US20090222526A1 - Using gender analysis of names to assign avatars in instant messaging applications - Google Patents
Using gender analysis of names to assign avatars in instant messaging applications Download PDFInfo
- Publication number
- US20090222526A1 US20090222526A1 US12/183,732 US18373208A US2009222526A1 US 20090222526 A1 US20090222526 A1 US 20090222526A1 US 18373208 A US18373208 A US 18373208A US 2009222526 A1 US2009222526 A1 US 2009222526A1
- Authority
- US
- United States
- Prior art keywords
- user
- instant messaging
- gender
- username
- messaging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 claims abstract description 74
- 238000000034 method Methods 0.000 claims abstract description 14
- 230000007935 neutral effect Effects 0.000 claims abstract description 10
- 238000012545 processing Methods 0.000 claims abstract description 9
- 238000004590 computer program Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 241000282414 Homo sapiens Species 0.000 description 2
- 239000000872 buffer Substances 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 101100289061 Drosophila melanogaster lili gene Proteins 0.000 description 1
- 230000003796 beauty Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
Definitions
- Exemplary embodiments of the present invention relate to electronic messaging systems, and more particularly, to the display of avatars representing users communicating within electronic messaging systems.
- Instant messaging is an online chat medium based on typed text that allows users to communicate with each other and to collaborate in real-time over a network, commonly the Internet.
- Instant messaging applications monitor and report the status of users that have established each other as online contacts. This information is typically presented to a user in a window.
- Instant messaging allows instantaneous communication between a number of parties simultaneously by transmitting information quickly and efficiently, and featuring immediate receipt of acknowledgement or reply. For these reasons, instant messaging applications also are often used by users conducting business. By utilizing instant messaging, business users can view each other's availability and initiate a text conversation with colleagues or customers when a desired contact becomes available. Millions of users communicate using instant messaging systems every day. With instant messaging becoming an important part of both personal and business communications, communication enhancements are important to the continued success of this type of communication tool.
- Electronic communications are generally subject to the same or similar social categories and rules to that of real world communications, and as a result, the types of cultural differences described above can often present problems in assessing gender during instant messaging conversations.
- an English speaking person can correctly guess whether a particular individual whom he never met is female or male during a communications session based on the first name of that person, when it is provided.
- the task of assessing gender may be more challenging.
- a lack of knowledge of the gender of the person being communicated with in a messaging session could lead to potentially offensive communication gaffes and faux pas.
- a data processing system that comprises a processor, a random access memory for storing data and programs for execution by the processor, and computer readable instructions stored in the random access memory for execution by the processor to perform a method for displaying gender-based avatar representations of users in instant messaging communications that comprises receiving a username for a first user having a first user account registered with an instant messaging system; performing an anthroponomastic analysis of the username to assign a probable gender for the first user; displaying a current contact area in a communication session window of a user interface provided by an instant messaging application on a client system operated by a second user having a second user account registered with the instant messaging system, the instant messaging application accessing the instant messaging system to allow the second user to participate in instant messaging communication via the user interface; and displaying the username for the first user and a gender-based avatar representation indicative of the probable gender for the first user in the current contact area while the instant messaging application is accessing the instant messaging system to
- FIG. 1 is a block diagram illustrating a representation of a computer network system within which an exemplary embodiment of the present invention can be implemented.
- FIG. 2 is a block diagram illustrating a representation of a messaging server system within which an exemplary embodiment of the present invention is implemented.
- FIG. 3 is a sample illustration of a messaging session window provided by a graphical user interface of within a messaging system implementing an exemplary embodiment of the present invention.
- FIG. 4 is a block diagram illustrating a representation of a computer system within which an exemplary embodiment of the present invention can be implemented.
- Messaging system 100 contains network 102 , which is the medium used to provide communications links between various devices and computers connected together within the network system.
- Network 102 may include connections such as wire, wireless communication links, or fiber optic cables, for example.
- an electronic messaging system server 104 is communicatively connected to network 102 along with storage unit 106 .
- messaging client systems 110 , 112 , and 114 are communicatively connected to network 102 .
- These client systems 110 , 112 , and 114 may be, for example, personal computers or network computers.
- Client systems 110 , 112 , and 114 are each operated by a messaging system user and act as clients to server system 104 in this example.
- Messaging server 104 is configured to control a messaging session between client messaging systems 110 , 112 , and 114 being operated by users engaged in peer-to-peer network communications via a network 102 .
- messaging system 100 can include additional servers, clients, and other devices not shown in FIG. 1 .
- Network 102 may comprise the Internet, in which the network includes a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another.
- TCP/IP Transmission Control Protocol/Internet Protocol
- At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational and other computer systems that route data and messages.
- network system 100 also may be implemented as any of a number of different types of networks, or combinations thereof, such as, for example, an intranet, a local area network (LAN), or a wide area network (WAN).
- the client/server environment can be implemented within any suitable network architecture.
- FIG. 1 is thus intended as a non-limiting example, and not as an architectural constraint for implementing exemplary embodiments of the present invention.
- a client system to access messaging system 100 to begin a messaging session, establishes a connection to messaging server 104 via network 102 .
- the connected client system may directly or indirectly transmit data to and access content from the messaging server.
- a user accessing messaging server 104 through the connected client system can then able to use a messaging client application to, for example, view whether particular users are online, view whether users may receive messages, exchange messages with particular message recipients, participate in group chat rooms, trade files such as pictures, invitations or documents, find other message recipients with similar interests, get customized information such as news and stock quotes, and search the Web.
- a client sender enters a message for a messaging session by operating a messaging client application at a client messaging system such as client system 110 .
- the message entry is transmitted to messaging server 104 via network 102 .
- Messaging server 104 then distributes the message entry to a client messaging system such as client system 112 being operated by the intended client recipient participating in the messaging session via network 102 .
- a messaging client application being used at the recipient's client system renders the message and other information served by messaging server 104 .
- messaging server can employ one or more standard proprietary messaging protocols.
- the messaging client applications provide a user interface through which client senders and recipients can access messaging server 104 to send and receive messages.
- a separate messaging client application can be installed on each client system for operation by the user of that client system.
- a single messaging application can be provided as a Web messaging application in a standard format such as HTML/XHTML that may be supported and accessed by Web browsers installed on each client system via network 102 .
- messaging server 104 can be configured to provide the Web messaging application.
- the electronic messages sent between a sender client system and recipient client system can be routed through messaging server 104 .
- the electronic messages sent between a sender client system and recipient client system can be routed through a third party server (not shown), and, in some cases, can also be routed through messaging server 104 .
- the electronic messages can be sent directly between a sender client system and recipient client system.
- client system users may need to login to the messaging system by authenticating themselves for the purposes of accounting, security, logging, and/or resource management through a user interface provided by the messaging client application being operated at the user's client messaging system.
- a user can have an account (a user account) and a username (also sometimes called a username, handle, or nickname), and in most cases also a password.
- the information for each user account can be maintained by messaging server 104 in storage 106 .
- client and server are used herein to refer to a computer's general role as a requester of data (the client) or provider of data (the server).
- client and server are used to refer to a client system user's general role as a sender of a message during a messaging session (the sender) or as a receiver of a message during a messaging session (the recipient).
- each of client messaging systems 110 , 112 , and 114 and messaging server 104 may function as both a “client” and a “server” and may be implemented utilizing a computer system such as data processing system 200 , described below with reference to FIG. 2 .
- each of client messaging systems 110 , 112 , and 114 may function as both a “sender” and a “recipient” and typically act as both during a typical messaging session. Still further, while exemplary embodiments are described herein with emphasis upon messaging server 104 controlling a messaging session between client messaging systems 110 , 112 , and 114 engaged in peer-to-peer network communications via a network 104 , alternative exemplary embodiments can be implemented to be performed or partially performed within client messaging systems 110 , 112 , and 114 . Furthermore, other types of messaging systems may be utilized to implement exemplary embodiments.
- An avatar can provide a mechanism for enabling a non-textual identification of a user associated with the avatar.
- exemplary embodiments of the present invention can be implemented within electronic messaging systems, such as messaging system 100 of FIG. 1 , that are configured to display graphical avatars on client systems to provide a representation of the participants in communication sessions to one another.
- Exemplary embodiments can be implemented to provide a mechanism for performing an anthroponomastic analysis of the usernames or usernames of users to determine probable genders for the users and for displaying avatars having genders that correspond to the determine genders for the users to represent the users during their electronic messaging communications with other users.
- Messaging server 200 may be implemented, for example, as messaging server 104 within messaging system 100 of FIG. 1 .
- messaging server 200 can comprise multiple controller components and databases located within a single server system or within multiple server systems, where the multiple server systems are integrated with or accessible by users of messaging client systems in a messaging system via a network.
- Messaging server 200 includes a messaging controller component 210 that is configured to control the distribution of message communications for the messaging system provided by the messaging server.
- messaging controller 210 will be described with respect to message communications such as instant messaging.
- messaging controller 210 may control other types of available electronic communications such as e-mail messaging or chat room messaging.
- messaging controller 210 distributes instant messaging communications between sender and recipient users of messaging client systems in a channel opened by the messaging controller for the messaging session.
- Communicating users are each represented by an identifier, such as a username, and a graphical avatar that is displayed to other users in a user interface provided by the messaging client application being operated by each user at that user's client system.
- Messaging controller 210 can be configured to distribute the identifier and the avatar of each user to other users engaged in communications sessions with that user.
- Message communications transferred between users as controlled by messaging controller 210 can be stored in a transferred messages database 220 for a specified period of time, and all the entries for a specific instant messaging session can be catalogued together within the messages database.
- Messaging server 200 also includes a user account controller component 230 , a user account database 240 , a username analysis controller 250 , and an anthroponomastic information database 260 .
- User account controller 230 is configured to register user accounts for new users of the messaging system, to control authentication of registered users logging into the messaging system, and to maintain identifiers and other attributes for each user account in user account database 240 .
- user account controller 230 determines a username for the user and stores the username in user account database 240 .
- the identifiers and other attributes maintained in user account database 240 for a particular user account can include the username or screen name, a password, the avatar representation, and other information about the particular user assigned the account.
- the other information about a particular user may include, for example, a personal profile, which may include information about the user's name, regional areas of origin, national language, company association, memberships, and personal characteristics.
- username analysis controller 250 is configured to perform an anthroponomastic analysis of the username or screen name of each newly registered user to determine a probable gender for the user and to assign a gender-based avatar representation for the user that will be displayed in the user interfaces of other users during instant messaging communications with the newly registered user.
- Anthroponymy is the study of the names of human beings.
- exemplary embodiments are particularly well-suited for use in situations where a new user specifies his or her full name or given name as his or her username.
- username analysis controller 250 is configured to access data anthroponomastic information database 260 , which can store information such as, for example, an expansive list of names compiled from those used in many different cultures catalogued according to gender (that is, male, female, or unisex), a list of rules for associating a username not included in the list of names with a particular culture, and a list of rules derived from naming conventions that are employed in many different cultures catalogued culturally, linguistically, nationally, regionally, and/or according to other relevant anthroponomastic criteria.
- data anthroponomastic information database 260 can store information such as, for example, an expansive list of names compiled from those used in many different cultures catalogued according to gender (that is, male, female, or unisex), a list of rules for associating a username not included in the list of names with a particular culture, and a list of rules derived from naming conventions that are employed in many different cultures catalogued culturally, linguistically, nationally, regionally, and/or according to other relevant anthroponom
- username analysis controller 250 is configured to perform an anthroponomastic analysis of the new user's username to determine a probable gender for the user. Such an analysis can, for instance, first involve accessing the list of names in anthroponomastic information database 260 to attempt to find a match. If a match for the username is found in the list of names, username analysis controller 250 can assign the user with the gender associated with the name in anthroponomastic information database 260 .
- the assigned gender can be male, female, or unisex.
- username analysis controller 250 can be configured access the list of rules in anthroponomastic information database 260 to attempt to identify a particular culture with which the name is commonly associated (for example, many terms used for names may have characteristics that may be used to identify a cultural origin for the term) and the list of rules derived from naming conventions for the identified culture to attempt to determine a gender to assign to the name.
- a naming convention is a collection of rules followed by a set of names. Naming conventions can be used to deduce useful rules based on the character sequence of known names and knowledge of the rules followed in the known names.
- username analysis controller 250 can use the list of rules derived from naming conventions for the Malawi culture stored in the anthroponomastic information database to attempt to associate a probable gender with the username. According to Malawi naming conventions, a first name that ends with the letter ‘i’ is more likely to be a female name. Thus, for a newly registered user having the username ‘Amodini’, username analysis controller 250 would assign that user with a probable gender of female.
- username analysis controller 250 can use the list of rules derived from naming conventions for the Chinese culture stored in the anthroponomastic information database to attempt to associate a gender with the username.
- naming conventions the family name is placed before the given name, in reverse of the regular order of English names.
- given names resonant of qualities that are perceived to be either masculine or feminine are frequently given, with males being linked with strength and firmness, and females with beauty and flowers.
- Females also are commonly given names that repeat a character.
- username analysis controller 250 would assign that user with a probable gender of female.
- username analysis controller 250 may be unable to determine a probable gender for a username after accessing the list names, the list of cultural rules, and the list of rules derived from naming conventions, in which case the username analysis controller can assign a neutral gender to the user.
- username analysis controller 250 can then assign a gender-based avatar to the user based upon the determined gender. Thus, if the probable gender for the user's username is determined to be female, the user will be assigned with a female avatar. If the probable gender for the user's username is determined to be male, the user will be assigned with a male avatar.
- the probable gender for the user's username is determined to be neutral (that is, either the name is unknown and name analysis controller 250 is unable to determine a probable gender based upon information in the list of cultural rules and the list of rules derived from naming conventions in anthroponomastic information database 260 , or the name is a unisex one that is commonly given to both males and females, such as Pat, which may indicate a full name of Patrick or Patricia) the user will be assigned with generic, genderless human figure image as his or her avatar.
- some unisex names are homophones, pronounced the same for both genders but spelled differently.
- username analysis controller 250 can be configured to utilize naming conventions to assign a male or female gender-based avatar to a user specifying a unisex homophone as a username instead of a genderless avatar. After assigning an avatar representation to a particular user, username analysis controller 250 can be configured to direct user account controller 230 to store the avatar representation assigned to the user in the user profile data maintained for the user in user account database 240 .
- messaging server 200 can be further configured to provide the user with the option of overriding the assigned avatar by selecting a different avatar representation. For example, when username analysis controller 250 has assigned a neutral gender avatar to a particular user, messaging server 200 can be further configured to provide an indication to the user of such assignment and provide the user with the option of selecting an appropriate gender-based avatar to replace the neutral gender avatar as the user's avatar representation in communication sessions within the messaging system.
- messaging server 200 can be further configured to provide an indication to the user of such assignment and provide the user with the option of selecting a neutral gender avatar to replace the gender-based avatar as the user's avatar representation if the particular user does not wish to so indicate his or her gender to other users in communication sessions within the messaging system.
- username analysis controller 250 can be configured to direct user account controller 230 to store the avatar representation selected by the user, rather than the assigned avatar, in the user profile data maintained for the user in user account database 240 .
- messaging server 200 can retrieve the accessing user's profile data from the database and to provide the user's gender-based avatar representation in communications with other users accessing the messaging system.
- the first user's avatar then can be displayed in a window provided within the user interface of the messaging client application being used by other users engaged in a communications session with the first user.
- the user's gender-based avatar can be used to represent the user to other users in a communications session.
- the first user's avatar may also be displayed in a window or menu option that provides a “buddy”, colleague, or associate list, or other list of regular contacts, within the user interfaces of messaging client application being used by other users to provide an option for the other users to communicate with or check the status of the first user.
- Messaging session window 300 may be viewed by a first user of the messaging client application who is connected to the messaging system to engage in communications sessions with a second user connected to the messaging system.
- Messaging session window 300 includes a message composition area 310 for composing messages to be sent to the second user during the communications session and a message history text box 320 for displaying a transcript of the message communications session between the first and second users.
- message composition area 310 for composing messages to be sent to the second user during the communications session
- message history text box 320 for displaying a transcript of the message communications session between the first and second users.
- Each of the messages sent to, or received from, the second user can be listed in chronological order in message history text box 320 , with each listed message providing an indication of which user sent the message.
- Messaging session window 300 also includes a set of feature controls 330 and a “send” control button 340 .
- Feature controls 330 can be accessed by the first user to control features such as message encryption, conversation logging, conversation forwarding to a different communications mode, font size and color control, and spell checking, among others.
- Send control button 340 can be accessed by the first user to trigger sending of a message typed into instant message composition area 310 .
- Messaging session window 300 also includes a window menu 350 providing a set of client application controls that can be accessed by the first user, and a set of contact or “buddy” controls 360 that can be accessed by the user to maintain a list of messaging contacts, view which messaging contacts are available to communicate with using the messaging system, and switch from the current messaging session to another messaging session with another user in the first user's contact list.
- a window menu 350 providing a set of client application controls that can be accessed by the first user, and a set of contact or “buddy” controls 360 that can be accessed by the user to maintain a list of messaging contacts, view which messaging contacts are available to communicate with using the messaging system, and switch from the current messaging session to another messaging session with another user in the first user's contact list.
- messaging session window 300 also includes a current contact area 370 that displays a representation of the second user with whom the first user is currently engaged in a messaging session.
- the representation includes a username 375 specified by the second user and a graphical image of a gender-based avatar 380 assigned by the messaging system to represent the second user in messaging communications.
- the username of the second user is “Amodini Visweswaran”
- the gender-based avatar assigned to the second user is an image of a female character.
- Gender-based avatar 380 is female in the current example because “Amondini” has been determined as having a probable gender of female by, for example, an anthroponomastic analysis component (such as username analysis controller 250 of the exemplary embodiment described with reference to FIG. 2 ) implemented within the messaging system server.
- the display of gender-based avatar 380 in current contact area 370 enables the first user to determine the gender of the second user with whom the first user is communicating by perceiving the gender-based avatar being projected, rather than by assessing the username of the second user.
- the gender-based avatar displayed is an avatar that only includes a graphical image of a face in a small square shaped area, which may be referred to as a facial avatar or a head avatar.
- any other suitable type of avatar sufficient to convey gender may be displayed in an area of any suitable shape and size.
- the gender-based avatar may include additional body parts.
- exemplary embodiments of the present invention can be utilized to aid electronic messaging application users in identifying the gender of other users with which they are communicating. Exemplary embodiments can thus enable electronic messaging application users to have a greater social presence in messaging communications and to communicate across different cultures more easily without offending other users. Exemplary embodiments can be particularly suitable, for example, for implementation within instant messaging applications being used by users as a business communications medium. By utilizing instant messaging, business users can view each other's availability and initiate a text conversation with colleagues or customers without the restrictions of time and space.
- the username or screen name that identifies the account for the user to the user's contacts is that user's personal name (that is, the true proper name given to that individual at birth or otherwise legally identifying that individual).
- user's personal name that is, the true proper name given to that individual at birth or otherwise legally identifying that individual.
- Exemplary embodiments of the present invention can be realized in hardware, software, or a combination of hardware and software. Exemplary embodiments can be realized in a centralized fashion in one computer system or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system—or other apparatus adapted for carrying out the methods described herein—is suited.
- a typical combination of hardware and software could be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
- Exemplary embodiments of the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which—when loaded in a computer system—is able to carry out these methods.
- Computer program means or computer program as used in the present invention indicates any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or, notation; and b) reproduction in a different material form.
- a computer system in which exemplary embodiments can be implemented may include, inter alia, one or more computers and at least a computer program product on a computer readable medium, allowing a computer system to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium.
- the computer readable medium may include non-volatile memory, such as ROM, Flash memory, Disk drive memory, CD-ROM, and other permanent storage. Additionally, a computer readable medium may include, for example, volatile storage such as RAM, buffers, cache memory, and network circuits. Furthermore, the computer readable medium may comprise computer readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network that allows a computer system to read such computer readable information.
- FIG. 4 is a block diagram of an exemplary computer system 400 that can be used for implementing exemplary embodiments of the present invention.
- Computer system 400 includes one or more processors, such as processor 404 .
- Processor 404 is connected to a communication infrastructure 402 (for example, a communications bus, cross-over bar, or network).
- a communication infrastructure 402 for example, a communications bus, cross-over bar, or network.
- Exemplary computer system 400 can include a display interface 408 that forwards graphics, text, and other data from the communication infrastructure 402 (or from a frame buffer not shown) for display on a display unit 410 .
- Computer system 400 also includes a main memory 406 , which can be random access memory (RAM), and may also include a secondary memory 412 .
- Secondary memory 412 may include, for example, a hard disk drive 414 and/or a removable storage drive 416 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc.
- Removable storage drive 416 reads from and/or writes to a removable storage unit 418 in a manner well known to those having ordinary skill in the art.
- Removable storage unit 418 represents, for example, a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 416 .
- removable storage unit 418 includes a computer usable storage medium having stored therein computer software and/or data.
- secondary memory 412 may include other similar means for allowing computer programs or other instructions to be loaded into the computer system.
- Such means may include, for example, a removable storage unit 422 and an interface 420 .
- Examples of such may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units 422 and interfaces 420 which allow software and data to be transferred from the removable storage unit 422 to computer system 400 .
- Computer system 400 may also include a communications interface 424 .
- Communications interface 424 allows software and data to be transferred between the computer system and external devices. Examples of communications interface 424 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc.
- Software and data transferred via communications interface 424 are in the form of signals which may be, for example, electronic, electromagnetic, optical, or other signals capable of being received by communications interface 424 . These signals are provided to communications interface 424 via a communications path (that is, channel) 426 .
- Channel 426 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link, and/or other communications channels.
- the terms “computer program medium,” “computer usable medium,” and “computer readable medium” are used to generally refer to media such as main memory 406 and secondary memory 412 , removable storage drive 416 , a hard disk installed in hard disk drive 414 , and signals. These computer program products are means for providing software to the computer system.
- the computer readable medium allows the computer system to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium.
- the computer readable medium may include non-volatile memory, such as Floppy, ROM, Flash memory, Disk drive memory, CD-ROM, and other permanent storage. It can be used, for example, to transport information, such as data and computer instructions, between computer systems.
- the computer readable medium may comprise computer readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network that allows a computer system to read such computer readable information.
- Computer programs are stored in main memory 406 and/or secondary memory 412 . Computer programs may also be received via communications interface 424 . Such computer programs, when executed, can enable the computer system to perform the features of exemplary embodiments of the present invention as discussed herein. In particular, the computer programs, when executed, enable processor 404 to perform the features of computer system 400 . Accordingly, such computer programs represent controllers of the computer system.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A data processing system includes a processor, a memory, and computer readable instructions stored in the memory for execution by the processor to perform a method comprising receiving a username for a first user having a first user account registered with an instant messaging system; performing an anthroponomastic analysis of the username to assign a probable gender selected from male, female, and neutral; displaying a current contact area in a communication session window of a user interface provided by an instant messaging application on a client system operated by a second user having a second user account; and displaying the username for the first user and an avatar representation indicative of the probable gender in the current contact area while the instant messaging application is accessing the instant messaging system to allow the second user to participate in instant messaging communication with the first user via the user interface.
Description
- This application is a continuation of U.S. patent application Ser. No. 12/038,954, filed Feb. 28, 2008, the disclosure of which is incorporated by reference herein in its entirety.
- Exemplary embodiments of the present invention relate to electronic messaging systems, and more particularly, to the display of avatars representing users communicating within electronic messaging systems.
- Instant messaging (IM) is an online chat medium based on typed text that allows users to communicate with each other and to collaborate in real-time over a network, commonly the Internet. Instant messaging applications monitor and report the status of users that have established each other as online contacts. This information is typically presented to a user in a window. Instant messaging allows instantaneous communication between a number of parties simultaneously by transmitting information quickly and efficiently, and featuring immediate receipt of acknowledgement or reply. For these reasons, instant messaging applications also are often used by users conducting business. By utilizing instant messaging, business users can view each other's availability and initiate a text conversation with colleagues or customers when a desired contact becomes available. Millions of users communicate using instant messaging systems every day. With instant messaging becoming an important part of both personal and business communications, communication enhancements are important to the continued success of this type of communication tool.
- With today's advanced communication technology, people increasingly communicate with people from cultures very different from their own without the restrictions of time and space. The social conventions of electronic communications such as instant messaging are similar that those of face-to-face communications and thus often reflect the societal conventions of the cultures in which the parties exist. In face-to-face situations, however, the concurrent use of both verbal and non-verbal communication enables a rich, multi-modal environment that provides each communicating party with the ability to construct a physical identification of another communicating party using visual and/or auditory characteristics. With digital communications that involve typed text such as instant messaging, all that is typically communicated are the words themselves, which do not always necessarily provide sufficient gender identification information that would be conveyed in a face-to-face conversation.
- There are thousands of languages in use today, which provides for a wide variety of given or first names. In nearly every culture, given names are commonly used as a contextual form of identity, of which gender is one component. In most cultures, persons of different gender are generally addressed differently during communications according to particular cultural and social conventions (for example, in English speaking countries, men can be addressed formally using ‘Sir’ or ‘Mr.’, and women can be addressed formally using ‘Madam’, ‘Mrs.’, ‘Miss’, or ‘Ms.’).
- Electronic communications are generally subject to the same or similar social categories and rules to that of real world communications, and as a result, the types of cultural differences described above can often present problems in assessing gender during instant messaging conversations. Generally, an English speaking person can correctly guess whether a particular individual whom he never met is female or male during a communications session based on the first name of that person, when it is provided. But when messaging with people having names originating from other cultures with which the person is not very familiar, for example, people with Indian or Chinese first names, the task of assessing gender may be more challenging. Particularly in situations in which the electronic messaging system is being used for professional purposes, a lack of knowledge of the gender of the person being communicated with in a messaging session could lead to potentially offensive communication gaffes and faux pas.
- The shortcomings of the prior art can be overcome and additional advantages can be provided through exemplary embodiments of the present invention that are related to a data processing system that comprises a processor, a random access memory for storing data and programs for execution by the processor, and computer readable instructions stored in the random access memory for execution by the processor to perform a method for displaying gender-based avatar representations of users in instant messaging communications that comprises receiving a username for a first user having a first user account registered with an instant messaging system; performing an anthroponomastic analysis of the username to assign a probable gender for the first user; displaying a current contact area in a communication session window of a user interface provided by an instant messaging application on a client system operated by a second user having a second user account registered with the instant messaging system, the instant messaging application accessing the instant messaging system to allow the second user to participate in instant messaging communication via the user interface; and displaying the username for the first user and a gender-based avatar representation indicative of the probable gender for the first user in the current contact area while the instant messaging application is accessing the instant messaging system to allow the second user to participate in instant messaging communication with the first user via the user interface. The probable gender is selected from male, female, and neutral.
- The shortcomings of the prior art can also be overcome and additional advantages can also be provided through exemplary embodiments of the present invention that are related to methods and computer program products corresponding to the above-summarized data processing system are also described herein.
- Additional features and advantages are realized through the techniques of the present invention. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention. For a better understanding of the invention with advantages and features, refer to the description and to the drawings.
- As a result of the summarized invention, technically we have achieved a solution that can be implemented within electronic messaging systems that display graphical avatars to represent participants in communications to provide a mechanism for performing an anthroponomastic analysis of the real names of users to determine probable genders for the users and displaying avatars having genders that correspond to the determined probable gender to represent the users to one another during their messaging communications.
- The subject matter that is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention are apparent from the following detailed description of exemplary embodiments of the present invention taken in conjunction with the accompanying drawings in which:
-
FIG. 1 is a block diagram illustrating a representation of a computer network system within which an exemplary embodiment of the present invention can be implemented. -
FIG. 2 is a block diagram illustrating a representation of a messaging server system within which an exemplary embodiment of the present invention is implemented. -
FIG. 3 is a sample illustration of a messaging session window provided by a graphical user interface of within a messaging system implementing an exemplary embodiment of the present invention. -
FIG. 4 is a block diagram illustrating a representation of a computer system within which an exemplary embodiment of the present invention can be implemented. - The detailed description explains exemplary embodiments of the present invention, together with advantages and features, by way of example with reference to the drawings. The flow diagrams depicted herein are just examples. There may be many variations to these diagrams or the steps (or operations) described therein without departing from the spirit of the invention. For instance, the steps may be performed in a differing order, or steps may be added, deleted, or modified. All of these variations are considered a part of the claimed invention.
- While the specification concludes with claims defining the features of the invention that are regarded as novel, it is believed that the invention will be better understood from a consideration of the description of exemplary embodiments in conjunction with the drawings. It is of course to be understood that the embodiments described herein are merely exemplary of the invention, which can be embodied in various forms. Therefore, specific structural and functional details disclosed in relation to the exemplary embodiments described herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriate form. Further, the terms and phrases used herein are not intended to be limiting but rather to provide an understandable description of the invention.
- Referring now to
FIG. 1 , an example of an electronic messaging system providing a client/server environment within which exemplary embodiments of the present invention can be implemented is illustrated.Messaging system 100 containsnetwork 102, which is the medium used to provide communications links between various devices and computers connected together within the network system. Network 102 may include connections such as wire, wireless communication links, or fiber optic cables, for example. - In the depicted example, an electronic
messaging system server 104 is communicatively connected tonetwork 102 along with storage unit 106. In addition,messaging client systems network 102. Theseclient systems Client systems server system 104 in this example.Messaging server 104 is configured to control a messaging session betweenclient messaging systems network 102. In exemplary embodiments,messaging system 100 can include additional servers, clients, and other devices not shown inFIG. 1 . - Network 102 may comprise the Internet, in which the network includes a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational and other computer systems that route data and messages. Of course,
network system 100 also may be implemented as any of a number of different types of networks, or combinations thereof, such as, for example, an intranet, a local area network (LAN), or a wide area network (WAN). The client/server environment can be implemented within any suitable network architecture.FIG. 1 is thus intended as a non-limiting example, and not as an architectural constraint for implementing exemplary embodiments of the present invention. - In the present exemplary embodiment, to access
messaging system 100 to begin a messaging session, a client system establishes a connection tomessaging server 104 vianetwork 102. Once a connection tomessaging server 104 has been established, the connected client system may directly or indirectly transmit data to and access content from the messaging server. A user accessingmessaging server 104 through the connected client system can then able to use a messaging client application to, for example, view whether particular users are online, view whether users may receive messages, exchange messages with particular message recipients, participate in group chat rooms, trade files such as pictures, invitations or documents, find other message recipients with similar interests, get customized information such as news and stock quotes, and search the Web. - In a typical scenario within
messaging system 100, a client sender enters a message for a messaging session by operating a messaging client application at a client messaging system such asclient system 110. The message entry is transmitted tomessaging server 104 vianetwork 102.Messaging server 104 then distributes the message entry to a client messaging system such asclient system 112 being operated by the intended client recipient participating in the messaging session vianetwork 102. A messaging client application being used at the recipient's client system renders the message and other information served by messagingserver 104. To transfer data, messaging server can employ one or more standard proprietary messaging protocols. The messaging client applications provide a user interface through which client senders and recipients can accessmessaging server 104 to send and receive messages. In exemplary embodiments, a separate messaging client application can be installed on each client system for operation by the user of that client system. Alternatively, a single messaging application can be provided as a Web messaging application in a standard format such as HTML/XHTML that may be supported and accessed by Web browsers installed on each client system vianetwork 102. In exemplary embodiments,messaging server 104 can be configured to provide the Web messaging application. - As thus described, in exemplary embodiments, the electronic messages sent between a sender client system and recipient client system can be routed through
messaging server 104. In alternative exemplary embodiments, the electronic messages sent between a sender client system and recipient client system can be routed through a third party server (not shown), and, in some cases, can also be routed throughmessaging server 104. In yet other alternative exemplary embodiments, the electronic messages can be sent directly between a sender client system and recipient client system. - It should be noted that the term “user” is used herein to refer to one who uses a computer system, such as one of
client systems messaging system 100, client system users may need to login to the messaging system by authenticating themselves for the purposes of accounting, security, logging, and/or resource management through a user interface provided by the messaging client application being operated at the user's client messaging system. For purposes of authentication, a user can have an account (a user account) and a username (also sometimes called a username, handle, or nickname), and in most cases also a password. The information for each user account can be maintained by messagingserver 104 in storage 106. - It should also be noted that the terms “client” and “server” are used herein to refer to a computer's general role as a requester of data (the client) or provider of data (the server). Further, the terms “sender” and “recipient” are used to refer to a client system user's general role as a sender of a message during a messaging session (the sender) or as a receiver of a message during a messaging session (the recipient). Additionally, each of
client messaging systems messaging server 104 may function as both a “client” and a “server” and may be implemented utilizing a computer system such asdata processing system 200, described below with reference toFIG. 2 . Further, users of each ofclient messaging systems messaging server 104 controlling a messaging session betweenclient messaging systems network 104, alternative exemplary embodiments can be implemented to be performed or partially performed withinclient messaging systems - The use of graphical avatar images to provide proxy representations for users has been gradually introduced in electronic messaging systems. An avatar can provide a mechanism for enabling a non-textual identification of a user associated with the avatar. As will now be described, exemplary embodiments of the present invention can be implemented within electronic messaging systems, such as
messaging system 100 ofFIG. 1 , that are configured to display graphical avatars on client systems to provide a representation of the participants in communication sessions to one another. Exemplary embodiments can be implemented to provide a mechanism for performing an anthroponomastic analysis of the usernames or usernames of users to determine probable genders for the users and for displaying avatars having genders that correspond to the determine genders for the users to represent the users during their electronic messaging communications with other users. - Referring now to
FIG. 2 , amessaging system server 200 implementing an exemplary embodiment of the present invention is illustrated.Messaging server 200 may be implemented, for example, asmessaging server 104 withinmessaging system 100 ofFIG. 1 . As illustrated inFIG. 2 ,messaging server 200 can comprise multiple controller components and databases located within a single server system or within multiple server systems, where the multiple server systems are integrated with or accessible by users of messaging client systems in a messaging system via a network.Messaging server 200 includes amessaging controller component 210 that is configured to control the distribution of message communications for the messaging system provided by the messaging server. In the present exemplary embodiment,messaging controller 210 will be described with respect to message communications such as instant messaging. In alternative exemplary embodiments,messaging controller 210 may control other types of available electronic communications such as e-mail messaging or chat room messaging. - In the present exemplary embodiment,
messaging controller 210 distributes instant messaging communications between sender and recipient users of messaging client systems in a channel opened by the messaging controller for the messaging session. Communicating users are each represented by an identifier, such as a username, and a graphical avatar that is displayed to other users in a user interface provided by the messaging client application being operated by each user at that user's client system.Messaging controller 210 can be configured to distribute the identifier and the avatar of each user to other users engaged in communications sessions with that user. Message communications transferred between users as controlled bymessaging controller 210 can be stored in a transferredmessages database 220 for a specified period of time, and all the entries for a specific instant messaging session can be catalogued together within the messages database. -
Messaging server 200 also includes a user account controller component 230, a user account database 240, ausername analysis controller 250, and ananthroponomastic information database 260. User account controller 230 is configured to register user accounts for new users of the messaging system, to control authentication of registered users logging into the messaging system, and to maintain identifiers and other attributes for each user account in user account database 240. During registration of a particular user, user account controller 230 determines a username for the user and stores the username in user account database 240. The identifiers and other attributes maintained in user account database 240 for a particular user account can include the username or screen name, a password, the avatar representation, and other information about the particular user assigned the account. The other information about a particular user may include, for example, a personal profile, which may include information about the user's name, regional areas of origin, national language, company association, memberships, and personal characteristics. - In the present exemplary embodiment,
username analysis controller 250 is configured to perform an anthroponomastic analysis of the username or screen name of each newly registered user to determine a probable gender for the user and to assign a gender-based avatar representation for the user that will be displayed in the user interfaces of other users during instant messaging communications with the newly registered user. Anthroponymy is the study of the names of human beings. Thus, exemplary embodiments are particularly well-suited for use in situations where a new user specifies his or her full name or given name as his or her username. To perform analysis of usernames,username analysis controller 250 is configured to access dataanthroponomastic information database 260, which can store information such as, for example, an expansive list of names compiled from those used in many different cultures catalogued according to gender (that is, male, female, or unisex), a list of rules for associating a username not included in the list of names with a particular culture, and a list of rules derived from naming conventions that are employed in many different cultures catalogued culturally, linguistically, nationally, regionally, and/or according to other relevant anthroponomastic criteria. - When a new user registers with the messaging system,
username analysis controller 250 is configured to perform an anthroponomastic analysis of the new user's username to determine a probable gender for the user. Such an analysis can, for instance, first involve accessing the list of names inanthroponomastic information database 260 to attempt to find a match. If a match for the username is found in the list of names,username analysis controller 250 can assign the user with the gender associated with the name inanthroponomastic information database 260. The assigned gender can be male, female, or unisex. If no match is found in the list of names,username analysis controller 250 can be configured access the list of rules inanthroponomastic information database 260 to attempt to identify a particular culture with which the name is commonly associated (for example, many terms used for names may have characteristics that may be used to identify a cultural origin for the term) and the list of rules derived from naming conventions for the identified culture to attempt to determine a gender to assign to the name. A naming convention is a collection of rules followed by a set of names. Naming conventions can be used to deduce useful rules based on the character sequence of known names and knowledge of the rules followed in the known names. - For example, where the newly registered user's username is not found in the list of names in
anthroponomastic information database 260 but is identified using the list of cultural rules as being a Hindu name,username analysis controller 250 can use the list of rules derived from naming conventions for the Hindu culture stored in the anthroponomastic information database to attempt to associate a probable gender with the username. According to Hindu naming conventions, a first name that ends with the letter ‘i’ is more likely to be a female name. Thus, for a newly registered user having the username ‘Amodini’,username analysis controller 250 would assign that user with a probable gender of female. Similarly, where the newly registered user's username is not found in the list of names inanthroponomastic information database 260 but is identified as being a Chinese name,username analysis controller 250 can use the list of rules derived from naming conventions for the Chinese culture stored in the anthroponomastic information database to attempt to associate a gender with the username. According to Chinese naming conventions, the family name is placed before the given name, in reverse of the regular order of English names. Furthermore, according to Chinese naming conventions, given names resonant of qualities that are perceived to be either masculine or feminine are frequently given, with males being linked with strength and firmness, and females with beauty and flowers. Females also are commonly given names that repeat a character. Thus, for a newly registered user having a username of ‘Xiuxiu’ or ‘Lili’,username analysis controller 250 would assign that user with a probable gender of female. In certain situations,username analysis controller 250 may be unable to determine a probable gender for a username after accessing the list names, the list of cultural rules, and the list of rules derived from naming conventions, in which case the username analysis controller can assign a neutral gender to the user. - Based on the probable gender determined for the user,
username analysis controller 250 can then assign a gender-based avatar to the user based upon the determined gender. Thus, if the probable gender for the user's username is determined to be female, the user will be assigned with a female avatar. If the probable gender for the user's username is determined to be male, the user will be assigned with a male avatar. Finally, if the probable gender for the user's username is determined to be neutral (that is, either the name is unknown andname analysis controller 250 is unable to determine a probable gender based upon information in the list of cultural rules and the list of rules derived from naming conventions inanthroponomastic information database 260, or the name is a unisex one that is commonly given to both males and females, such as Pat, which may indicate a full name of Patrick or Patricia) the user will be assigned with generic, genderless human figure image as his or her avatar. Of course, some unisex names are homophones, pronounced the same for both genders but spelled differently. A common example of this is English names in which a final ‘y’ is used for the masculine form and a final ‘i’ or ‘ie’ is used for the feminine form (for example, the names Terry and Teri). In these situations,username analysis controller 250 can be configured to utilize naming conventions to assign a male or female gender-based avatar to a user specifying a unisex homophone as a username instead of a genderless avatar. After assigning an avatar representation to a particular user,username analysis controller 250 can be configured to direct user account controller 230 to store the avatar representation assigned to the user in the user profile data maintained for the user in user account database 240. - In exemplary embodiments, once
username analysis controller 250 has made a determination of a probable gender for a particular user and assigned a gender-based avatar or a neutral gender avatar to the user,messaging server 200 can be further configured to provide the user with the option of overriding the assigned avatar by selecting a different avatar representation. For example, whenusername analysis controller 250 has assigned a neutral gender avatar to a particular user,messaging server 200 can be further configured to provide an indication to the user of such assignment and provide the user with the option of selecting an appropriate gender-based avatar to replace the neutral gender avatar as the user's avatar representation in communication sessions within the messaging system. In another example, whenusername analysis controller 250 has assigned a gender-based (that is, male or female) avatar to a particular user,messaging server 200 can be further configured to provide an indication to the user of such assignment and provide the user with the option of selecting a neutral gender avatar to replace the gender-based avatar as the user's avatar representation if the particular user does not wish to so indicate his or her gender to other users in communication sessions within the messaging system. When a user has opted to override the assigned avatar by selecting a different avatar representation,username analysis controller 250 can be configured to direct user account controller 230 to store the avatar representation selected by the user, rather than the assigned avatar, in the user profile data maintained for the user in user account database 240. - Because each messaging system user's data is stored in user account database 240, when a first user accesses the messaging system,
messaging server 200 can retrieve the accessing user's profile data from the database and to provide the user's gender-based avatar representation in communications with other users accessing the messaging system. The first user's avatar then can be displayed in a window provided within the user interface of the messaging client application being used by other users engaged in a communications session with the first user. Thus, the user's gender-based avatar can be used to represent the user to other users in a communications session. In exemplary embodiments, the first user's avatar may also be displayed in a window or menu option that provides a “buddy”, colleague, or associate list, or other list of regular contacts, within the user interfaces of messaging client application being used by other users to provide an option for the other users to communicate with or check the status of the first user. - Referring now to
FIG. 3 , a samplemessaging session window 300 provided within a graphical user interface of a messaging client application being used to access a messaging system implementing an exemplary embodiment of the present invention is illustrated.Messaging session window 300 may be viewed by a first user of the messaging client application who is connected to the messaging system to engage in communications sessions with a second user connected to the messaging system.Messaging session window 300 includes a message composition area 310 for composing messages to be sent to the second user during the communications session and a message history text box 320 for displaying a transcript of the message communications session between the first and second users. Each of the messages sent to, or received from, the second user can be listed in chronological order in message history text box 320, with each listed message providing an indication of which user sent the message. -
Messaging session window 300 also includes a set of feature controls 330 and a “send”control button 340. Feature controls 330 can be accessed by the first user to control features such as message encryption, conversation logging, conversation forwarding to a different communications mode, font size and color control, and spell checking, among others. Sendcontrol button 340 can be accessed by the first user to trigger sending of a message typed into instant message composition area 310.Messaging session window 300 also includes a window menu 350 providing a set of client application controls that can be accessed by the first user, and a set of contact or “buddy” controls 360 that can be accessed by the user to maintain a list of messaging contacts, view which messaging contacts are available to communicate with using the messaging system, and switch from the current messaging session to another messaging session with another user in the first user's contact list. - In accordance with an exemplary embodiment of the present invention,
messaging session window 300 also includes acurrent contact area 370 that displays a representation of the second user with whom the first user is currently engaged in a messaging session. As illustrated, the representation includes a username 375 specified by the second user and a graphical image of a gender-based avatar 380 assigned by the messaging system to represent the second user in messaging communications. In samplemessaging session window 300, the username of the second user is “Amodini Visweswaran”, and the gender-based avatar assigned to the second user is an image of a female character. Gender-based avatar 380 is female in the current example because “Amondini” has been determined as having a probable gender of female by, for example, an anthroponomastic analysis component (such asusername analysis controller 250 of the exemplary embodiment described with reference toFIG. 2 ) implemented within the messaging system server. The display of gender-based avatar 380 incurrent contact area 370 enables the first user to determine the gender of the second user with whom the first user is communicating by perceiving the gender-based avatar being projected, rather than by assessing the username of the second user. Here, the gender-based avatar displayed is an avatar that only includes a graphical image of a face in a small square shaped area, which may be referred to as a facial avatar or a head avatar. Of course, in other exemplary embodiments, any other suitable type of avatar sufficient to convey gender may be displayed in an area of any suitable shape and size. For example, the gender-based avatar may include additional body parts. - As described herein, exemplary embodiments of the present invention can be utilized to aid electronic messaging application users in identifying the gender of other users with which they are communicating. Exemplary embodiments can thus enable electronic messaging application users to have a greater social presence in messaging communications and to communicate across different cultures more easily without offending other users. Exemplary embodiments can be particularly suitable, for example, for implementation within instant messaging applications being used by users as a business communications medium. By utilizing instant messaging, business users can view each other's availability and initiate a text conversation with colleagues or customers without the restrictions of time and space. Generally, when a user logs into an instant messaging application for the purpose of business communications, the username or screen name that identifies the account for the user to the user's contacts is that user's personal name (that is, the true proper name given to that individual at birth or otherwise legally identifying that individual). Thus, where two business contacts who have never met in person are engaged in an instant messaging session, each contact will be provided with an indication to the other contact's gender during the messaging session.
- Exemplary embodiments of the present invention can be realized in hardware, software, or a combination of hardware and software. Exemplary embodiments can be realized in a centralized fashion in one computer system or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system—or other apparatus adapted for carrying out the methods described herein—is suited. A typical combination of hardware and software could be a general-purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
- Exemplary embodiments of the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which—when loaded in a computer system—is able to carry out these methods. Computer program means or computer program as used in the present invention indicates any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or, notation; and b) reproduction in a different material form.
- A computer system in which exemplary embodiments can be implemented may include, inter alia, one or more computers and at least a computer program product on a computer readable medium, allowing a computer system to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium. The computer readable medium may include non-volatile memory, such as ROM, Flash memory, Disk drive memory, CD-ROM, and other permanent storage. Additionally, a computer readable medium may include, for example, volatile storage such as RAM, buffers, cache memory, and network circuits. Furthermore, the computer readable medium may comprise computer readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network that allows a computer system to read such computer readable information.
-
FIG. 4 is a block diagram of anexemplary computer system 400 that can be used for implementing exemplary embodiments of the present invention.Computer system 400 includes one or more processors, such asprocessor 404.Processor 404 is connected to a communication infrastructure 402 (for example, a communications bus, cross-over bar, or network). Various software embodiments are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person of ordinary skill in the relevant art(s) how to implement the invention using other computer systems and/or computer architectures. -
Exemplary computer system 400 can include a display interface 408 that forwards graphics, text, and other data from the communication infrastructure 402 (or from a frame buffer not shown) for display on adisplay unit 410.Computer system 400 also includes amain memory 406, which can be random access memory (RAM), and may also include asecondary memory 412.Secondary memory 412 may include, for example, a hard disk drive 414 and/or aremovable storage drive 416, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc.Removable storage drive 416 reads from and/or writes to a removable storage unit 418 in a manner well known to those having ordinary skill in the art. Removable storage unit 418, represents, for example, a floppy disk, magnetic tape, optical disk, etc. which is read by and written to byremovable storage drive 416. As will be appreciated, removable storage unit 418 includes a computer usable storage medium having stored therein computer software and/or data. - In exemplary embodiments,
secondary memory 412 may include other similar means for allowing computer programs or other instructions to be loaded into the computer system. Such means may include, for example, a removable storage unit 422 and an interface 420. Examples of such may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units 422 and interfaces 420 which allow software and data to be transferred from the removable storage unit 422 tocomputer system 400. -
Computer system 400 may also include a communications interface 424. Communications interface 424 allows software and data to be transferred between the computer system and external devices. Examples of communications interface 424 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via communications interface 424 are in the form of signals which may be, for example, electronic, electromagnetic, optical, or other signals capable of being received by communications interface 424. These signals are provided to communications interface 424 via a communications path (that is, channel) 426. Channel 426 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link, and/or other communications channels. - In this document, the terms “computer program medium,” “computer usable medium,” and “computer readable medium” are used to generally refer to media such as
main memory 406 andsecondary memory 412,removable storage drive 416, a hard disk installed in hard disk drive 414, and signals. These computer program products are means for providing software to the computer system. The computer readable medium allows the computer system to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium. The computer readable medium, for example, may include non-volatile memory, such as Floppy, ROM, Flash memory, Disk drive memory, CD-ROM, and other permanent storage. It can be used, for example, to transport information, such as data and computer instructions, between computer systems. Furthermore, the computer readable medium may comprise computer readable information in a transitory state medium such as a network link and/or a network interface, including a wired network or a wireless network that allows a computer system to read such computer readable information. - Computer programs (also called computer control logic) are stored in
main memory 406 and/orsecondary memory 412. Computer programs may also be received via communications interface 424. Such computer programs, when executed, can enable the computer system to perform the features of exemplary embodiments of the present invention as discussed herein. In particular, the computer programs, when executed, enableprocessor 404 to perform the features ofcomputer system 400. Accordingly, such computer programs represent controllers of the computer system. - Although exemplary embodiments of the present invention have been described in detail, it should be understood that various changes, substitutions and alternations could be made thereto without departing from spirit and scope of the inventions as defined by the appended claims. Variations described for exemplary embodiments of the present invention can be realized in any combination desirable for each particular application. Thus particular limitations, and/or embodiment enhancements described herein, which may have particular advantages to a particular application, need not be used for all applications. Also, not all limitations need be implemented in methods, systems, and/or apparatuses including one or more concepts described with relation to exemplary embodiments of the present invention.
- While exemplary embodiments of the present invention have been described, it will be understood that those skilled in the art, both now and in the future, may make various modifications without departing from the spirit and the scope of the present invention as set forth in the following claims. These following claims should be construed to maintain the proper protection for the present invention.
Claims (5)
1. A data processing system comprising:
a processor;
a random access memory for storing data and programs for execution by the processor; and
computer readable instructions stored in the random access memory for execution by the processor to perform a method for displaying gender-based avatar representations of users in instant messaging communications, the method comprising:
receiving a username for a first user having a first user account registered with an instant messaging system;
performing an anthroponomastic analysis of the username to assign a probable gender for the first user, the probable gender being selected from male, female, and neutral;
displaying a current contact area in a communication session window of a user interface provided by an instant messaging application on a client system operated by a second user having a second user account registered with the instant messaging system, the instant messaging application accessing the instant messaging system to allow the second user to participate in instant messaging communication via the user interface; and
displaying the username for the first user and a gender-based avatar representation indicative of the probable gender for the first user in the current contact area while the instant messaging application is accessing the instant messaging system to allow the second user to participate in instant messaging communication with the first user via the user interface.
2. The data processing system of claim 1 , wherein the instant messaging system includes an instant messaging server operatively coupled to a network, wherein the instant messaging system receives the username for the first user and performs the anthroponomastic analysis of the username to assign a probable gender for the first user, wherein the instant messaging application establishes a connection with the instant messaging server via the network to access the instant messaging system, and wherein the instant messaging server manages instant messaging communication between the first and second users.
3. The data processing system of claim 2 , wherein the method for displaying gender-based avatar representations of users in instant messaging communications further comprises transmitting the gender-based avatar representation for the first user to the client system operated by the second user via the network upon access of the instant messaging system by the instant messaging application to allow the second user to participate in instant messaging communication via the user interface, and displaying the username for the first user and the gender-based avatar representation indicative of the probable gender for the first user in a buddy list area in the communication session window of the user interface provided by the instant messaging application on the client system operated by the second user, the buddy list area including a list of users having accounts registered with the instant messaging system specified by the second user and permitting the second user to select any user of the list of users to attempt to establish instant messaging communication with the selected user via the user interface.
4. The data processing system of claim 2 , wherein the method for displaying gender-based avatar representations of users in instant messaging communications further comprises accessing a first database maintained by the instant messaging server to perform the anthroponomastic analysis of the username to attempt to assign a probable gender for the first user, assigning the probable gender for the first user as neutral if the anthroponomastic analysis of the username is not able to assign the probable gender as either male or female by accessing the first database, storing the gender-based avatar representation indicative of the probable gender for the first user in a second database maintained by the instant messaging server for storing user account information, and transmitting the gender-based avatar representation for the first user to the client system operated by the second user via the network upon access of the instant messaging system by the instant messaging application to allow the second user to participate in instant messaging communication with the first user via the user interface, and wherein the first database storing a list of names selected from a plurality of cultures, a gender associated with each name of the list of names, a list of anthroponomastic rules for attempting to associate usernames that are not included in the list of names with a particular culture, and a plurality of sets of naming rules, each set of naming rules being derived from naming conventions employed in a corresponding culture of the plurality of cultures.
5. The data processing system of claim 1 , wherein the method for displaying gender-based avatar representations of users in instant messaging communications further comprises displaying the gender-based avatar representation indicative of the probable gender for the first user via the user interface provided by the instant messaging application on a client system operated by the first user, providing the first user with an option to select a different gender for the gender-based avatar representation indicative of the probable gender for the first user account via the user interface provided by the instant messaging application on the client system operated by the first user, and replacing the gender-based avatar representation indicative of the probable gender for the first user in the second database with a gender-based avatar representation indicative of the different gender if selected by the first user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/183,732 US20090222526A1 (en) | 2008-02-28 | 2008-07-31 | Using gender analysis of names to assign avatars in instant messaging applications |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/038,954 US7447996B1 (en) | 2008-02-28 | 2008-02-28 | System for using gender analysis of names to assign avatars in instant messaging applications |
US12/183,732 US20090222526A1 (en) | 2008-02-28 | 2008-07-31 | Using gender analysis of names to assign avatars in instant messaging applications |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/038,954 Continuation US7447996B1 (en) | 2008-02-28 | 2008-02-28 | System for using gender analysis of names to assign avatars in instant messaging applications |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090222526A1 true US20090222526A1 (en) | 2009-09-03 |
Family
ID=39916598
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/038,954 Active US7447996B1 (en) | 2008-02-28 | 2008-02-28 | System for using gender analysis of names to assign avatars in instant messaging applications |
US12/183,543 Abandoned US20090222255A1 (en) | 2008-02-28 | 2008-07-31 | Using gender analysis of names to assign avatars in instant messaging applications |
US12/183,732 Abandoned US20090222526A1 (en) | 2008-02-28 | 2008-07-31 | Using gender analysis of names to assign avatars in instant messaging applications |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/038,954 Active US7447996B1 (en) | 2008-02-28 | 2008-02-28 | System for using gender analysis of names to assign avatars in instant messaging applications |
US12/183,543 Abandoned US20090222255A1 (en) | 2008-02-28 | 2008-07-31 | Using gender analysis of names to assign avatars in instant messaging applications |
Country Status (1)
Country | Link |
---|---|
US (3) | US7447996B1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110307260A1 (en) * | 2010-06-11 | 2011-12-15 | Zhengyou Zhang | Multi-modal gender recognition |
US20180337918A1 (en) * | 2017-05-16 | 2018-11-22 | Apple Inc. | Business messaging interface |
US10547525B2 (en) * | 2011-10-14 | 2020-01-28 | Mimecast Services Ltd. | Determining events by analyzing stored electronic communications |
WO2021257616A1 (en) * | 2020-06-15 | 2021-12-23 | Snap Inc. | Location sharing using different rate-limited links |
US11290851B2 (en) | 2020-06-15 | 2022-03-29 | Snap Inc. | Location sharing using offline and online objects |
US11314776B2 (en) | 2020-06-15 | 2022-04-26 | Snap Inc. | Location sharing using friend list versions |
US11503432B2 (en) | 2020-06-15 | 2022-11-15 | Snap Inc. | Scalable real-time location sharing framework |
Families Citing this family (81)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8726195B2 (en) * | 2006-09-05 | 2014-05-13 | Aol Inc. | Enabling an IM user to navigate a virtual world |
KR101079592B1 (en) * | 2006-11-03 | 2011-11-04 | 삼성전자주식회사 | Display apparatus and information update method thereof |
JP2008191748A (en) * | 2007-02-01 | 2008-08-21 | Oki Electric Ind Co Ltd | Inter-user communication method, inter-user communication program and inter-user communication device |
US8127235B2 (en) | 2007-11-30 | 2012-02-28 | International Business Machines Corporation | Automatic increasing of capacity of a virtual space in a virtual world |
US20090164919A1 (en) | 2007-12-24 | 2009-06-25 | Cary Lee Bates | Generating data for managing encounters in a virtual world environment |
JP5159375B2 (en) | 2008-03-07 | 2013-03-06 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Object authenticity determination system and method in metaverse, and computer program thereof |
US8875026B2 (en) * | 2008-05-01 | 2014-10-28 | International Business Machines Corporation | Directed communication in a virtual environment |
US20110025689A1 (en) * | 2009-07-29 | 2011-02-03 | Microsoft Corporation | Auto-Generating A Visual Representation |
US9236965B2 (en) * | 2009-12-07 | 2016-01-12 | Verizon Patent And Licensing Inc. | Television interaction information and related iconography |
US9205328B2 (en) | 2010-02-18 | 2015-12-08 | Activision Publishing, Inc. | Videogame system and method that enables characters to earn virtual fans by completing secondary objectives |
US9682324B2 (en) | 2010-05-12 | 2017-06-20 | Activision Publishing, Inc. | System and method for enabling players to participate in asynchronous, competitive challenges |
JP5134653B2 (en) * | 2010-07-08 | 2013-01-30 | 株式会社バンダイナムコゲームス | Program and user terminal |
KR20120012243A (en) * | 2010-07-30 | 2012-02-09 | 삼성전자주식회사 | Apparatus and method for generating call transmission screen using collage technique |
US8744860B2 (en) | 2010-08-02 | 2014-06-03 | At&T Intellectual Property I, L.P. | Apparatus and method for providing messages in a social network |
JP5812505B2 (en) * | 2011-04-13 | 2015-11-17 | タタ コンサルタンシー サービシズ リミテッドTATA Consultancy Services Limited | Demographic analysis method and system based on multimodal information |
CN102215302B (en) * | 2011-05-28 | 2013-12-18 | 华为技术有限公司 | Contact photo providing method, management platform and user terminal |
US20140136987A1 (en) * | 2012-11-09 | 2014-05-15 | Apple Inc. | Generation of a user interface based on contacts |
US10137376B2 (en) | 2012-12-31 | 2018-11-27 | Activision Publishing, Inc. | System and method for creating and streaming augmented game sessions |
JP6205757B2 (en) * | 2013-03-07 | 2017-10-04 | オムロン株式会社 | Control system, control apparatus, image processing apparatus, and control method |
USD747733S1 (en) * | 2013-08-30 | 2016-01-19 | SkyBell Technologies, Inc. | Display screen or portion thereof with a graphical user interface |
US10444938B1 (en) * | 2014-02-26 | 2019-10-15 | Symantec Corporation | Systems and methods for customizing user icons |
USD762688S1 (en) | 2014-05-16 | 2016-08-02 | SkyBell Technologies, Inc. | Display screen or a portion thereof with a graphical user interface |
US9789406B2 (en) | 2014-07-03 | 2017-10-17 | Activision Publishing, Inc. | System and method for driving microtransactions in multiplayer video games |
US11351466B2 (en) | 2014-12-05 | 2022-06-07 | Activision Publishing, Ing. | System and method for customizing a replay of one or more game events in a video game |
US10118099B2 (en) | 2014-12-16 | 2018-11-06 | Activision Publishing, Inc. | System and method for transparently styling non-player characters in a multiplayer video game |
USD760738S1 (en) | 2015-01-15 | 2016-07-05 | SkyBell Technologies, Inc. | Display screen or a portion thereof with a graphical user interface |
USD759702S1 (en) | 2015-01-15 | 2016-06-21 | SkyBell Technologies, Inc. | Display screen or a portion thereof with a graphical user interface |
US10486068B2 (en) | 2015-05-14 | 2019-11-26 | Activision Publishing, Inc. | System and method for providing dynamically variable maps in a video game |
US10315113B2 (en) | 2015-05-14 | 2019-06-11 | Activision Publishing, Inc. | System and method for simulating gameplay of nonplayer characters distributed across networked end user devices |
US10286314B2 (en) | 2015-05-14 | 2019-05-14 | Activision Publishing, Inc. | System and method for providing continuous gameplay in a multiplayer video game through an unbounded gameplay session |
US10086266B2 (en) | 2015-06-15 | 2018-10-02 | Activision Publishing, Inc. | System and method for uniquely identifying physical trading cards and incorporating trading card game items in a video game |
US10471348B2 (en) | 2015-07-24 | 2019-11-12 | Activision Publishing, Inc. | System and method for creating and sharing customized video game weapon configurations in multiplayer video games via one or more social networks |
US11185784B2 (en) | 2015-10-08 | 2021-11-30 | Activision Publishing, Inc. | System and method for generating personalized messaging campaigns for video game players |
US10099140B2 (en) | 2015-10-08 | 2018-10-16 | Activision Publishing, Inc. | System and method for generating personalized messaging campaigns for video game players |
US10376781B2 (en) | 2015-10-21 | 2019-08-13 | Activision Publishing, Inc. | System and method of generating and distributing video game streams |
US10245509B2 (en) | 2015-10-21 | 2019-04-02 | Activision Publishing, Inc. | System and method of inferring user interest in different aspects of video game streams |
US10232272B2 (en) | 2015-10-21 | 2019-03-19 | Activision Publishing, Inc. | System and method for replaying video game streams |
US10694352B2 (en) | 2015-10-28 | 2020-06-23 | Activision Publishing, Inc. | System and method of using physical objects to control software access |
US10226703B2 (en) | 2016-04-01 | 2019-03-12 | Activision Publishing, Inc. | System and method of generating and providing interactive annotation items based on triggering events in a video game |
US10226701B2 (en) | 2016-04-29 | 2019-03-12 | Activision Publishing, Inc. | System and method for identifying spawn locations in a video game |
US10179289B2 (en) | 2016-06-21 | 2019-01-15 | Activision Publishing, Inc. | System and method for reading graphically-encoded identifiers from physical trading cards through image-based template matching |
US10573065B2 (en) | 2016-07-29 | 2020-02-25 | Activision Publishing, Inc. | Systems and methods for automating the personalization of blendshape rigs based on performance capture data |
US10709981B2 (en) | 2016-11-17 | 2020-07-14 | Activision Publishing, Inc. | Systems and methods for the real-time generation of in-game, locally accessible barrier-aware heatmaps |
US10463964B2 (en) | 2016-11-17 | 2019-11-05 | Activision Publishing, Inc. | Systems and methods for the real-time generation of in-game, locally accessible heatmaps |
US10500498B2 (en) | 2016-11-29 | 2019-12-10 | Activision Publishing, Inc. | System and method for optimizing virtual games |
US10055880B2 (en) | 2016-12-06 | 2018-08-21 | Activision Publishing, Inc. | Methods and systems to modify a two dimensional facial image to increase dimensional depth and generate a facial image that appears three dimensional |
US10861079B2 (en) | 2017-02-23 | 2020-12-08 | Activision Publishing, Inc. | Flexible online pre-ordering system for media |
US10818060B2 (en) | 2017-09-05 | 2020-10-27 | Activision Publishing, Inc. | Systems and methods for guiding motion capture actors using a motion reference system |
US11040286B2 (en) | 2017-09-27 | 2021-06-22 | Activision Publishing, Inc. | Methods and systems for improved content generation in multiplayer gaming environments |
US10561945B2 (en) | 2017-09-27 | 2020-02-18 | Activision Publishing, Inc. | Methods and systems for incentivizing team cooperation in multiplayer gaming environments |
US10974150B2 (en) | 2017-09-27 | 2021-04-13 | Activision Publishing, Inc. | Methods and systems for improved content customization in multiplayer gaming environments |
US10537809B2 (en) | 2017-12-06 | 2020-01-21 | Activision Publishing, Inc. | System and method for validating video gaming data |
US10463971B2 (en) | 2017-12-06 | 2019-11-05 | Activision Publishing, Inc. | System and method for validating video gaming data |
US10981051B2 (en) | 2017-12-19 | 2021-04-20 | Activision Publishing, Inc. | Synchronized, fully programmable game controllers |
US10864443B2 (en) | 2017-12-22 | 2020-12-15 | Activision Publishing, Inc. | Video game content aggregation, normalization, and publication systems and methods |
US11278813B2 (en) | 2017-12-22 | 2022-03-22 | Activision Publishing, Inc. | Systems and methods for enabling audience participation in bonus game play sessions |
US10596471B2 (en) | 2017-12-22 | 2020-03-24 | Activision Publishing, Inc. | Systems and methods for enabling audience participation in multi-player video game play sessions |
US11263670B2 (en) | 2018-11-19 | 2022-03-01 | Activision Publishing, Inc. | Systems and methods for dynamically modifying video game content based on non-video gaming content being concurrently experienced by a user |
US11192028B2 (en) | 2018-11-19 | 2021-12-07 | Activision Publishing, Inc. | Systems and methods for the real-time customization of video game content based on player data |
US20200196011A1 (en) | 2018-12-15 | 2020-06-18 | Activision Publishing, Inc. | Systems and Methods for Receiving Digital Media and Classifying, Labeling and Searching Offensive Content Within Digital Media |
US11679330B2 (en) | 2018-12-18 | 2023-06-20 | Activision Publishing, Inc. | Systems and methods for generating improved non-player characters |
US11305191B2 (en) | 2018-12-20 | 2022-04-19 | Activision Publishing, Inc. | Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay |
US11344808B2 (en) | 2019-06-28 | 2022-05-31 | Activision Publishing, Inc. | Systems and methods for dynamically generating and modulating music based on gaming events, player profiles and/or player reactions |
US11097193B2 (en) | 2019-09-11 | 2021-08-24 | Activision Publishing, Inc. | Methods and systems for increasing player engagement in multiplayer gaming environments |
US11423605B2 (en) | 2019-11-01 | 2022-08-23 | Activision Publishing, Inc. | Systems and methods for remastering a game space while maintaining the underlying game simulation |
US11712627B2 (en) | 2019-11-08 | 2023-08-01 | Activision Publishing, Inc. | System and method for providing conditional access to virtual gaming items |
US11537209B2 (en) | 2019-12-17 | 2022-12-27 | Activision Publishing, Inc. | Systems and methods for guiding actors using a motion capture reference system |
US11420122B2 (en) | 2019-12-23 | 2022-08-23 | Activision Publishing, Inc. | Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay |
US11563774B2 (en) | 2019-12-27 | 2023-01-24 | Activision Publishing, Inc. | Systems and methods for tracking and identifying phishing website authors |
CN111652432A (en) * | 2020-06-01 | 2020-09-11 | 北京达佳互联信息技术有限公司 | Method and device for determining user attribute information, electronic equipment and storage medium |
US11524234B2 (en) | 2020-08-18 | 2022-12-13 | Activision Publishing, Inc. | Multiplayer video games with virtual characters having dynamically modified fields of view |
US11351459B2 (en) | 2020-08-18 | 2022-06-07 | Activision Publishing, Inc. | Multiplayer video games with virtual characters having dynamically generated attribute profiles unconstrained by predefined discrete values |
US11833423B2 (en) | 2020-09-29 | 2023-12-05 | Activision Publishing, Inc. | Methods and systems for generating level of detail visual assets in a video game |
US11717753B2 (en) | 2020-09-29 | 2023-08-08 | Activision Publishing, Inc. | Methods and systems for generating modified level of detail visual assets in a video game |
US11724188B2 (en) | 2020-09-29 | 2023-08-15 | Activision Publishing, Inc. | Methods and systems for selecting a level of detail visual asset during the execution of a video game |
US11439904B2 (en) | 2020-11-11 | 2022-09-13 | Activision Publishing, Inc. | Systems and methods for imparting dynamic and realistic movement to player-controlled avatars in video games |
US12179113B2 (en) | 2020-12-09 | 2024-12-31 | Activision Publishing, Inc. | Methods and systems for dynamically selecting and modifying digital assets within game elements of a multiplayer video game |
US12097430B2 (en) | 2020-12-28 | 2024-09-24 | Activision Publishing, Inc. | Methods and systems for generating and managing active objects in video games |
US11794107B2 (en) | 2020-12-30 | 2023-10-24 | Activision Publishing, Inc. | Systems and methods for improved collision detection in video games |
US12064688B2 (en) | 2020-12-30 | 2024-08-20 | Activision Publishing, Inc. | Methods and systems for determining decal projections intersecting spatial units in a frame of a game space |
US11853439B2 (en) | 2020-12-30 | 2023-12-26 | Activision Publishing, Inc. | Distributed data storage system providing enhanced security |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6963871B1 (en) * | 1998-03-25 | 2005-11-08 | Language Analysis Systems, Inc. | System and method for adaptive multi-cultural searching and matching of personal names |
US20070113181A1 (en) * | 2003-03-03 | 2007-05-17 | Blattner Patrick D | Using avatars to communicate real-time information |
US20070136745A1 (en) * | 2005-12-08 | 2007-06-14 | International Business Machines Corporation | Brokering of personalized rulesets for use in digital media character replacement |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5548507A (en) * | 1994-03-14 | 1996-08-20 | International Business Machines Corporation | Language identification process using coded language words |
JP3799134B2 (en) * | 1997-05-28 | 2006-07-19 | ソニー株式会社 | System and notification method |
JPH11213179A (en) * | 1998-01-23 | 1999-08-06 | Sony Corp | Device, method for providing shared virtual space and providing medium |
JP4266411B2 (en) * | 1998-10-19 | 2009-05-20 | キヤノン株式会社 | Information processing apparatus and control method therefor, information transmission system, and storage medium |
US6549883B2 (en) * | 1999-11-02 | 2003-04-15 | Nortel Networks Limited | Method and apparatus for generating multilingual transcription groups |
JP2001154966A (en) * | 1999-11-29 | 2001-06-08 | Sony Corp | System and method for supporting virtual conversation being participation possible by users in shared virtual space constructed and provided on computer network and medium storing program |
US6453294B1 (en) * | 2000-05-31 | 2002-09-17 | International Business Machines Corporation | Dynamic destination-determined multimedia avatars for interactive on-line communications |
US8302127B2 (en) * | 2000-09-25 | 2012-10-30 | Thomson Licensing | System and method for personalized TV |
US20020147766A1 (en) * | 2001-04-04 | 2002-10-10 | Marko Vanska | Operating user profiles with distributed profile model using a hybrid terminal |
US7333507B2 (en) * | 2001-08-31 | 2008-02-19 | Philip Bravin | Multi modal communications system |
US20030101227A1 (en) * | 2001-11-28 | 2003-05-29 | Fink Alan Walter | Message collaborator |
US20040002850A1 (en) * | 2002-03-14 | 2004-01-01 | Shaefer Leonard Arthur | System and method for formulating reasonable spelling variations of a proper name |
JP2003330490A (en) * | 2002-05-15 | 2003-11-19 | Fujitsu Ltd | Spoken dialogue device |
GB0220748D0 (en) * | 2002-09-06 | 2002-10-16 | Saw You Com Ltd | Improved communication using avatars |
US20040179037A1 (en) * | 2003-03-03 | 2004-09-16 | Blattner Patrick D. | Using avatars to communicate context out-of-band |
GB0306875D0 (en) * | 2003-03-25 | 2003-04-30 | British Telecomm | Apparatus and method for generating behavior in an object |
US7707520B2 (en) * | 2004-01-30 | 2010-04-27 | Yahoo! Inc. | Method and apparatus for providing flash-based avatars |
FR2867584B1 (en) * | 2004-03-10 | 2006-06-09 | Weborama | METHOD FOR DETERMINING A PROFILE OF A USER OF A COMMUNICATION NETWORK |
US7409384B2 (en) * | 2004-04-19 | 2008-08-05 | Yahoo! Inc. | Integration of instant messaging with internet searching |
US20060020904A1 (en) * | 2004-07-09 | 2006-01-26 | Antti Aaltonen | Stripe user interface |
US7342587B2 (en) * | 2004-10-12 | 2008-03-11 | Imvu, Inc. | Computer-implemented system and method for home page customization and e-commerce support |
US7621813B2 (en) * | 2004-12-07 | 2009-11-24 | Microsoft Corporation | Ubiquitous unified player tracking system |
US20070112624A1 (en) * | 2005-11-15 | 2007-05-17 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Use of patron profiles in virtual world environment |
US20070130001A1 (en) * | 2005-11-18 | 2007-06-07 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Real-world profile data for making virtual world contacts |
US20070101281A1 (en) * | 2005-10-31 | 2007-05-03 | Nate Simpson | Method and system for an electronic pictorial communication mechanism |
US20070124721A1 (en) * | 2005-11-15 | 2007-05-31 | Enpresence, Inc. | Proximity-aware virtual agents for use with wireless mobile devices |
US8047915B2 (en) * | 2006-01-11 | 2011-11-01 | Lyle Corporate Development, Inc. | Character for computer game and method |
US20070214106A1 (en) | 2006-03-10 | 2007-09-13 | Johnston Julia K | Iconographic-based attribute mapping system and method |
US9931571B2 (en) * | 2006-03-17 | 2018-04-03 | Nintendo Co., Ltd. | Systems, methods and techniques for safely and effectively coordinating video game play and other activities among multiple remote networked friends and rivals |
US20080104225A1 (en) * | 2006-11-01 | 2008-05-01 | Microsoft Corporation | Visualization application for mining of social networks |
GB0703974D0 (en) * | 2007-03-01 | 2007-04-11 | Sony Comp Entertainment Europe | Entertainment device |
US8156064B2 (en) * | 2007-07-05 | 2012-04-10 | Brown Stephen J | Observation-based user profiling and profile matching |
-
2008
- 2008-02-28 US US12/038,954 patent/US7447996B1/en active Active
- 2008-07-31 US US12/183,543 patent/US20090222255A1/en not_active Abandoned
- 2008-07-31 US US12/183,732 patent/US20090222526A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6963871B1 (en) * | 1998-03-25 | 2005-11-08 | Language Analysis Systems, Inc. | System and method for adaptive multi-cultural searching and matching of personal names |
US20070113181A1 (en) * | 2003-03-03 | 2007-05-17 | Blattner Patrick D | Using avatars to communicate real-time information |
US20070136745A1 (en) * | 2005-12-08 | 2007-06-14 | International Business Machines Corporation | Brokering of personalized rulesets for use in digital media character replacement |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110307260A1 (en) * | 2010-06-11 | 2011-12-15 | Zhengyou Zhang | Multi-modal gender recognition |
US8675981B2 (en) * | 2010-06-11 | 2014-03-18 | Microsoft Corporation | Multi-modal gender recognition including depth data |
US10547525B2 (en) * | 2011-10-14 | 2020-01-28 | Mimecast Services Ltd. | Determining events by analyzing stored electronic communications |
US20180337918A1 (en) * | 2017-05-16 | 2018-11-22 | Apple Inc. | Business messaging interface |
US10893036B2 (en) * | 2017-05-16 | 2021-01-12 | Apple Inc. | Business messaging interface |
WO2021257616A1 (en) * | 2020-06-15 | 2021-12-23 | Snap Inc. | Location sharing using different rate-limited links |
US11290851B2 (en) | 2020-06-15 | 2022-03-29 | Snap Inc. | Location sharing using offline and online objects |
US11314776B2 (en) | 2020-06-15 | 2022-04-26 | Snap Inc. | Location sharing using friend list versions |
US11483267B2 (en) | 2020-06-15 | 2022-10-25 | Snap Inc. | Location sharing using different rate-limited links |
US11503432B2 (en) | 2020-06-15 | 2022-11-15 | Snap Inc. | Scalable real-time location sharing framework |
Also Published As
Publication number | Publication date |
---|---|
US7447996B1 (en) | 2008-11-04 |
US20090222255A1 (en) | 2009-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7447996B1 (en) | System for using gender analysis of names to assign avatars in instant messaging applications | |
US8332761B2 (en) | Multiple profiles for a user in a synchronous conferencing environment | |
US7383310B1 (en) | Method allowing participant in a chat session to use either private tag or public tag to manage chat histories | |
US7577711B2 (en) | Chat room communication network implementation enabling senders to restrict the display of messages to the chat room chronological displays of only designated recipients | |
CN101159706B (en) | Method and system for controlling active and passive participation in a conversation thread | |
US20070124387A1 (en) | Previous communication updating in instant messaging | |
CN103269305B (en) | Method and system for issuing group exchange of information | |
US10887259B2 (en) | Communication management system | |
CN102138156A (en) | Persisting a group in an instant messaging application | |
CN103269310B (en) | The dissemination method and system of group's exchange of information | |
CN106850403A (en) | A kind of method of user terminal and operation user terminal | |
US11625542B2 (en) | Instant messaging application configuration based on virtual world activities | |
CN103532828B (en) | A kind of rich text format of the XMPP based on extension realizes system and method | |
TW200404437A (en) | Annotating and routing message content | |
SG183552A1 (en) | Method and apparatus for exchanging information between service platforms | |
CN103269308A (en) | A method and system for publishing communication group communication information | |
US7853659B2 (en) | Method for presenting personalized, voice printed messages from online digital devices to hosted services | |
WO2019023974A1 (en) | Communication control apparatus and method for multi-topic dialogue, and computer processing device | |
US8171416B2 (en) | Confirmation system and method for instant messaging | |
Al-Dosri et al. | Arabic sign language easy communicate ArSLEC | |
JP5111301B2 (en) | IM-linked comment system | |
WO2003036466A1 (en) | Information transmission over a computer network based on reciprocity rules | |
US7970836B1 (en) | Method and apparatus for parental control of electronic messaging contacts for a child | |
KR20050027397A (en) | Messaging method and system for icon chaatting | |
JP2002073514A (en) | Method of exchanging information while utilizing communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |
|
AS | Assignment |
Owner name: ACTIVISION PUBLISHING, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:029900/0285 Effective date: 20121231 |