, and an information providing medium |
US5983003A (en) | 1996-11-15 | 1999-11-09 | International Business Machines Corp. | Interactive station indicator and user qualifier for virtual worlds |
US6106395A (en) | 1997-03-04 | 2000-08-22 | Intel Corporation | Adaptive gaming behavior based on player profiling |
US6119229A (en) | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
US6282522B1 (en) * | 1997-04-30 | 2001-08-28 | Visa International Service Association | Internet payment system using smart card |
US5938196A (en) * | 1997-05-07 | 1999-08-17 | Universal De Desarrollos Electronicos, S.A. | Reel type slot machine with physical mapping to control the win odds |
US5964660A (en) | 1997-06-18 | 1999-10-12 | Vr-1, Inc. | Network multiplayer game |
JPH11143944A (en) | 1997-11-07 | 1999-05-28 | Toshiba Tec Corp | Credit processing system and method and computer readable storage medium storing credit processing program |
JPH11154178A (en) | 1997-11-19 | 1999-06-08 | Fujitsu Ltd | Communication managing device and recording medium |
US5978780A (en) * | 1997-11-21 | 1999-11-02 | Craig Michael Watson | Integrated bill consolidation, payment aggregation, and settlement system |
US6261101B1 (en) * | 1997-12-17 | 2001-07-17 | Scientific Learning Corp. | Method and apparatus for cognitive training of humans using adaptive timing of exercises |
US20050203835A1 (en) | 1998-01-30 | 2005-09-15 | Eli Nhaissi | Internet billing |
US6591250B1 (en) * | 1998-02-23 | 2003-07-08 | Genetic Anomalies, Inc. | System and method for managing virtual property |
US6636833B1 (en) * | 1998-03-25 | 2003-10-21 | Obis Patents Ltd. | Credit card system and method |
US7747523B2 (en) | 1998-03-30 | 2010-06-29 | Cohen Morris E | Internet-based financial vehicles |
US6196920B1 (en) | 1998-03-31 | 2001-03-06 | Masque Publishing, Inc. | On-line game playing with advertising |
US6505773B1 (en) * | 1998-04-03 | 2003-01-14 | International Business Machines Corporation | Authenticated electronic coupon issuing and redemption |
US6450407B1 (en) | 1998-04-17 | 2002-09-17 | Viztec, Inc. | Chip card rebate system |
US6594673B1 (en) * | 1998-09-15 | 2003-07-15 | Microsoft Corporation | Visualizations for collaborative information |
US7720723B2 (en) * | 1998-09-18 | 2010-05-18 | Amazon Technologies, Inc. | User interface and methods for recommending items to users |
US6332127B1 (en) | 1999-01-28 | 2001-12-18 | International Business Machines Corporation | Systems, methods and computer program products for providing time and location specific advertising via the internet |
US6663105B1 (en) | 1999-04-21 | 2003-12-16 | Scott L. Sullivan | Game or lottery with a reward validated and/or redeemed online |
US6467686B1 (en) | 1999-05-12 | 2002-10-22 | Guthrie Andre | System and method for electronically managing and redeeming coupons |
US6343738B1 (en) | 1999-05-15 | 2002-02-05 | John W. L. Ogilvie | Automatic broker tools and techniques |
US6330547B1 (en) | 1999-06-02 | 2001-12-11 | Mosaic Technologies Inc. | Method and apparatus for establishing and enhancing the creditworthiness of intellectual property |
CA2375048A1 (en) * | 1999-06-23 | 2000-12-28 | Richard Postrel | System for electronic barter, trading and redeeming points accumulated in frequent use reward programs |
US7124088B2 (en) | 1999-07-30 | 2006-10-17 | Progressive Casualty Insurance Company | Apparatus for internet on-line insurance policy service |
US6965868B1 (en) | 1999-08-03 | 2005-11-15 | Michael David Bednarek | System and method for promoting commerce, including sales agent assisted commerce, in a networked economy |
US7532941B2 (en) * | 1999-08-10 | 2009-05-12 | Disney Enterprises, Inc. | Management of the flow of persons in relation to centers of crowd concentration via wireless control |
US7037194B2 (en) * | 2000-03-23 | 2006-05-02 | Atlantic City Coin & Slot Service Company, Inc. | Method and device for playing a game |
US20020095387A1 (en) | 1999-08-27 | 2002-07-18 | Bertrand Sosa | Online content portal system |
US6554707B1 (en) | 1999-09-24 | 2003-04-29 | Nokia Corporation | Interactive voice, wireless game system using predictive command input |
KR20010029020A (en) | 1999-09-28 | 2001-04-06 | 이종국 | An advertising game |
EP2819002A3 (en) * | 1999-12-23 | 2015-03-04 | M.H. Segan Limited Partnership | System for viewing content over a network and method therefor |
JP3363861B2 (en) | 2000-01-13 | 2003-01-08 | キヤノン株式会社 | Mixed reality presentation device, mixed reality presentation method, and storage medium |
US20020038277A1 (en) * | 2000-02-22 | 2002-03-28 | Yuan Frank S. | Innovative financing method and system therefor |
US7283977B1 (en) | 2000-02-25 | 2007-10-16 | Kathleen Tyson-Quah | System for reducing risk payment-based transactions wherein a risk filter routine returns instructions authorizing payment to a payment queue for later re-evaluation |
US6672961B1 (en) * | 2000-03-16 | 2004-01-06 | Sony Computer Entertainment America Inc. | Computer system and method of displaying images |
US6643751B2 (en) | 2000-03-20 | 2003-11-04 | Texas Instruments Incorporated | System and method for limited access to system memory |
US7412422B2 (en) | 2000-03-23 | 2008-08-12 | Dekel Shiloh | Method and system for securing user identities and creating virtual users to enhance privacy on a communication network |
US20010027430A1 (en) | 2000-03-30 | 2001-10-04 | Philex Plc. | Method of financial investment in stocks and shares or other financial entities |
US7593864B2 (en) | 2000-04-18 | 2009-09-22 | Brian Mark Shuster | Method and apparatus for managing ownership of virtual property |
US7127406B2 (en) | 2000-04-20 | 2006-10-24 | Triola C Richard | Method and apparatus for processing escrow transactions |
US6540230B1 (en) | 2000-05-04 | 2003-04-01 | Walker Digital, Llc | Method and apparatus for playing a card game including a bust insurance option |
US6954728B1 (en) | 2000-05-15 | 2005-10-11 | Avatizing, Llc | System and method for consumer-selected advertising and branding in interactive media |
FR2809209A1 (en) | 2000-05-19 | 2001-11-23 | France Telecom | Behavior simulation method for high technology product or service consumers in telecommunications uses multi-agents allowing correlation at the global level for individual variables determining each data agent. |
US6616533B1 (en) | 2000-05-31 | 2003-09-09 | Intel Corporation | Providing advertising with video games |
US7406508B1 (en) * | 2000-06-22 | 2008-07-29 | Lycos, Inc. | Capturing advertising requests from a user |
US20010056399A1 (en) | 2000-06-27 | 2001-12-27 | Eric Saylors | Web dependent consumer financing and virtual reselling method |
US20020128952A1 (en) | 2000-07-06 | 2002-09-12 | Raymond Melkomian | Virtual interactive global exchange |
SE0002581D0 (en) | 2000-07-17 | 2000-07-17 | Value Venture Capital Ag | Computer system |
US20020013722A1 (en) | 2000-07-27 | 2002-01-31 | Kanaga Samantha J. | Enhanced document escrow service |
AU2001284375A1 (en) | 2000-09-07 | 2002-03-22 | Omnisky Corporation | Coexistent interaction between a virtual character and the real world |
US7383223B1 (en) * | 2000-09-20 | 2008-06-03 | Cashedge, Inc. | Method and apparatus for managing multiple accounts |
US20040143500A1 (en) | 2000-10-06 | 2004-07-22 | Lopez Kermit D. | Processing negotiable economic credits through electronic hand held devices |
JP2002207685A (en) | 2000-10-12 | 2002-07-26 | Sony Computer Entertainment Inc | Virtual world system, server computer and information processor |
US7527191B2 (en) * | 2000-11-02 | 2009-05-05 | Fujitsu Limited | System for selling, buying, lending, and renting virtual region and method thereof |
US20050153766A1 (en) | 2000-12-05 | 2005-07-14 | Harmon Matthew C. | E-Commerce Role Playing Platform |
US20020107756A1 (en) * | 2000-12-18 | 2002-08-08 | Hammons James P. | Method for creating and operating a personalized virtual internet store including "disconnected" purchasing capability |
JP2002197376A (en) | 2000-12-27 | 2002-07-12 | Fujitsu Ltd | Method and device for providing virtual world customerized according to user |
US20020087461A1 (en) | 2000-12-28 | 2002-07-04 | Ravi Ganesan | Technique for electronic funds escrow |
JP2002215931A (en) | 2001-01-17 | 2002-08-02 | Fujitsu Ltd | Communication method, electronic commerce method, and management device |
US6931382B2 (en) | 2001-01-24 | 2005-08-16 | Cdck Corporation | Payment instrument authorization technique |
US20020107731A1 (en) * | 2001-02-07 | 2002-08-08 | Teng Patrick Chee-Wai | Purchase-based reward system and method |
US20020120935A1 (en) * | 2001-02-12 | 2002-08-29 | Thomas Huber | Interactive order system for television and streaming media |
KR100434850B1 (en) | 2001-02-16 | 2004-06-07 | (주)우리랑월드 | The method and system for electronic commerce service for mud game |
US7620592B2 (en) | 2001-02-26 | 2009-11-17 | First Data Corporation | Tiered processing method and system for identifying and mitigating merchant risk |
US20020120554A1 (en) * | 2001-02-28 | 2002-08-29 | Vega Lilly Mae | Auction, imagery and retaining engine systems for services and service providers |
AUPR372601A0 (en) * | 2001-03-14 | 2001-04-12 | C.R. Group Pty Limited | Method and system for secure information |
US7722453B2 (en) * | 2001-03-27 | 2010-05-25 | Igt | Interactive game playing preferences |
US20020152155A1 (en) | 2001-04-13 | 2002-10-17 | Greenwood James E. | Method for automated and integrated lending process |
WO2002085380A1 (en) * | 2001-04-18 | 2002-10-31 | Geltex Pharmaceuticals, Inc. | Method for treating gout and reducing serum uric acid |
US20020198735A1 (en) | 2001-04-20 | 2002-12-26 | Tolbert Ivan K. | Marketing device and method of use for waiving time limitations on contracts |
JP2002325965A (en) | 2001-04-27 | 2002-11-12 | Sega Corp | Input character processing method |
JP3990170B2 (en) | 2001-05-10 | 2007-10-10 | 株式会社ソニー・コンピュータエンタテインメント | Information processing system, information processing program, computer-readable recording medium storing information processing program, and information processing method |
US7451110B2 (en) | 2001-05-18 | 2008-11-11 | Network Resonance, Inc. | System, method and computer program product for providing an efficient trading market |
US20020178120A1 (en) | 2001-05-22 | 2002-11-28 | Reid Zachariah J. | Contract generation and administration system |
US20030069787A1 (en) | 2001-05-22 | 2003-04-10 | Tendon Consulting Group Kb | Computer system and method for the establishment of a virtual marketplace of promotional values |
US6609970B1 (en) * | 2001-05-31 | 2003-08-26 | Sierra Design Group | Method and apparatus for dispensing prizes in a gaming system |
EP1401546A4 (en) * | 2001-06-15 | 2006-11-02 | Walker Digital Llc | Method and apparatus for planning and customizing a gaming experience |
US7483857B2 (en) * | 2001-07-09 | 2009-01-27 | International Business Machines Corporation | Online e-commerce transactions incorporating effects of uncertainty and risk factors |
US6632142B2 (en) | 2001-07-31 | 2003-10-14 | Christopher Keith | Internet gaming with multiple web sites |
US20030036987A1 (en) | 2001-08-15 | 2003-02-20 | Kenji Omiya | Method and system for handling escrow arrangements |
US6840857B2 (en) * | 2001-08-28 | 2005-01-11 | Manu Ghela | Lottery insurance method |
US7158943B2 (en) * | 2001-09-04 | 2007-01-02 | Ramon Van Der Riet | Marketing communication and transaction/distribution services platform for building and managing personalized customer relationships |
US20030187768A1 (en) | 2001-10-03 | 2003-10-02 | Ryan Ronald D. | Virtual finance/insurance company |
US6726427B2 (en) * | 2001-11-13 | 2004-04-27 | Igt | Method of playing single or multiple hand twenty-one card game |
US20030105688A1 (en) | 2001-12-05 | 2003-06-05 | Brown Owen H. | Secure digital escrow account transactions system and method |
WO2003049742A1 (en) * | 2001-12-11 | 2003-06-19 | Boehringer Ingelheim Pharmaceuticals, Inc. | Method for administering birb 796 bs |
US6791549B2 (en) | 2001-12-21 | 2004-09-14 | Vrcontext S.A. | Systems and methods for simulating frames of complex virtual environments |
US20030122858A1 (en) * | 2002-01-03 | 2003-07-03 | Martin Mauve | Partial identification and usage of objects in virtual worlds |
US20030144940A1 (en) | 2002-01-25 | 2003-07-31 | Kochansky Joseph M. | System and method for facilitating collateral management |
JP3561511B2 (en) | 2002-05-14 | 2004-09-02 | 株式会社スクウェア・エニックス | Network game system, game server device, network game progress method, program, and recording medium |
KR20030090435A (en) | 2002-05-23 | 2003-11-28 | 에스케이 텔레콤주식회사 | System and method for financial transaction |
CA2431076A1 (en) | 2002-05-29 | 2003-11-29 | F. Mervyn Cavers | Access system, device and method |
US7568004B2 (en) * | 2002-06-20 | 2009-07-28 | Linda Gottfried | Method and system for sharing brand information |
KR100513657B1 (en) | 2002-06-29 | 2005-09-09 | 비오이 하이디스 테크놀로지 주식회사 | Vertical align mode liquid crystal display |
BE1015023A3 (en) * | 2002-07-08 | 2004-08-03 | Oosterlijnck Andre D | USE OF FLOUR OF REFINED AND JOJOBA oiled OR ONE OR MORE OF THESE INGREDIENTS BIO-ACTIVE AGENT AS ANGIOGENESIS INHIBITORS IN CANCER. |
JPWO2004010356A1 (en) * | 2002-07-19 | 2005-11-17 | 富士通株式会社 | Settlement system, settlement apparatus, settlement program, and settlement program storage medium |
JP3839756B2 (en) * | 2002-07-22 | 2006-11-01 | 富士通株式会社 | Role playing simulation program, role playing simulation device, and role playing simulation method |
US20050235008A1 (en) | 2002-08-01 | 2005-10-20 | Walt Camping | Apparatus and method for collateral recovery |
US20050177492A1 (en) * | 2002-08-01 | 2005-08-11 | Walt Camping | Apparatus and method for asset tracking and recovery |
US7614944B1 (en) | 2002-08-30 | 2009-11-10 | Interactive Sports Holdings, Inc. | Systems and methods for providing multi-level fantasy sports contests in fantasy sports contest applications |
US6769691B1 (en) | 2002-11-04 | 2004-08-03 | Aaron Kim | Apparatus for financial investment education and entertainment |
US20050148388A1 (en) | 2003-07-17 | 2005-07-07 | Fabricio Vayra | Method and system for interaction with real-time events from a remote location, through use of a computer, game console or other module |
US20050143174A1 (en) * | 2003-08-19 | 2005-06-30 | Goldman Daniel P. | Systems and methods for data mining via an on-line, interactive game |
US7099193B2 (en) * | 2003-09-08 | 2006-08-29 | Kabushiki Kaisha Toshiba | Nonvolatile semiconductor memory device, electronic card and electronic apparatus |
US20050137904A1 (en) * | 2003-10-14 | 2005-06-23 | Kathleen Lane | System and method for monitoring secured liens |
CA2697021C (en) | 2003-12-31 | 2014-04-08 | Howard Ganz | System and method for toy adoption and marketing |
US7465212B2 (en) * | 2003-12-31 | 2008-12-16 | Ganz | System and method for toy adoption and marketing |
US20050149393A1 (en) * | 2004-01-06 | 2005-07-07 | Eugene Leof | Lottery credit card rewards system |
JP3703825B2 (en) | 2004-01-16 | 2005-10-05 | 株式会社スクウェア・エニックス | GAME DEVICE, GAME PROGRESS METHOD, PROGRAM, AND RECORDING MEDIUM |
US8010459B2 (en) * | 2004-01-21 | 2011-08-30 | Google Inc. | Methods and systems for rating associated members in a social network |
US20050170883A1 (en) * | 2004-02-04 | 2005-08-04 | Jon Muskin | Casino complimentary systems |
CN1961333A (en) * | 2004-02-12 | 2007-05-09 | 贝斯简·阿利万迪 | System and method for producing merchandise from a virtual environment |
US7672884B2 (en) * | 2004-04-07 | 2010-03-02 | Simpliance, Inc. | Method and system for rule-base compliance, certification and risk mitigation |
US7882023B2 (en) | 2004-06-23 | 2011-02-01 | Paul Parrish | Method and system for managing collateral or property risk in a secured loan or lease portfolio |
US7455221B2 (en) | 2004-11-12 | 2008-11-25 | Boscov's Department Store, Llc | Method and system for providing multiple credit lines |
US7055740B1 (en) * | 2004-12-06 | 2006-06-06 | Target Brands, Inc. | Stored-value card adapted to be read by an electronic device |
US20060155597A1 (en) * | 2005-01-10 | 2006-07-13 | Gleason David M | Method, system and apparatus for location based advertising |
US20060224480A1 (en) | 2005-03-29 | 2006-10-05 | Reserve Solutions, Inc. | Systems and methods for loan management with variable security arrangements |
US8192286B2 (en) | 2005-04-19 | 2012-06-05 | Sony Online Entertainment Llc | System for secure transfer of online privileges |
US20070087822A1 (en) * | 2005-10-14 | 2007-04-19 | Leviathan Entertainment, Llc | Financing Options in a Virtual Environment |
US7770114B2 (en) * | 2006-03-03 | 2010-08-03 | Cadcorporation.Com Inc. | System and method for using virtual environments |
US20110209058A1 (en) * | 2010-02-25 | 2011-08-25 | Microsoft Corporation | Multi-screen hold and tap gesture |
-
2005
- 2005-02-28 US US11/069,905 patent/US7774275B2/en not_active Expired - Fee Related
- 2005-09-29 US US11/238,684 patent/US20070143119A1/en not_active Abandoned
-
2010
- 2010-02-05 US US12/658,618 patent/US7991691B2/en not_active Expired - Fee Related
- 2010-02-05 US US12/658,609 patent/US20100223117A1/en not_active Abandoned
Patent Citations (105)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4569526A (en) * | 1980-07-02 | 1986-02-11 | Gamma-Delta Games, Inc. | Vectorial and Mancala-like games, apparatus and methods |
US5008853A (en) * | 1987-12-02 | 1991-04-16 | Xerox Corporation | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
US5220657A (en) * | 1987-12-02 | 1993-06-15 | Xerox Corporation | Updating local copy of shared data in a collaborative system |
US5388196A (en) * | 1990-09-07 | 1995-02-07 | Xerox Corporation | Hierarchical shared books with database |
US5323315A (en) * | 1991-08-02 | 1994-06-21 | Vintek, Inc. | Computer system for monitoring the status of individual items of personal property which serve as collateral for securing financing |
US5203848A (en) * | 1992-01-16 | 1993-04-20 | Myson Technology, Inc. | Television game console and electronic control device for controlling the allowable playing time of the television game console |
US5970479A (en) * | 1992-05-29 | 1999-10-19 | Swychco Infrastructure Services Pty. Ltd. | Methods and apparatus relating to the formulation and trading of risk management contracts |
US7721307B2 (en) * | 1992-12-09 | 2010-05-18 | Comcast Ip Holdings I, Llc | Method and apparatus for targeting of interactive virtual objects |
US5890995A (en) * | 1993-02-02 | 1999-04-06 | Tectrix Fitness Equipment, Inc. | Interactive exercise apparatus |
US5513129A (en) * | 1993-07-14 | 1996-04-30 | Fakespace, Inc. | Method and system for controlling computer-generated virtual environment in response to audio signals |
US5761485A (en) * | 1995-12-01 | 1998-06-02 | Munyan; Daniel E. | Personal electronic book system |
US20020026350A1 (en) * | 1995-12-19 | 2002-02-28 | Brad Wendkos | Automated method and apparatus to package digital content for electronic distribution using the identity of the source content |
US20110137718A1 (en) * | 1995-12-26 | 2011-06-09 | Supermarkets Online, Inc. | System and method for providing shopping aids and incentives to customers through a computer network |
US6169544B1 (en) * | 1996-06-13 | 2001-01-02 | Canon Kabushiki Kaisha | Image edit device |
US5802296A (en) * | 1996-08-02 | 1998-09-01 | Fujitsu Software Corporation | Supervisory powers that provide additional control over images on computers system displays to users interactings via computer systems |
US6229533B1 (en) * | 1996-08-02 | 2001-05-08 | Fujitsu Limited | Ghost object for a virtual world |
US20030054328A1 (en) * | 1996-09-25 | 2003-03-20 | John Stuppy | Learning system for enabling separate teacher-student interaction over selected interactive channels |
US6057856A (en) * | 1996-09-30 | 2000-05-02 | Sony Corporation | 3D virtual reality multi-user interaction with superimposed positional information display for each user |
US6246991B1 (en) * | 1996-10-15 | 2001-06-12 | Pfu Limited | Will information management and disclosure system and method, and program storage medium thereof |
US5884029A (en) * | 1996-11-14 | 1999-03-16 | International Business Machines Corporation | User interaction with intelligent virtual objects, avatars, which interact with other avatars controlled by different users |
US6055563A (en) * | 1997-02-03 | 2000-04-25 | Fujitsu Limited | Transfer and display of virtual-world data |
US7494416B2 (en) * | 1997-02-21 | 2009-02-24 | Walker Digital, Llc | Method and apparatus for providing insurance policies for gambling losses |
US6024643A (en) * | 1997-03-04 | 2000-02-15 | Intel Corporation | Player profile based proxy play |
US7054830B1 (en) * | 1997-10-20 | 2006-05-30 | York Eggleston | System and method for incentive programs and award fulfillment |
US6396509B1 (en) * | 1998-02-21 | 2002-05-28 | Koninklijke Philips Electronics N.V. | Attention-based interaction in a virtual environment |
US6380952B1 (en) * | 1998-04-07 | 2002-04-30 | International Business Machines Corporation | System for continuous display and navigation in a virtual-reality world |
US20040058731A1 (en) * | 1998-05-11 | 2004-03-25 | Rossides Michael T. | Communications system using bets |
US20020073043A1 (en) * | 1998-12-12 | 2002-06-13 | Gary Herman | Smart electronic receipt system |
US7660778B1 (en) * | 1998-12-22 | 2010-02-09 | Accenture Global Services Gmbh | Runtime program analysis tool for a simulation engine |
US20030050831A1 (en) * | 1998-12-22 | 2003-03-13 | John Klayh | System for distribution and redemption of loyalty points and coupons |
US7020632B1 (en) * | 1999-01-11 | 2006-03-28 | Lawrence Kohls | Trading system for fixed-value contracts |
US6036601A (en) * | 1999-02-24 | 2000-03-14 | Adaboy, Inc. | Method for advertising over a computer network utilizing virtual environments of games |
US6251017B1 (en) * | 1999-04-21 | 2001-06-26 | David Leason | Game or lottery with a reward validated and/or redeemed online |
US6375466B1 (en) * | 1999-04-23 | 2002-04-23 | Milan Juranovic | Method for teaching economics, management and accounting |
US20020032037A1 (en) * | 1999-06-02 | 2002-03-14 | Fujitsu Limited | System for providing a virtual communication space corresponding to sensed information from the real world |
US6561811B2 (en) * | 1999-08-09 | 2003-05-13 | Entertainment Science, Inc. | Drug abuse prevention computer game |
US6850643B1 (en) * | 1999-09-08 | 2005-02-01 | Ge Capital Commercial Finance, Inc. | Methods and apparatus for collateral risk monitoring |
US8639571B1 (en) * | 1999-12-29 | 2014-01-28 | David Leason | Rebate transaction system |
US6571216B1 (en) * | 2000-01-14 | 2003-05-27 | International Business Machines Corporation | Differential rewards with dynamic user profiling |
US7025674B2 (en) * | 2000-01-21 | 2006-04-11 | Igt | Method and apparatus for awarding and redeeming promotional points at an electronic game |
WO2001058548A1 (en) * | 2000-02-11 | 2001-08-16 | Robertson Kevin I | System and method for integrating virtual representation of a real event with a remote participant |
US7006983B1 (en) * | 2000-02-16 | 2006-02-28 | Walker Digital, Llc | Method and system for processing a rebate |
US6523829B1 (en) * | 2000-05-04 | 2003-02-25 | Walker Digital, Llc | Method and apparatus for playing a card game including a mortgaging option |
US6545682B1 (en) * | 2000-05-24 | 2003-04-08 | There, Inc. | Method and apparatus for creating and customizing avatars using genetic paradigm |
US20040024641A1 (en) * | 2000-06-20 | 2004-02-05 | Shawn Cartwright | Computing environment transaction system to transact computing environment circumventions |
US20020022516A1 (en) * | 2000-07-17 | 2002-02-21 | Forden Christopher Allen | Advertising inside electronic games |
US20020019744A1 (en) * | 2000-08-01 | 2002-02-14 | Nec Corporation | Last will and testament service method, last will and testament service system, and storage medium storing programs to control same |
US20020016655A1 (en) * | 2000-08-01 | 2002-02-07 | Joao Raymond Anthony | Apparatus and method for processing and/or for providing vehicle information and/or vehicle maintenance information |
US20020095317A1 (en) * | 2000-08-10 | 2002-07-18 | Miralink Corporation | Data/presence insurance tools and techniques |
US7333943B1 (en) * | 2000-08-11 | 2008-02-19 | The Prudential Insurance Company Of America | Method and system for managing real property transactions having internet access and control |
US7036082B1 (en) * | 2000-09-21 | 2006-04-25 | Nortel Networks Limited | Controlling communications through a virtual reality environment |
US20070011273A1 (en) * | 2000-09-21 | 2007-01-11 | Greenstein Bret A | Method and Apparatus for Sharing Information in a Virtual Environment |
US7319992B2 (en) * | 2000-09-25 | 2008-01-15 | The Mission Corporation | Method and apparatus for delivering a virtual reality environment |
US20030046689A1 (en) * | 2000-09-25 | 2003-03-06 | Maria Gaos | Method and apparatus for delivering a virtual reality environment |
US20040051718A1 (en) * | 2000-10-09 | 2004-03-18 | Bennett Stephen James | Authoring system |
US8171556B2 (en) * | 2000-10-17 | 2012-05-01 | Mieko Ishii | Personal information protection method, personal information protection system, processing device, portable transmitter/receiver, and program |
US20070061202A1 (en) * | 2000-11-29 | 2007-03-15 | Ellis Richard D | Method and system for dynamically incorporating advertising content into multimedia environments |
US7925703B2 (en) * | 2000-12-26 | 2011-04-12 | Numedeon, Inc. | Graphical interactive interface for immersive online communities |
US20030014266A1 (en) * | 2001-01-26 | 2003-01-16 | Funeral.Com, Inc. | Automated transactions of the funeral process |
US7539747B2 (en) * | 2001-03-14 | 2009-05-26 | Microsoft Corporation | Schema-based context service |
US6884166B2 (en) * | 2001-07-13 | 2005-04-26 | Gameaccount Limited | System and method for establishing a wager for a gaming application |
US7249139B2 (en) * | 2001-07-13 | 2007-07-24 | Accenture Global Services Gmbh | Secure virtual marketplace for virtual objects and services |
US20030037101A1 (en) * | 2001-08-20 | 2003-02-20 | Lucent Technologies, Inc. | Virtual reality systems and methods |
US20030105705A1 (en) * | 2001-09-24 | 2003-06-05 | Eyre Ethan B. | Computer web-based auction platform |
US20030064807A1 (en) * | 2001-09-25 | 2003-04-03 | Walker Jay S. | Method and apparatus for linked play gaming |
US6729884B1 (en) * | 2001-11-13 | 2004-05-04 | Metavante Corporation | E-Critter game for teaching personal values and financial responsibility to a child |
US20030107173A1 (en) * | 2001-11-20 | 2003-06-12 | Satloff James E. | System for using trading cards interactively through an electronic network |
US20060060260A1 (en) * | 2002-07-05 | 2006-03-23 | Hirosato Amano | Toner filling device and toner production management system |
US20040073488A1 (en) * | 2002-07-11 | 2004-04-15 | Etuk Ntiedo M. | System and method for rewards-based education |
US20050086605A1 (en) * | 2002-08-23 | 2005-04-21 | Miguel Ferrer | Method and apparatus for online advertising |
US7373377B2 (en) * | 2002-10-16 | 2008-05-13 | Barbaro Technologies | Interactive virtual thematic environment |
US20050010534A1 (en) * | 2002-12-12 | 2005-01-13 | Groz Marc Michael | Programmable financial instruments |
US8090618B1 (en) * | 2002-12-12 | 2012-01-03 | Massive Incorporated | Online game commerce system |
US7169501B2 (en) * | 2002-12-16 | 2007-01-30 | Shinko Electric Industries Co., Ltd. | Fuel cell |
US7698178B2 (en) * | 2003-01-24 | 2010-04-13 | Massive Incorporated | Online game advertising system |
US7908554B1 (en) * | 2003-03-03 | 2011-03-15 | Aol Inc. | Modifying avatar behavior based on user action or mood |
US7913176B1 (en) * | 2003-03-03 | 2011-03-22 | Aol Inc. | Applying access controls to communications with avatars |
US20050051965A1 (en) * | 2003-06-26 | 2005-03-10 | Prem Gururajan | Apparatus and method for a card dispensing system |
US20050003887A1 (en) * | 2003-07-02 | 2005-01-06 | Atlantic City Coin & Slot Service Company, Inc. | Method and apparatus for cashless gaming |
US7169051B1 (en) * | 2003-07-09 | 2007-01-30 | Tim Mossbarger | Player confidence points method and system of implementation in a multiplayer software application |
US20050086069A1 (en) * | 2003-07-15 | 2005-04-21 | Kaleidescape, Inc. | Separable presentation control rules with distinct control effects |
US20050021472A1 (en) * | 2003-07-25 | 2005-01-27 | David Gettman | Transactions in virtual property |
US20050043094A1 (en) * | 2003-08-18 | 2005-02-24 | Igt | System and method for permitting a tournament game on different computing platforms |
US20050055296A1 (en) * | 2003-09-08 | 2005-03-10 | Michael Hattersley | Method and system for underwriting and servicing financial accounts |
US20050059480A1 (en) * | 2003-09-11 | 2005-03-17 | Konami Gaming, Inc. | System and method for awarding incentive awards to a player of a gaming device |
US20050131808A1 (en) * | 2003-12-10 | 2005-06-16 | Edgar Villa | Method for establishing control over credit card transactions |
US7865566B2 (en) * | 2004-01-30 | 2011-01-04 | Yahoo! Inc. | Method and apparatus for providing real-time notification for avatars |
US7523486B1 (en) * | 2004-03-05 | 2009-04-21 | Sprint Communications Company Lp | User administration tool |
US7680694B2 (en) * | 2004-03-11 | 2010-03-16 | American Express Travel Related Services Company, Inc. | Method and apparatus for a user to shop online in a three dimensional virtual reality setting |
US20140052550A1 (en) * | 2004-03-11 | 2014-02-20 | American Express Travel Related Services Company, Inc. | Virtual reality shopping experience |
US20060026044A1 (en) * | 2004-07-28 | 2006-02-02 | Smith Donald X Ii | Electronic content insurance system |
US20060027961A1 (en) * | 2004-08-09 | 2006-02-09 | Mcallister Robert F | Gasoline game card: a game of chance |
US20060080613A1 (en) * | 2004-10-12 | 2006-04-13 | Ray Savant | System and method for providing an interactive social networking and role playing game within a virtual community |
US20060111934A1 (en) * | 2004-11-08 | 2006-05-25 | Meggs Anthony F | Virtual share exchange apparatus and method |
US8473334B2 (en) * | 2005-03-10 | 2013-06-25 | Sony Corporation | System and method for issuing and redeeming incentives on electronic data cards |
US7690997B2 (en) * | 2005-10-14 | 2010-04-06 | Leviathan Entertainment, Llc | Virtual environment with formalized inter-character relationships |
US20070117615A1 (en) * | 2005-10-14 | 2007-05-24 | Leviathan Entertainment, Llc | Securing Contracts in a Virtual World |
US20070087820A1 (en) * | 2005-10-14 | 2007-04-19 | Leviathan Entertainment, Llc | Financial institutions and instruments in a virtual environment |
US20080139318A1 (en) * | 2005-10-14 | 2008-06-12 | Leviathan Entertainment, Llc | Virtual Environment with Formalized Inter-Character Relationships |
US7901288B2 (en) * | 2006-04-20 | 2011-03-08 | International Business Machines Corporation | Embedded advertising enhancements in interactive computer game environments |
US20090048918A1 (en) * | 2007-08-16 | 2009-02-19 | Dawson Christopher J | Acquisition of avatar rewards through advertisement exposure |
US20100028844A1 (en) * | 2008-07-29 | 2010-02-04 | Wiseman Daneya L | Method for transforming an under-achieving student into a superior student |
US20100081475A1 (en) * | 2008-09-26 | 2010-04-01 | Ching-Liang Chiang | Mobile device interface with dual windows |
US20140011595A1 (en) * | 2010-12-03 | 2014-01-09 | Solocron Entertainment, Llc | Collaborative electronic game play employing player classification and aggregation |
US8738375B2 (en) * | 2011-05-09 | 2014-05-27 | At&T Intellectual Property I, L.P. | System and method for optimizing speech recognition and natural language parameters with user feedback |
Non-Patent Citations (2)
Title |
---|
Gratch et al.: Evaluating the modeling and use of emotion in virtual human, 2004, University of Southern California, CA, pages 1-8. * |
Kunreuther et al.: Risk Analysis for Extreme Events: Economic Incentives for Reducing Future Losses, October 2004, The Whartin School, National Institute of Standard and Technology, pages 1-93. * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070218987A1 (en) * | 2005-10-14 | 2007-09-20 | Leviathan Entertainment, Llc | Event-Driven Alteration of Avatars |
US7775885B2 (en) * | 2005-10-14 | 2010-08-17 | Leviathan Entertainment, Llc | Event-driven alteration of avatars |
US20090167787A1 (en) * | 2007-12-28 | 2009-07-02 | Microsoft Corporation | Augmented reality and filtering |
US8264505B2 (en) * | 2007-12-28 | 2012-09-11 | Microsoft Corporation | Augmented reality and filtering |
US8687021B2 (en) | 2007-12-28 | 2014-04-01 | Microsoft Corporation | Augmented reality and filtering |
US20110112662A1 (en) * | 2008-04-02 | 2011-05-12 | Thompson Scott Edward | System and method for providing real world value in a virtual world environment |
US8375310B2 (en) * | 2008-05-16 | 2013-02-12 | International Business Machines Corporation | Providing notification of a real-world event to a virtual universe user |
US20090287640A1 (en) * | 2008-05-16 | 2009-11-19 | Hamilton Ii Rick A | Providing notification of a real-world event to a virtual universe user |
US20090286605A1 (en) * | 2008-05-19 | 2009-11-19 | Hamilton Ii Rick A | Event determination in a virtual universe |
US8248404B2 (en) * | 2008-05-19 | 2012-08-21 | International Business Machines Corporation | Event determination in a virtual universe |
US20100060648A1 (en) * | 2008-09-10 | 2010-03-11 | International Business Machines Corporation | Method for Determining Valued Excursion Corridors in Virtual Worlds |
US8203561B2 (en) * | 2008-09-10 | 2012-06-19 | International Business Machines Corporation | Determining valued excursion corridors in virtual worlds |
US20100070807A1 (en) * | 2008-09-17 | 2010-03-18 | Hamilton Ii Rick A | System and method for managing server performance degradation in a virtual universe |
US8032799B2 (en) | 2008-09-17 | 2011-10-04 | International Business Machines Corporation | System and method for managing server performance degradation in a virtual universe |
US20100115422A1 (en) * | 2008-11-05 | 2010-05-06 | At&T Intellectual Property I, L.P. | System and method for conducting a communication exchange |
US8589803B2 (en) * | 2008-11-05 | 2013-11-19 | At&T Intellectual Property I, L.P. | System and method for conducting a communication exchange |
US8355535B2 (en) | 2008-11-14 | 2013-01-15 | International Business Machines Corporation | Method and apparatus for recording events in virtual worlds |
US20100124360A1 (en) * | 2008-11-14 | 2010-05-20 | International Business Machines Corporation | Method and apparatus for recording events in virtual worlds |
US20110055726A1 (en) * | 2009-08-27 | 2011-03-03 | International Business Machines Corporation | Providing alternative representations of virtual content in a virtual universe |
US8972870B2 (en) | 2009-08-27 | 2015-03-03 | International Business Machines Corporation | Providing alternative representations of virtual content in a virtual universe |
US9769048B2 (en) | 2009-08-27 | 2017-09-19 | International Business Machines Corporation | Providing alternative representations of virtual content in a virtual universe |
US20130173673A1 (en) * | 2011-12-28 | 2013-07-04 | Cbs Interactive Inc. | Techniques for providing a narrative summary for fantasy games |
US10540430B2 (en) | 2011-12-28 | 2020-01-21 | Cbs Interactive Inc. | Techniques for providing a natural language narrative |
US10592596B2 (en) * | 2011-12-28 | 2020-03-17 | Cbs Interactive Inc. | Techniques for providing a narrative summary for fantasy games |
US20220207606A1 (en) * | 2020-12-31 | 2022-06-30 | The Toronto-Dominion Bank | Prediction of future occurrences of events using adaptively trained artificial-intelligence processes |
Also Published As
Publication number | Publication date |
---|---|
US7774275B2 (en) | 2010-08-10 |
US20100223117A1 (en) | 2010-09-02 |
US7991691B2 (en) | 2011-08-02 |
US20100223167A1 (en) | 2010-09-02 |
US20060195394A1 (en) | 2006-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070143119A1 (en) | Probability adjustment of a virtual world loss event | |
US20060178965A1 (en) | Tracking a participant loss in a virtual world | |
US20060178899A1 (en) | Identifying a participant loss in a virtual world | |
US8096882B2 (en) | Risk mitigation in a virtual world | |
US8512143B2 (en) | Third party control over virtual world characters | |
US8977566B2 (en) | Virtual world reversion rights | |
US7937314B2 (en) | Disposition of component virtual property rights | |
US20070038559A1 (en) | Rating notification for virtual world environment | |
US20070118420A1 (en) | Context determinants in virtual world environment | |
US8271365B2 (en) | Real-world profile data for making virtual world contacts | |
US20070130001A1 (en) | Real-world profile data for making virtual world contacts | |
US20070024613A1 (en) | Selecting auxiliary control features for virtual world environment | |
US20060178966A1 (en) | Virtual world property disposition after virtual world occurence | |
US8556723B2 (en) | Third party control over virtual world characters | |
US20090138355A1 (en) | Real-world profile data for making virtual world contacts | |
US20060178968A1 (en) | Virtual world interconnection technique | |
US20060178967A1 (en) | Disposition of proprietary virtual rights | |
US20100114662A1 (en) | Real-world profile data for making virtual world contacts | |
US20090043683A1 (en) | Virtual world reversion rights | |
US20070174183A1 (en) | Context determinants in virtual world environment | |
US20090018910A1 (en) | Virtual world interconnection technique | |
US20150120533A1 (en) | Real-world profile data for making virtual world contacts | |
US20090043682A1 (en) | Real-world profile data for making virtual world contacts | |
US20090132297A1 (en) | Probability adjustment of a virtual world loss event | |
US20070112660A1 (en) | Disposition of proprietary virtual rights |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SEARETE LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JUNG, EDWARD K.Y.;LEVIEN, ROYCE A.;LORD, ROBERT W.;AND OTHERS;REEL/FRAME:017243/0512;SIGNING DATES FROM 20051012 TO 20051102 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |