US-12625991-B2 - Virtual barrier in metaverse
Abstract
A system, method, and computer program product are configured to: create a secure space in a metaverse, the secure space comprising a virtual barrier; create an allow list data structure comprising a list of avatars allowed to enter the secure space; detect an avatar attempting to enter the secure space comprising detecting a virtual collision between the avatar and the virtual barrier; determine whether the avatar is on the list of avatars by checking the allow list data structure; and in response to the avatar being on the list of avatars, granting the avatar access to the secure space.
Inventors
- Charan Acharya Chandrashekar
Assignees
- INTERNATIONAL BUSINESS MACHINES CORPORATION
Dates
- Publication Date
- 20260512
- Application Date
- 20231130
Claims (20)
- 1 . A computer-implemented method, comprising: creating, by a processor set, a user-defined secure space in a metaverse based on an input from a multidimensional virtual marker by a user, the secure space comprising a virtual barrier; creating, by the processor set, an allow list data structure comprising a list of avatars allowed to enter the secure space, wherein each avatar is assigned a virtual identification during a user registration process that requires real-world identification from the user; detecting, by the processor set, an avatar attempting to enter the secure space comprising detecting a virtual collision between the avatar and the virtual barrier; determining, by the processor set, whether the avatar is on the list of avatars by searching the allow list data structure for the virtual identification of the avatar; and in response to the virtual identification of the avatar being on the allow list data structure, granting, by the processor set, the avatar access to the secure space.
- 2 . The computer-implemented method of claim 1 , further comprising verifying ownership of the secure space.
- 3 . The computer-implemented method of claim 1 , further comprising creating at least one additional secure space within the secure space based on user input.
- 4 . The computer-implemented method of claim 3 , wherein the at least one additional secure space is associated with an additional allow list data structure comprising an additional list of avatars allowed to the at least one additional secure space.
- 5 . The computer-implemented method of claim 1 , wherein detecting the avatar attempting to enter the secure space comprises detecting a virtual collision between the avatar and the virtual barrier via computational geometry at the time of the virtual collision.
- 6 . The computer-implemented method of claim 1 , further comprising setting an entry bit in the allow list data structure corresponding to the avatar in response to the avatar being granted access to the secure space.
- 7 . The computer-implemented method of claim 6 , further comprising unsetting the entry bit in the allow list data structure corresponding to the avatar in response to the avatar exiting the secure space.
- 8 . The computer-implemented method of claim 1 , wherein the allow list data structure further comprises an access time limit corresponding to each avatar.
- 9 . The computer-implemented method of claim 8 , further comprising moving the avatar out of the secure space in response to the access time limit expiring corresponding to the avatar.
- 10 . A computer program product comprising one or more computer readable storage media having program instructions collectively stored on the one or more computer readable storage media, the program instructions executable to: create a user-defined secure space in a metaverse based on an input from a multidimensional virtual marker by a user, the secure space comprising a virtual barrier; create an allow list data structure comprising a list of avatars allowed to enter the secure space, wherein each avatar is assigned a virtual identification during a user registration process that requires real-world identification from the user; detect an avatar attempting to enter the secure space comprising detecting a virtual collision between the avatar and the virtual barrier; determine whether the avatar is on the list of avatars by searching the allow list data structure for the virtual identification of the avatar; and in response to the virtual identification of the avatar being on the allow list data structure, grant the avatar access to the secure space.
- 11 . The computer program product of claim 10 , wherein the program instructions are executable to: verify ownership of the secure space; and analyze entry and exit data associated with the secure space for barrier effectiveness, tracking permitted access through barriers, and unpermitted attempts to access certain barriers.
- 12 . The computer program product of claim 10 , wherein the program instructions are executable to: create at least one additional secure space within the secure space based on user input.
- 13 . The computer program product of claim 12 , wherein the at least one additional secure space is associated with an additional allow list data structure comprising an additional list of avatars allowed to the at least one additional secure space.
- 14 . The computer program product of claim 10 , wherein detecting an avatar attempting to enter the secure space comprises detecting a virtual collision between the avatar and the virtual barrier via computational geometry at the time of the virtual collision.
- 15 . The computer program product of claim 10 , wherein the program instructions are executable to: set an entry bit in the allow list data structure corresponding to the avatar in response to the avatar being granted access to the secure space.
- 16 . The computer program product of claim 15 , wherein the program instructions are executable to: unset the entry bit in the allow list data structure corresponding to the avatar in response to the avatar exiting the secure space.
- 17 . The computer program product of claim 10 , wherein the allow list data structure further comprises an access time limit corresponding to each avatar.
- 18 . The computer program product of claim 17 , wherein the program instructions are executable to: move the avatar out of the secure space and remove the avatar from the allow list data structure in response to the access time limit expiring corresponding to the avatar.
- 19 . A system comprising: a processor set, one or more computer readable storage media, and program instructions collectively stored on the one or more computer readable storage media, the program instructions executable to: create a user-defined secure space in a metaverse based on an input from a multidimensional virtual marker by a user, the input comprising the user moving the multidimensional virtual marker in the metaverse utilizing a controller or hand-gesture in the real-world to draw a two-dimensional or three-dimensional barrier that defines the secure space in the metaverse, the secure space comprising a virtual barrier; create an allow list data structure comprising a list of avatars allowed to enter the secure space, wherein each avatar is assigned a virtual identification during a user registration process that requires real-world identification from the user; detect an avatar attempting to enter the secure space comprising detecting a virtual collision between the avatar and the virtual barrier; determine whether the avatar is on the list of avatars by searching the allow list data structure for the virtual identification of the avatar; and in response to the virtual identification of the avatar being on the allow list data structure, granting the avatar access to the secure space.
- 20 . The system of claim 19 , wherein the secure space is user-defined.
Description
BACKGROUND Aspects of the present invention relate generally to virtual barriers in a metaverse and, more particularly, to methods, computer programs, and systems for creating barriers for a restricted area in the metaverse and selectively allowing avatars to enter the restricted area. A metaverse is a virtual immersive environment (virtual world) that spans the virtual and physical world. In a metaverse, an individual can create or select a persona (also known as an avatar) that represents the individual in the metaverse. This avatar provides a transition of individual from the real world to the metaverse. The presence of the individual in the metaverse is mapped in the metaverse through his/her avatar which interacts with other entities of the virtual world from shopping, to travelling, to attending events, to visiting friends. SUMMARY In a first aspect of the invention, there is a computer-implemented method including: creating, by a processor set, a secure space in a metaverse, the secure space comprising a virtual barrier; creating, by the processor set, an allow list data structure comprising a list of avatars allowed to enter the secure space; detecting, by the processor set, an avatar attempting to enter the secure space comprising detecting a virtual collision between the avatar and the virtual barrier; determining, by the processor set, whether the avatar is on the list of avatars by checking the allow list data structure; and in response to the avatar being on the list of avatars, granting, by the processor set, the avatar access to the secure space. In another aspect of the invention, there is a computer program product including one or more computer readable storage media having program instructions collectively stored on the one or more computer readable storage media. The program instructions are executable to: create a secure space in a metaverse, the secure space comprising a virtual barrier; create an allow list data structure comprising a list of avatars allowed to enter the secure space; detect an avatar attempting to enter the secure space comprising detecting a virtual collision between the avatar and the virtual barrier; determine whether the avatar is on the list of avatars by checking the allow list data structure; and in response to the avatar being on the list of avatars, granting the avatar access to the secure space. In another aspect of the invention, there is a system including a processor set, one or more computer readable storage media, and program instructions collectively stored on the one or more computer readable storage media. The program instructions are executable to: create a secure space in a metaverse, the secure space comprising a virtual barrier; create an allow list data structure comprising a list of avatars allowed to enter the secure space; detect an avatar attempting to enter the secure space comprising detecting a virtual collision between the avatar and the virtual barrier; determine whether the avatar is on the list of avatars by checking the allow list data structure; and in response to the avatar being on the list of avatars, granting the avatar access to the secure space. BRIEF DESCRIPTION OF THE DRAWINGS Aspects of the present invention are described in the detailed description which follows, in reference to the noted plurality of drawings by way of non-limiting examples of exemplary embodiments of the present invention. FIG. 1 depicts a computing environment according to an embodiment of the present invention. FIG. 2 shows a block diagram of an exemplary environment in accordance with aspects of the present invention. FIG. 3 shows a flowchart of an exemplary operation of the barrier creation module in accordance with aspects of the present invention. FIG. 4 shows a schematic of an exclusive event on a metaverse in accordance with aspects of the present invention. FIG. 5 shows a flowchart of an exemplary operation of the access control module to control entry into the secure space in accordance with aspects of the present invention. FIG. 6 shows a flowchart of an exemplary operation of the access control module to remove avatars in accordance with aspects of the present invention. FIG. 7 shows a flowchart of an exemplary method in accordance with aspects of the present invention. DETAILED DESCRIPTION Aspects of the present invention relate generally to virtual barriers in a metaverse and, more particularly, to methods, computer programs, and systems for creating barriers for a restricted area in the metaverse and controlling access to the restricted area by selectively allowing avatars to enter the restricted area. A metaverse is a virtual world that is accessible through the internet and is designed to mimic the real world in many ways with its own economy, social structures, and rules. The metaverse provides users, through their avatars, a rich immersive experience where they can interact with each other and with the virtual environment. Current met