U.S. Pat. No. 9,511,285

NETWORKED COMPUTER GAME SYSTEMS AND METHODS WITH SOCIAL NETWORK FUNCTIONS

AssigneeKabam, Inc.

Issue DateMarch 28, 2011

Illustrative Figure

Abstract

Systems and methods for providing online games, including various means of providing computer-implemented games using standard and non-standard tokens, and that operate in coordination with an online social network. Examples of standard tokens may include tokens associated with each card of a standard 52 card deck, units in a real-time strategy game, and the like. Non-standard tokens may represent digital tokens with specified attributes and associated digital rights management for use by specified users, such as users purchasing rights to a particular non-standard token. Non-standard tokens may also include tokens with different functionality across a number of different computer-implemented games.

Description

DETAILED DESCRIPTION OF THE INVENTION The following detailed description is provided with reference to exemplary embodiments for the ease of description and understanding. Applicants' invention is not limited to the disclosed embodiments, and encompasses other variations that fall within the overall scope of description provided herein. As indicated above, embodiments of the present invention may involve operations on a network, such as the Internet environment depicted inFIG. 1. A client computing device110may interact with various servers,130,140,150,160, and/or other computing and mobile devices120,122, to participate in a computer-implemented game. Information103may be exchanged through, and/or among, any of the nodes on the network, including transmissions through alternative networks such as various WLAN, cellular and/or satellite communication networks between intermediate server(s)126and remote devices such as handheld device120, mobile computing device122and satellite network devices124. One or more servers140,150,160may act alone or in combination with other servers and/or databases to present customized gaming interfaces, and gameplay, to participating users. For example, a server140may act as a game host for a particular Internet-based game (e.g. “game1”), and access a common database maintained by server150with user information related to, for example, rights to digital tokens for use in game1and other games. As known by those of skill in the art, such games may also be supported by client-side applications that may provide, for example, user interfaces, customized displays, independent access to databases including user information, and the like. For ease of explanation, particular online games, including a siege-style real-time strategy (“RTS”) game using standard units and digital token-based “Heroes”, and a game including the use of a standard 52 card deck (“playing cards”) with a set of non-standard tokens, referred to as “Noble” cards, are described. Other games and implementations are, of course, contemplated within the scope of the disclosure. In an embodiment, the system may be ...

DETAILED DESCRIPTION OF THE INVENTION

The following detailed description is provided with reference to exemplary embodiments for the ease of description and understanding. Applicants' invention is not limited to the disclosed embodiments, and encompasses other variations that fall within the overall scope of description provided herein.

As indicated above, embodiments of the present invention may involve operations on a network, such as the Internet environment depicted inFIG. 1. A client computing device110may interact with various servers,130,140,150,160, and/or other computing and mobile devices120,122, to participate in a computer-implemented game. Information103may be exchanged through, and/or among, any of the nodes on the network, including transmissions through alternative networks such as various WLAN, cellular and/or satellite communication networks between intermediate server(s)126and remote devices such as handheld device120, mobile computing device122and satellite network devices124. One or more servers140,150,160may act alone or in combination with other servers and/or databases to present customized gaming interfaces, and gameplay, to participating users. For example, a server140may act as a game host for a particular Internet-based game (e.g. “game1”), and access a common database maintained by server150with user information related to, for example, rights to digital tokens for use in game1and other games. As known by those of skill in the art, such games may also be supported by client-side applications that may provide, for example, user interfaces, customized displays, independent access to databases including user information, and the like.

For ease of explanation, particular online games, including a siege-style real-time strategy (“RTS”) game using standard units and digital token-based “Heroes”, and a game including the use of a standard 52 card deck (“playing cards”) with a set of non-standard tokens, referred to as “Noble” cards, are described. Other games and implementations are, of course, contemplated within the scope of the disclosure.

In an embodiment, the system may be configured to allow the initial set up, and subsequent play, of standard units, with tokens from a non-standard deck (“Heroes”) being used to modify the play. The system is configured to allow the Heroes to modify play in a number of manners. In general, and as described further below, the systems may be configured to allow Heroes to, for example, change a defense, strength, and/or speed attribute of a gaming unit, change possession of a standard token among the plurality of users playing the game, change possession of a non-standard token among the plurality of users playing the game, remove a standard token from play in the game, remove a non-standard token from play in the game, add a bonus score to a user, deduct a score from a user, prevent the use of a non-standard token, change a suit of a standard token provided to one of the users playing the game, and/or change a value of a standard token provided to one of the users playing the game.

Aspects of an exemplary assortment of non-standard tokens, are depicted inFIG. 2. As shown inFIG. 2, a digital token200may have a visual representation210for purposes of purchasing the token and displaying the token outside of particular gameplay, and may have additional visual representations220,230for use in particular games. A user may be able to view a “deck”250of the tokens they have rights to or have assembled for particular uses, and store designated decks locally, or through the token management, and/or game, database servers. For example, as shown inFIG. 4, a user may select from their available tokens410, on the left, to assign them to a particular deck, or functional group420,430,440, on the right, before or during a game. In particular,FIG. 4shows a pre-configuration screen for a user to set a desired arrangement of tokens for use in a defensive battle. As discussed further below, embodiments may include initiating a game in which a simulated player (“AI”) uses the tokens assigned to a player and predetermined rules set by the player to play a game. The graphical display shown inFIG. 4may have a game-specific graphic for a token, such as the tokens450,460,470shown on the right side ofFIG. 4. As discussed further below, the tokens may have different functionality assigned, depending on the game it is used in.

As shown inFIG. 3, embodiments may include presenting an initial game screen300to a user. This screen may be accessed through, or presented in coordination with, a social networking site. For example, a user may be logged on to their network id, and the information presented to the user may be tailored based on attributes of their id, such as who are the registered friends of the user, what is the user's rank in a particular game, what is the user's recent history in the game and/or related games and other applications, etc.

The initial screen300may include a top part “HUD”310with, for example, a player name312, title314, level316and current experience points318, show on the top left corner of the screen inFIG. 3. A player image318may also be provided, for example, from the online social network user's image. A player level316may be shown as a number, such as in a shield next to the user image.

Next to the player information, functional icons may be include such as a “bookmark”320button that may be configured to bookmark the application/game for the user. Additional icons may also be included such as, in the top right corner of the screen, gateway buttons to a browser322related to the non-standard tokens, a shopping link324, and sound and/or other control buttons326.

At the bottom of the top HUD310are the gateway buttons to the Heroes332and Defense334screens for an RTS embodiment described herein. The middle of the main screen is divided between the target list336on the left and the recent game news338on the right. The target list336is divided into five shortlisted opponents that are either slightly below (e.g. blue color), the same (e.g. green color) or higher (e.g. red color) level than the player. That is, the system may automatically select a range of opponents for the user based on, for example, their skill level and the user's skill level. The target list shows the enemy name/title/image, level and the amount of experience points342the player will get for winning the fight. The enemies may be selected by clicking the “Raid” button344next to the experience amount. As discussed herein, initiating a game via the raid button344may result in a number of actions by the processor including, for example, instantiating a game using an AI opponent that acts in accordance with predetermined criteria of the opposing player the AI is standing in for.

To the right of the screen, a news area338may show icons representing various events that have happened to the player, such as in the last 12 hours. These can be attacks from other players, taxes, records of the player's own actions or news/promotional items that can be viewed by clicking the icons. The event screens are pop-up boxes that are accessed by clicking the icons that are under the “News” area in the main screen. These may be generated automatically either when the player attacks (or is attacked by) other players (raid events), the player receives news and/or in-game promotions (news events) or when the player is able to collect taxes354(tax events). By including perishable clickable events in the news area338, that can also benefit the player, increased user interaction may be promoted. Events generally show relevant information to the event and may have bonuses for the player to collect after viewing the event. In embodiments, if the player has been “raided” by other players, he can be provided with an option to activate a “revenge attack” e.g. by clicking a revenge button352. This will take him directly to the enemy view and he can initiate a counter-raid against the player that raided him previously. This can be advantageous in providing an efficient user interface for a user to selectively initiate games against those players that have recently caused a loss to the user.

The bottom part of the initial screen may show a friend bar360with the player's friends (i.e. people who are both playing the same game and are registered with the online social network as friends of the player). These icons may show the friend's name, picture and level. Clicking on a friend's image/icon may initiate a game instantiation, e.g. begin a game where the user is on offense against a real-time, or pre-made, defense of the selected friend.

The friend bar may also show “unknown” people that may be playing the game, but are not currently registered friends of the user, “non-friends”. Clicking on these icons/images may generate a friend request, and/or a game invite.

As shown inFIG. 4, embodiments may also include a defense screen400in which a user may preconfigure rules and attributes to be used, for example, in automated defense games.

For example, clicking the Defense button334, as shown inFIG. 3, may take the player to the defense screen shown inFIG. 4. The defense screen may allow the player to edit his defense by positioning new troops in battlefield portion410, selecting which Heroes, i.e. non-standard tokens, to use via interaction with token-use portion420, and by purchasing fortification upgrades such as by clicking on upgrade icon430. The player can place/remove units432, i.e. standard tokens, freely in the screen410by using a mouse, and the like. New units may be placed by clicking on the unit icons440in the middle of the screen and then selecting a location for the unit. The amount of units the player can field may depend on his level. Existing units432may be moved around by “drag-dropping” them around the play area or removed by dragging them outside the play area. The configuration of units set by the user, including number, type and positioning, may then be used by an AI defense when the user is raided by another player.

The right side of the defense screen400including token-use portion420displays the various non-standard tokens, “Heroes,” currently used in the defense. These are divided into three “Guards” which are labeled “Front Line”426, “Main Force”424and “Last Stand”422. Heroes in the Guards may be used on different areas of the battlefield410. These areas may be shown when the player mouses over a Guard in the HUD. Mousing over a Hero may display more information in a tooltip. Below the Guards are gateway buttons to the Hero editing (Select Heroes icon442), defense upgrades (Upgrade Castle icon430) or exit the screen (Save icon444).

The Heroes used for defense may be modified through the use of, for example, a Defense Hero Select Screen500as shown inFIG. 5. This screen500may be accessed, for example, by clicking the “Select Heroes” button442(or any of the Guards) in the defense screen ofFIG. 4. In the Defense Hero Select Screen500the player can edit the Heroes he wishes to use in the defense. As shown inFIG. 5, the right side of the HUD shows the different Guards422,424,426, the number of available slots the player can still use, and the Heroes that have already been selected230,550,560,570. For example, in the screen500, three different Guard units422,424,426may be seen including a Front Line I426, Main Force II424, and Last Stand III422. In embodiments, the game application may be configured for the AI to apply different rules to the different Guard groups, e.g. when to activate or use the Heroes, and the like. More information on the Heroes can be seen by mousing over the Hero icon230,550,560,570. Mousing over a locked Guard slot may display the level the player needs to achieve to unlock the slot.

On the left side501of the screen the player can see all the digital tokens, e.g. Heroes, that he “owns” or otherwise has digital rights to. In embodiments, digital tokens may be purchased, rented, traded, and otherwise managed in accordance with digital rights mechanisms. The system may sort the Heroes by power (legendary-mighty-strong) and the user may select sorted groups by using the tabs at the top of the HUD.

The player can drag and drop Heroes from the collection side501to the Guards422,424,426. The screen may be exited by clicking the “done” button502at the bottom right corner of the screen, which can instruct the system to save all of the parameters regarding units and Heroes for later use, for example, by an AI defense. Embodiments may also include providing the user with an option of improving a static defense such as will be used by the AI for raids against the user, such as “upgrading” a castle. By clicking the “Upgrade Castle” button, the player can invest money and/or game rewards, such as gold etc., in upgrading/customizing his defenses.

When a particular game is begun by a user, and the user will be on offense, i.e. “attacking”, the user may be provided with a Deployment Screen600, such as shown inFIG. 6. This screen may allow the user to configure his attack troops. The standard tokens, or units610, may be deployed in a similar manner as in the defense screen400. In embodiments, the user may pay for additional units from game rewards and the like, thereby changing the balance of power for the particular game. This may be advantageous in allowing a lower level player to compete against a higher level player, for a price. That is, instead if automatically handicapping the opponents, the level of handicapping may be left to the user. The system may have limits built in to thus, such as a maximum number of units, and/or limits may be imposed by resources available to the user, e.g. an amount of game gold620.

The system may be configured to allow a number of units without fee, and to accumulate a battle price, for any additional units, that the player has to pay before the fight can start. The battle price may be shown in the “Begin Battle” button630, as shown inFIG. 6. If the player is unable to pay the cost, the “Begin Battle” button630may be disabled until the player removes enough units to afford the price.

In addition to the units, the player can choose which Heroes to include in his army for the battle. The number and type of Heroes the player is allowed to take with him may depend on the player's experience level, or other factors. The Heroes may be selected by clicking the “Select Heroes” button632, which may take the user to a screen, similar to that depicted inFIG. 4, including all of the digital tokens that the user has digital rights to and that are compatible with the game and any relevant other criteria. The Heroes available for the game may be limited, for example, by a number of Heroes per level, a total number of Heroes, a handicapped number of Heroes, etc.

When the player clicks the “Begin Battle” button630, the fight may immediately begin and transition, for example, to an active game instantiation including battle screen700shown inFIG. 7. In the battle, the player's (attacking) troops702may move automatically forward, for example, without player direction after they start moving. The enemy (defending) troops704may stand still until activated. In embodiments, the enemy units and relevant Heroes may be activated automatically when they lose their first unit, and/or the attacking units reach a certain line on the battelefield.

The game may be configured for the objectives to include depleting the enemy morale to zero, e.g. as represented by morale meters712,714. Both players may have the same amount of morale to begin with and it may be depleted, for example, when units from the opposing side reach the enemy table end and begin to attack it. The system may be configured to determine that the player who runs out off morale first, loses.

The defender AI may be configured to play the Heroes assigned to the various Guards422,424,426as detailed above, i.e. in accordance with the predetermined rules of the player represented by the AI. The attacking player may be human-controlled and responsible for using his Heroes in the most effective way to ensure victory in the battle. For example, the Heroes may be used one at a time. After each Hero has been used, the player may be forced to wait a short while (“cooldown”) before being able to use another one. If the player uses up all his Heroes, he may be provided with an option to “Regroup” his Heroes, allowing the Heroes to be reused, and/or allowing the system to draw a new selection of Heroes to use. For example, the player may be randomly provided up to 5 Heroes from his selected deck to use at any given time, as shown in the “Your Heroes” bar710ofFIG. 7. These Heroes may be replaced as used during the game, or they may become unusable. After a predetermined period of time, or other criteria, the user may be given an option of reloading the “Your Heroes” bar710by activating the “Regroup Heroes” button. This may be used to allow the user to reuse digital tokens that had already been used during the game.

The Heroes may be used individually by first clicking on the Hero icon the player wishes to use from Hero bar710, and then, as needed, clicking on the area of the battlefield the player wishes to use the Hero in. Depending on the Hero, the actual conditions and area of effect of each Hero can vary, but all may be used with the same “select-aim-confirm” mouse action. Heroes that are missed (i.e. played outside the battlefield etc) may be returned back to the player “hand”. When a Hero is used, it may take effect immediately. If the Hero has a timer before it expires, a small icon may be added to the right edge of the battlefield to show the timer and which effect it stands for. A Warlord Hero634may also be provided, as shown inFIG. 6, that does not need to be used but is considered to be in effect for the duration of the entire battle.

Below the Hero icons is the Regroup meter716. In embodiments, this may be a time-based progress meter that unlocks various free units for the player to deploy as time passes. If the meter716is 100% filled, the player gains the option to regroup his Heroes (e.g. “reshuffle” all the used Heroes back and play them again). Before the Regroup is activated, the player may gain access to other lesser options such as, a Free Unit (4 soldiers), Free Platoon (6 soldiers) and a Free Company (10 soldiers), respectively.

The unlocked items in the regroup meter may be used by clicking on the buttons718next to the meter. Whenever a button is clicked, the player may immediately gain the bonus and the meter may be reset.

As indicated above, embodiments may include an AI conducting the defense using the Heroes that the defender has digital rights to, and in accordance with pre-established rules and/or configurations set by the player represented by the AI. In embodiments, the defending player may be provided an option of changing the predetermined criteria, such as the Heroes used for defense, the number and types of units, etc. For example, the system may provide the defending player with the option of modifying their defensive options when the attacking player initiates the game, after which, the game may proceed as otherwise described herein. These options may find particular applicability in social networks where the presence of a member “online” may allow for effective communication as well as easy access to the game environment, as well as providing incentives for members to stay online or accessible to their social network accounts.

The player may also be allowed to end the battle before either player wins by clicking on the “Retreat” button722in the top right corner of the screen. This may open up a confirmation dialogue where the player can still choose not to retreat. Retreating will end the fight immediately and generate a “Retreated!” event to the target News section, that can generate an option for sending an automated message within the online social network.

After the battle is over, the player may be automatically taken to a debriefing screen. The debriefing screen may show the total amount of gold and experience the player gained from the battle, the casualties on both sides, which treasures the player captured and the possible brags he can send as automated messages to his friends. For example, the battle can may 4 different end results, depending on how the battle went: Domination, Massacre, Win and Lose. A Domination win may be achieved when the player manages to gain all the treasures from the battle. The player may get one treasure from winning, one from ending the game in less than 2 minutes (time bonus), one for causing more casualties than suffering them (less casualties) and one for not suffering any damage on his own base (base unharmed). Each treasure may award the player with an amount of game gold based on the opponent level. A domination victory may also activate an option to send an automated message within the online social network, such as presenting a “Domination Brag” button as part of a user interface, that enables the player to post a “Domination” feed within a component of the online social network. For example, clicking the button may initiate a standard messaging routine within the online social network application and automatically fill in certain information and fields, such as a posting address, special graphics, certificates, and game results. A Massacre result may be achieved when the player wins and the total amount of casualties is over 200. A massacre victory may also activate an option for automated messages, such as a “Massacre Brag” button that enables the player to post a “Massacre” feed within a component of the online social network. A Win result is achieved by winning the game without fulfilling all of the other conditions. This may activate a “Victory Brag” button that enables the player to post a “Victory” feed within a component of the online social network. Thus, players can be given an option to efficiently communicate with other members of the online social network, as well as monitor the progress of other players' performance without having to search around for it. All results may generate a new item to both the enemy and player news areas.

In another embodiment, the system may be configured provide, and/or interact with additional games, such as games that use the same digital tokens for different purposes. For example, a game server may be configured to present and manage a game allowing cards from the standard 52 card deck to be played, with cards from another, Noble, deck, composed of the non-standard digital tokens, being used to modify the play. The system may be configured to allow the Nobles to modify card play in a number of manners. In general, and as described further below, the Nobles may include different functions than those used in the RTS game, such as “traps” that block moves by an opponent, “enhancers” that enhance the value of cards in a player's deck, “swaps” that allow a player to exchange card(s) with an opponent's card(s), and “increment/decrement” cards which allow incrementing or decrementing a player's or opponent's cards.

As with the RTS described above, there are various options that are available in the context of an online social network related to a user's registered friends, and the like. For example, a user may select to play a card game, such as described below, against an AI using the friend's deck of non-standard tokens, or may invite a friend to play for themselves.

As shown inFIG. 8, an exemplary game may begin with the system “dealing” each player four playing cards; two face-up810,820and two face-down. In this example, the object of the game is to modify or replace those four playing cards to have the highest score at the end of the match. A player's score may be calculated by adding up the numbers of each of their playing cards. In embodiments, the system may be programmed such that Jacks are worth 11 points, Queens are 12, Kings are 13, and an Ace is worth 1 point. Other scoring attributes are possible as well.

In order to determine what Nobles a player has access to via, for example, “Active Deck” tab830or “My Decks” tab840, a digital rights management system may be used, for example, by the game server contacting a digital token rights database. Thus, a player may be provided with access to corresponding Nobles, and/or preconfigured decks of Nobles that the player may have stored locally or remotely. In embodiments, a player with no preexisting rights may be granted access to, or provided with, a starter deck including certain, usually low-level, non-standard tokens. For example, a user may be given 20 Nobles to start playing with. In embodiments, users may gain access to additional token by purchasing rights through a digital rights management system. In embodiments, tokens may be bought, rented, traded, and the like. Tokens may be set to expire after a period of time, a number of uses, or other criteria.

In embodiments, a user's non-standard tokens can be used in other games, and can be configured to act, and appear, as a different asset unique to each game. For example, a token200, as depicted on the left and right side ofFIG. 2, may have a generic appearance210, such as a football player, and a number of game-specific graphical representations220,230, as shown below the generic graphic210. Thus, the token may be depicted in a particular game, such as an RTS game, in a unique manner, as inFIGS. 4 and 5. The game-specific graphic, e.g.220,230, may be advantageously configured as a selectable icon to use the token in the game as well, as inFIG. 7. Embodiments may include allowing and/or requiring the user to select a limited number of Nobles from the available Nobles for use in a particular game. For example, a user may have rights to over 20 Nobles, but the game has a hard limit of 20. Therefore, the user must select 20 for play. In other embodiments, the number Nobles available for use in a game may be handicapped depending on factors such as, for example, the respective skill levels of the player.

As shown inFIG. 8, a score meter850may be presented on the game screen showing two values. The top number may reflect a total score, and the bottom number may reflect any bonus points or penalties the player has earned. If any playing cards810are face-down, and the values unknown to the player viewing the screen, then a score may be estimated in score meter850by the computer processor. For example, the programming instructions may specify that when calculating the estimated score, a face-down playing card is considered to be worth 7 points, or the value may be established by the particular user.

During a player's turn, they may, for example, draw Nobles852into their hand. This may be done for example by clicking on a user interface including a graphical representation, or thumbnail, of the Noble. A selected, or drawn Noble, may be presented in full size in hand852, representing its readiness for use by the player, e.g. token220. A player may draw one Noble at the start of each turn from the pulsing Noble Tower860. A player may also click on the pulsing “Knock Flag”862, which triggers the end of the game sequence.

If a player wants to use a Noble, they may click on the “Use” button when viewing the Noble, e.g.220, from deck852in full size. This command may be transmitted to a processor that is executing the game. As known by those of skill in the art, the processing may be performed, for example, by a host remote from the participating user clients, the mechanics of which are not discussed in detail herein. The Noble may then be shown to move to the center of the screen and a determination may be made by the processor whether the effect described on the Noble occurs or not. In embodiments, a player may play any number of Nobles in a given turn. Once a player is holding more than, for example, four Nobles in hand852, the system may require them to play or discard Nobles until the player has less than four.

Nobles may affect one target or multiple targets, depending on the effect of the Noble. Targets may be playing cards, Nobles, a player's bonus, Traps, etc. Some Nobles may take effect automatically after playing them, while others may require a user to select targets before the effect occurs. The effects of a Noble may also be restricted to a certain type of playing card, such as, for example, a specific suit or color, certain numbers or face-cards, odd or even numbers, or a combination of multiple types. Some Nobles may also target the opponent's hand of Nobles, Noble Towers860, Noble Pits864, and Traps.

Nobles may reflect more generic tokens, e.g. persistent characters with specific traits. Nobles may include a variety of attributes that may be generic, or game specific. For example, Nobles may include Clan, Gender, Trap-proof, and/or rarity attributes. These attributes may be used in various ways such as limiting Nobles' effectiveness against other Nobles, making Nobles resistant to certain actions, such as traps, and the like. The traits of a token may be represented on Noble cards with “Tags”. Tags may be used by the system to determine whether a Noble is a legal target of another Noble. For example, a Noble being played might only target an opponent's male Nobles. If the opponent doesn't have any male Nobles, the effect will fail, or will fail with respect to Nobles with the Tag “female”.

Noble card categories may include, for example:

Noble TypeExample 1Example 2Plus/minus+5 to each of two target−3 to each of opponent'scards.cards.Bonus+1 Bonus.+1 Bonus for each Spade inplay.FixedTurn 1 card into a King.Turns all opponent'sface-up Kings into Fives.Kill PlayingKill all opponent blackKill all opponent cards.CardJacks.Kill ModifierKill one opponent trap.Kill all of an opponent'sCannot be trapped.hand of Nobles that areThings, Tech/Black orWild/Green.Swap playingGive a black card inExchange one of your redcardexchange for onecards for one opponentopponent's down card.black card.Steal PlayingSteal an opponent'sSteal one opponent Club.CardQueen.Cannot be trapped.Steal ModifierSteal the next Noble inSteal all Females fromopponent's Noble deck andopponent's Noble hand.add it to your hand.TrapUntil the end of the game,For the rest of the gameblocks any Male or Femalehas a 50% chance ofNobles that attack yourblocking attacks by Malescards.and Things.

When targeting is required by a Noble, the system may determine targets meeting the necessary criteria, and the display of all legal targets may be modified, such as by highlighting them with a green border, and the like. If the Noble targets a single playing card, the system may initiate the effect immediately after the user clicks on one card. If a Noble requires multiple targets, the display may be modified to reflect the user clicking on a playing card, such as by changing a highlight to blue. The system may be configured so that clicking the same playing card again deselects it.

In embodiments, potential face-down target playing cards may be displayed differently than face-up cards that are known to be eligible or ineligible targets. For example, face-down cards may have a yellow highlight, indicating that they are potential, but uncertain, targets. These can be selected as targets by the user, but if they don't meet the requirements, the Noble effect will fail. Through similar processes, a player may gain information about what another player's down cards are. In the event that a failed or successful Noble play against a down card results in a logical conclusion regarding, for example, the value or suit of, a down card, the display of the user having access to this information may be modified differently from other users' displays. Likewise, if a player's down, card is known to another player, the player owning the down card may have their display modified in a way that tells the owning player that another player has additional information about that card. Fore example, if an opposing player uses a Noble that automatically changes a down card of player1, without the new value of the down card being revealed to other players, player l's display may be changed to include an indicator reflecting that the opposing player knows the value of the down card, even though player1may not.

In embodiments, the display may include partial transparency states, for times when a player knows the suit but not the value, or vice versa. As indicated above, this may occur when certain Nobles with predetermined effects, and/or limited applicability are used on face-down playing cards.

In embodiments, the programming instructions may typically provide functions where “plus/minus” Nobles result in modifications to playing cards' values. Similarly, “Bonus” Nobles may provide for separate counts that are summed at the conclusion of a hand. These may include instructions for increasing or decreasing a player's total score by a specific amount, and may be further determined by certain playing cards being in play. “Fixed” Noble may include functions whereby a playing card may be changed in various ways, such as changing the target playing card to a particular value or suit. In embodiments, this can result in a combination of playing cards that are not limited to the combinations present in, for example, a standard 52 card deck. That is, as indicated above, a “Fixed” Noble may turn a playing card into a King, or turn Kings into fives, which may result in more or less Kings and/or fives in play than are typically found in a standard 52 card deck.

“Swap” Nobles may exchange a user's targeted playing card(s) with an opponent's targeted playing card(s), and the like. Whereas, a “Steal” Noble may replace a user's targeted playing card(s) with an opponent's targeted playing card(s), without replacing the opponent's card(s). The system may be configured to replace an opponent's card(s) from the draw pile. “Steal” Nobles may also target an opponent's Nobles in-hand, which do not get replaced. In embodiments, the system may be configured to change possession of “stolen” Nobles temporarily, i.e. during the game, or “permanently”, i.e. the digital rights to the token are changed in the database.

Programming instructions may also provide functions where “Kill” Nobles, such as Kill Playing Card and Kill Modifier, can remove playing cards or nobles from a player's hand, consideration and/or play. For example, a Kill Playing Card may “Kill” the target playing card(s) and place it on the bottom of the discard pile, or otherwise remove it from play. Kill Modifier may allow a user to designate an opponent's Noble(s) that are in-hand, e.g. hand852, making them unavailable for the opponent to use, or otherwise removing them from play. In embodiments, the instructions may not allow “killed” Nobles to be replaced. Other targets of Kill Modifiers may include Noble Towers, Noble Pits, and Traps. In embodiments, the systems and methods may be further configured, and/or include automated processes, to change the display to show both players the targeted Noble(s) when Noble(s) are killed and/or stolen, so that both players know what was killed/stolen.

“Trap” Nobles may be configured to take effect subsequent to when they are played. For example, a “Trap” Noble may be responsive to an opposing player's action, waiting to be triggered. In general, the system may be configured to establish rules upon use of the “Trap” to prevent or restrict some future action/use of an opponent. Traps may prevent certain types of Nobles from taking effect when the opponent plays them, and may be configured to be consumed after being triggered once, while others may be configured to last for a predetermined time or number of uses, or the whole game.

As shown inFIG. 9, embodiments may include calculating one or more user scores by score meters350,354and the like based on attributes of the standard and non-standard tokens, including modified-attributes of the tokens, and determining a winner of the game based on the calculated user scores shown in score meters350,354. User profiles may be updated in a database to reflect the results of the game, including, for example, modifying in the database a score representing a player's skill and the like. Such scores can then be used later to perform other automated tasks such as matching players by skill, and the like.

In embodiments, a virtual trading card game, such as described herein, may be played on a social networking site. Appropriate software may be downloaded to a client computer and can interact with other client's and/or servers, through the network, e.g. the Internet, to connect with other players who also downloaded the same client program. Embodiments may also include providing a user with the option to send invites to friends, which may include a link for downloading the game. Game instructions may be configured to calculate an effect of a token based on a number of invited friends playing a game, a number of networked friends playing a game, and the like. Embodiments may also include downloading all, or part, of the game to personal computers, mobile phones, and similar devices with sufficient processing power and connectivity.

As mentioned above, digital tokens may be used in multiple games with game-specific functions. For example, tokens used in the above-described card game may also be used in another game such as RTS game with a battlefield portion of the screen and a token-use portion of the screen, as shown inFIG. 7, and described above. Gameplay in the battlefield portion of the screen may be influenced by the user's activation of token functions, that result in different functions than those used in the card game for the same generic token. For example, the use of a Hero in the RTS game may influence a speed, strength, and/or health of a unit, whereas using the corresponding Noble in the card game may alter the possession of a standard token, or other effect.

Embodiments may include various combinations of the following features. Tokens may be disposable in nature with a certain number of uses or a specific pattern of wear. Tokens may get improved attributes and performance as a function of how many of a user's friends on a social network are playing with the user or have been invited by the user. Custom decks for a given game may be the same for opponents or different, e.g. they can be regulated by handicap budgets of how many points of value are allowed, budgets related to other attributes of the tokens, and the like. Decks and gameplay can be organized around a variety of handicapping methods so that social players can level the playing field and compete in tournaments, e.g. handicapping allowable tokens and/or token effects based on competitive rank, the value of a player's total collection of tokens, etc. Additional attributes of tokens may provide expanded features such as including storylines and related events and functions within games, special rules for decks that unlock unique functionality, such as “clan decks” that require a certain percentage, such as 50%, of its members to be from that clan, and that enable inter-clan and intra-clan competitions and tournaments. Token use may also be tracked by a server and rewards, such as additional tokens and/or functionality, provided to the user and/or user's token based on milestones such as total games played, different types of games used in, victories, etc. Complimentary tokens may have display options such as a “FREE” banner, a dull appearance, and the like, that can be changed once the user purchases the token, thereby encouraging the user to purchase the token. A digital token rights management system may include a user exchange allowing the digital rights to tokens to be bought, sold, and/or traded by users via the digital token rights management system and recorded in the rights database:

Games may include instructions for allowing different tokens to be used together for unique combined effects. Thus, for example, using tokens260and270shown inFIG. 2together in one game might result in a combination function “X”, whereas tokens260and270may not be combinable in another game, or may result in an altogether different combination function “Z”. The complexity of such combinations is advantageously used in the context of automated computer games, without the need for the user to learn all such possibilities to monitor their own play or that of another player. Additionally, having the game run by a computer server allows for “surprise” combinations that the user was unaware of, which is not as feasible in conventional games where each player generally knows the rules, possible combinations, and effects.

Embodiments of the present invention can include systems for implementing the described methods, as well as computer-readable storage medium coded with instructions for causing a computer to execute the described methods. For example, an electronic system including a processor, a memory and an electronic communication device may be configured to control an online game including providing standard and non-standard tokens to the players of the game, as described herein. The system may include a user computer system, wireless communication devices, subnetworks, a server, or any other network-capable device with the requisite functional capabilities.

The system includes any number of processors (not shown) that are coupled to storage devices including a first storage (not shown, typically a random access memory, or “RAM”), second storage (not shown, typically a read only memory, or “ROM”). Both of these storage devices may include any suitable type of the computer-readable media described and/or mentioned above. A mass storage device (not shown) may also be used to store programs, data and the like and is typically a secondary storage medium, such as a hard disk that is slower than primary storage. It will be appreciated that the information retained within the mass storage device, may, in appropriate cases, be incorporated in standard manner as part of primary storage as virtual memory. A specific mass storage device such as a CD-ROM may also pass data uni-directionally to the processor.

The system may also include an interface that includes one or more input/output devices such as such as video monitors, track balls, mice, keyboards, microphones, touch-sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, or other known input devices, including other computers. The system may be coupled to a computer or other electronic communication network using a network connection. The network can connect various wired, optical, electronic and other known networks to exchange information among computers, servers, wireless communication devices, and sub-networks. With such a network connection, it is contemplated that the system and the processor therein may receive information from the network, or may output information to the network in the course of performing the above-described method steps. The above-described devices and materials will be familiar to those of skill in the computer hardware and software arts and need not be individually or exhaustively depicted to be understood by those of skill in the art. The hardware elements described above may be configured to act as one or more modules for performing the operations described above.

In addition, embodiments of the present invention further include computer-readable storage media that include program instructions for performing various computer-implemented operations. The media may also include, alone or in combination with the program instructions, data files, data structures, tables, and the like. The media and program instructions may be those specially designed and constructed for the purposes of the present subject matter, or they may be of the kind available to those having skill in the computer software arts. Examples of computer-readable storage media include magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media such as floptical disks; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory devices (ROM) and random access memory (RAM). Examples of program instructions include both machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter.

The following tables show additional details of exemplary digital tokens labeled according to “Nano Name”.

TABLE 1RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)HeHateMeWar of the1Swap playingSwap any 2 of your Spades withYellowMaleRRosescardany 2 opponent cards.EdisonMagnetism2Steal ModifierSteal top Noble from opponent NobleYellowMaleRdiscard pile. Cannot be trapped.MoneyHoneyTreasure3Bonus+1 Bonus for each Spade in play.YellowFemaleRNannyBlackmail4FixedTurn one King into a Jack of Spades.YellowFemaleCToasterMurder Hole5Plus/Minus−5 to one face-up card.YellowMaleCKing BlingGolden Apple6Bonus+1 Bonus.YellowMaleCMischiefStepmother7Swap playingSwap one of your cards for anYellowFemaleCcardopponent's Spade.DesperateSoccerMomSix in the City8FixedTurn opponent's face-down cards intoYellowFemaleUSixes.NapoleonSiege9Plus/Minus−3 to each of opponent's cards.YellowMaleRPartsLingerie10TrapTrap: Until the end of the game,YellowFemaleRblocks any Male or FemaleNobles that attack your cards.DoctorSurgery11Plus/Minus+5 to each of two target cards.YellowFemaleUBlondieMakeover12FixedTurn all your Spades into Queens.YellowFemaleUYouAreSoFiredGuillotine13Kill playing cardKill all opponent face-down Kings.YellowMaleCJenniferJealousy14FixedTurn each opponent Jack into a 3.YellowFemaleUNotDeadYet(Coming Soon)15Plus/MinusCan not be trapped. (Coming Soon)WhiteMaleRJustinRomance16Steal PlayingSteal an opponent's Queen.WhiteMaleUCardCannot be trapped.DetroitFactory17FixedTurns all cards into Spades.YellowMaleUCannot be trapped.

TABLE 2RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)AspirinAntidote18Plus/Minus+2 to each of your Spades.YellowFemaleCNonpologySix Scandel19FixedTurns every opponent red King into a Six.YellowMaleUCannot be trapped.SherlockGolden Key20Kill ModKill one opponent trap that is City/YellowYellowMaleCor Elemental/Blue. Cannot be trapped.BradJackdom21FixedAll your cards become Jacks.YellowMaleRFrankensteinMonster22Steal ModifierSteal all Females from opponent's NobleYellowMaleUhand.FreeShipping(Coming Soon)23Plus/Minus(Coming Soon) Cannot be trapped.YellowMaleRMinuteMan(Coming Soon)24Plus/Minus(Coming Soon) Cannot be trapped.YellowMaleRNoYouDon'tDrawbridge25TrapTrap: For the rest of the game has a 50%YellowFemaleUchance of blocking attacks by Males andThings.AladdinMagic Lamp26FixedChoose any 3 cards. Those that are redWhiteMaleRturn into Kings.VooDooHex27FixedTurn all face-up opponent black cards intoWhiteMaleUAces. Cannot be trapped.JimCult28Kill playing cardKill all your own cards.WhiteMaleCMickApprentice29FixedTurn your face-up cards into Tens.WhiteMaleCPhantomMasked Ball30TrapTrap: Blocks and captures one FemaleWhiteMaleUNoble.VenusHoly Hand31Kill ModKill one opponent trap. Cannot beWhiteFemaleUGrenadetrapped.IMHOHenry32Kill playing cardKills all opponent Queens.WhiteMaleRGoodluckWithWet Blanket33TrapTrap: 50% chance to block the nextWhiteFemaleCThatopponent Noble played.

TABLE 3RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)GodivaBareback34FixedTurn one red card into a Queen.WhiteFemaleUJoan of ArcBewitched35Kill playing cardKill an opponent black card and replaceWhiteFemaleUfrom the top of the discard pile.ElenielElven Magic36Bonus+1 Bonus for each of your Hearts. CannotWhiteFemaleRbe trapped.Lady of theOffering37FixedTurn one Heart into a King.WhiteFemaleULakeZombieResurrection38Steal ModifierRecover a used Noble from the top of yourWhiteThingRNoble discard pile.CinderellaFairy39FixedTurn all your Hearts into Queens. CannotWhiteFemaleRGodmotherbe trapped.MerlinMagic Shield40TrapTrap: Until the end of the game, block anyWhiteMaleRNobles attacking your cards.ExcaliburCrusader41FixedTurn 1 card into a King.WhiteMaleUCupidArrow Slit42FixedTurn your face up cards into Hearts.WhiteMaleCPedroAcolyte43FixedTurn all cards into Hearts.WhiteMaleUWizWizardry44Kill ModKill all opponent traps. Cannot be trapped.WhiteMaleRYogiHypnosis45Swap playingGive a black card in exchange for oneWhiteMaleCcardopponent's down card.SantaGifts46Bonus+1 Bonus for each Heart in play. CannotWhiteMaleRbe trapped.IComeInPeaceCall It a Draw47Kill playing cardKill all opponent cards.BlackThingRMother-in-LawWitch48FixedTurns all opponent's face-up Kings intoWhiteFemaleUFives.FinnScout49Steal ModifierSteal al Elemental/Blue Nobles from anWhiteMaleUopponent's hand. Cannot be trapped.

TABLE 4RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)MTFBWUHero50Steal ModifierSteal all Tech/Black or Spirit/WhiteBlackMaleRNobles from an opponent's hand.86Secret Agent51TrapTrap: Blocks and captures oneBlackMaleRManCity/Yellow, or Wild/Green Noble playedby opponent. Cannot be trapped.Mega FoxBombshell52TrapTrap: 50% chance to block each of theBlackFemaleRnext two Nobles played by an opponent.CIAWaterboarding53TrapTrap: Blocks and captures one Noble thatBlackMaleUis either Spirit/White or Elemental/Blue.BumbleBeetlePlate Armor54TrapTrap: For the rest of the game, block anyBlackThingCattacking Nobles that are Things. Cannotbe trapped.RCRemote Control55Steal ModifierCapture one opponent trap.BlackFemaleRFoobarIron Mask56Kill playing cardKill all opponent black Jacks.BlackThingCSpamTavern57Swap playingExchange one of your odd cards for one ofBlackThingUcardyour opponent's even cards.WallyNice Guy58FixedTurn an 8 into a Queen. Cannot beBlackMaleCtrapped.CrashBlackout59Kill ModKill all Tech/Black, City/Yellow orBlackThingUFemale Nobles in an opponent's hand.Cannot be trapped.CookieMorsel60Plus/Minus+2 to each of your cards that areBlueThingCDiamonds.OctomomCrazy Eights61FixedAll cards become Eights.YellowFemaleUBlack KnightRun Away62Kill playing cardAll red cards are killed.BlackMaleUGovernatorBarbarian63FixedTurn 2 target cards into Twos.BlackMaleR

TABLE 5RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)AYBABTUUFO64FixedTurn all opponent red face-down cardsBlackThingCinto Fives. Cannot be trapped.ASLWeird Science65FixedTurn an even card into a Queen.BlackFemaleUJerryFrog Prince66FixedTurn any 2 black cards into Kings.BlackMaleRWTHPurse67Bonus+1 Bonus for each of your black cards.BlackFemaleRCannot be trapped.Cray-ZBard68Kill playing cardKill-target opponent black card.BlackThingCLOLMinstrel69Swap playingExchange one of your red cards for oneBlackFemaleUcardopponent black card.Lord BrutishChivalry70FixedTurn a Two into a Jack.BlackMaleCADDTweet71Plus/Minus+1 to one card.BlackThingCFAQFalcon72FixedPeek at an opponent's face-down cards.BlackFemaleCKamikazeAssassination73Kill ModKill all Tech/Black Nobles from anBlackThingCRobotopponent's hand.TeslaJackrabbit74FixedTurn two black cards into Jacks.BlackMaleUOMGGold75Bonus+2 Bonus for each of your even cards.BlackFemaleRKFPRoasted Guinea76Kill playing cardKill all opponent cards that are not Clubs.GreenFemaleRPigSkunkStinkbomb77Plus/Minus−4 to all face-up opponent cards. CannotGreenFemaleRbe trapped.ScarlettFountain of78Plus/Minus+4 to one card.GreenFemaleCYouthSavageBeating79Bonus−1 Bonus to an opponent for each Club inWhiteMaleRplay. Cannot be trapped.Pa-KowBludgeon80Plus/Minus−3 to one card.GreenMaleCBottomHag81Kill playing cardReplace 1 of your cards with the bottomGreenFemaleCFeedercard of the discard pile.CougarClubbing82Bonus+1 Bonus for each of your Clubs.GreenFemaleU

TABLE 6RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)ScorpionBackstab83Kill ModKill all opponent Nobles that are Female,GreenFemaleUCity/Yellow, or Elemental/Blue.JKTrojan Horse84Kill playing cardKill all opponent face-down Royalty.GreenMaleRCannot be trapped.ShizzledogPit Bull85Steal PlayingSteal one opponent Club.GreenMaleCCardOrcInvader86Bonus−1 Bonus to opponent for each of theirWhiteMaleUcards that is not a Club.JumpTheSharkGallows87TrapTrap: Blocks one Wild/Green Noble.GreenThingCCannot be trapped.Crazy PenguinCatapult88Kill ModKill all of an opponent's hand of NoblesGreenMaleUthat are Things, Tech/Black orWild/Green. Cannot be trapped.MacbethTragedy89Kill playing cardKill all face-up Royalty.GreenMaleUGizelleBeauty90TrapTrap: Blocks and captures the next MaleGreenFemaleRNoble played by an opponent.PredatorHunting91Steal ModifierCapture one opponent trap if it isGreenMaleCCity/Yellow.VladExecutioner92Kill playing cardKill any 3 cards.GreenMaleRPocahontasForest93FixedTurn any 2 cards into Clubs.GreenFemaleCPell MellRaid94Kill ModKill one opponent trap that is Wild/Green,GreenMaleUSpirit/White, or Tech/Black. Cannot betrapped.KTHXBIFlogging95Kill playing cardKill all your own cards that are not Clubs.GreenFemaleCRobin HoodForeign Trade96Swap playingSwap one of your cards with oneGreenMaleRcardopponent face-up card.HysteriaAnthrax97Kill playing cardKill opponent's face-down cards. CannotGreenFemaleRbe trapped.

TABLE 7RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)ManRamBeast98FixedTurn your face-down cards into Queens.GreenMaleUOgreBad Breath99FixedTurn one opponent King into a Two.GreenMaleUSpartacusDagger100Plus/Minus−2 to target face-up card.GreenMaleCBootyWench101FixedTurn your Clubs into Tens.GreenFemaleCMindTheGapMoat102TrapTrap: For the rest of the game, blocksGreenThingU80% of ground attacks (attacks that arenot flying or airborne). Cannot betrapped.DiamondJewelry103TrapTrap: For the rest of the game, blocks anyBlueFemaleUFemale Nobles played by opponent.Cannot be trapped.ShotokekiShortcake104TrapTrap: Blocks 1 Spirit/White, City/Yellow,BlueThingCor Elemental/Blue Noble and puts it on thetop of its original deck. Cannot betrapped.DeathKiki105Kill playing cardKill 2 cards.BlueFemaleUDealerLaboratory106FixedTurn any 2 cards into Diamonds. CannotBlueMaleUbe trapped.LowCarbMeat Pie107Plus/Minus−1 to one card.BlueFemaleCNurseHealing Water108Plus/Minus+3 to one cardBlueFemaleCJavaInstant Coffee109FixedTurn your black cards into Diamonds.BlueThingUSzechwanExplosives110Kill playing cardKill all Spades.BlueThingCIDidNotInhaleSmoke111Plus/Minus−5 to an opponent's odd cards.BlueMaleRVirusInfection112Kill ModKill one opponent Male Trap. Cannot beBlueFemaleCtrapped.

TABLE 8RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)FrostyBlizzard113Kill playing cardKill all of opponent's face-up Royalty.WhiteThingUSauceGrog114TrapTrap: 70% chance to block the next twoBlueThingUMale Nobles played by an opponent.Cannot be trapped.YoHoPirate115Steal ModifierSteal the next Noble in opponent's NobleBlueMaleUdeck and add it to your hand.ThatsWhatSheSaidLadies In116FixedTurn all your Diamonds into Queens.BlueMaleRWaitingCannot be trapped.BoomGoesTheIncoming117Plus/Minus−3 to each opponent card that is not aBlueThingRDynamiteDiamond. Cannot be trapped.RushmoreLegacy118FixedSelect any 4 cards. If they all are Red,BlueMaleRthey turn into Kings. Cannot be trapped.AxleArsonist119Plus/Minus−4 to all opponent face-up cards that areBlueMaleRnot Diamonds.TaxmanShakedown120Plus/Minus−2 to all opponent cards. Cannot beBlueMaleRtrapped.WasabiFire121TrapTrap: 50% chance to block and captureBlueThingUthe next Noble played by an opponent.One time use only. Cannot be trapped.GoodybagTiara122Bonus+1 Bonus for each of the Diamonds inBlueFemaleRplay.DopeIntrigue123Swap playingExchange 1 of your odd cards for anBlueMaleUcardopponent Royalty.DarkVoid124FixedTurn all your cards face-down. Cannot beBlueThingCtrapped.The DonHitman125Kill playing cardKill any 2 opponent cards. Cannot beBlueMaleRtrapped.The CleanerSteamy126FixedTurn all of your red cards into Kings.BlueMaleRFUDLite127FixedTurn all cards face-up. Cannot be trapped.BlueThingC

TABLE 9RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)HammerBlacksmith128FixedTurn all your face down cards intoBlueMaleCDiamonds.LoviatarDisease129Kill playing cardKill all Clubs.BlueFemaleCRockCoup130Kill playing cardChoose 3 opponent cards; any that areBlueMaleUJacks are killed. Cannot be trapped.JunkInTheTrunkFortifications131TrapTrap: For the rest of the game, blocksBlueFemaleU50% of attacks. Cannot be trapped.ROTFLArchitect132FixedTurn all your Aces, Twos, and Threes intoBlackFemaleUKings.AfricaForces133FixedReveal an opponent's face-down cardsBlueThingRand make each one into an Ace ofDiamonds.RoachEspionage134FixedPeek at an opponent's face-down cardsYellowMaleCand make them Spades. Cannot betrapped.OCDDistraction135Kill ModKill all Elemental/Blue or Spirit/WhiteBlackMaleCNobles in an opponent's hand.NerdBurgerBrotherhood136Bonus+2 Bonus for each of your cards that areBlackMaleR8 or less.JoltFire Power137Plus/Minus+8 to target Ace, Two, Three or Four.BlackThingUCannot be trapped.PamelaBikini138TrapTrap: Until the end of the game, 90%YellowFemaleRchance to block each Male Noble.BlackbeardPillage139Steal FlayingSteal a Diamond from your opponent.YellowMaleCCardPoshPenthouse140Swap playingChoose up to 2 opponent cards that areYellowFemaleRcardJacks or Kings to trade with any 2 of yourcards.WatsonConfession141FixedReveal opponent's face down cards.YellowMaleCW00t!Rags to Riches142FixedSelect 3 cards. Any that are Clubs willGreenMaleRturn into Kings. Cannot be trapped.

TABLE 10RarityNano(FromNano NameNoble NameIDNoble TypeDescriptionRaceTagFed)HerculesBrute Force143Bonus−3 to an opponent's Bonus. Cannot beGreenMaleRtrapped.AmoebaPlunder144Steal ModifierSteal all Wild/Green Nobles from opponentGreenThingUhand. Cannot be trapped.PriestessHail Mary145FixedPeek at an opponent's face-down cardsWhiteFemaleCand make them Hearts.GrungePied Piper146Steal PlayingSteal one Heart from your opponent.WhiteMaleCCardHaterHack147Steal ModifierSteal all Spirit/White Nobles from anBlackMaleUopponent's hand. Cannot be trapped.CatholicExorcism148Kill ModKill all Nobles in opponent's hand exceptWhiteFemaleRSchool Girlfor Elemental/Blue ones.PuckTrickster149FixedTurn any card into a 9.WhiteMaleCKarmaGood Vibrations150Plus/Minus+1 to each of your Hearts.WhiteFemaleCKung FuPandemonium151Kill playing cardKill any playing card.WhiteMaleC

The invention has been described with reference to exemplary embodiments. Modifications and alterations of the described embodiments may be evident to those of ordinary skill in the art upon a reading and understanding of this specification. The present invention is intended to include all such modifications and alterations insofar as they come within the scope of the appended claims, or the equivalents thereof.

Claims

  1. A method of providing computer-implemented games in coordination with a computer-implemented social network comprising: providing, by a computer processor, instructions for displaying a first display to a user, the first display including a plurality of icons including a first icon and a second icon, wherein the first icon represents a first member of the social network that is a friend of the user in the social network and that is playing the game;and the second icon represents a second member of the social network that is not a friend of the user in the social network and that is playing the game, receiving a selection of the first icon and/or the second icon by the user, and implementing and beginning a first session of a first game with the user based on the received selection by the user, the first session being implemented such that the first session includes at least one game parameter predetermined by the first member or the second member of the social network, wherein for at least a portion of the first session of the first game, gameplay by the first member or the second member is simulated based on the at least one predetermined game parameter determined based on the received selection of the user, such that for at least a portion of the first session, a participant of the first session does not include the first member or the second member of the social network, and wherein the at least one predetermined game parameter includes a selection by the first member or the second member of the social network, prior to the first session of the first game, of one or more digital tokens for use in the first session, the one or more digital tokens being selected from digital tokens that the first member of the social network or the second member of the social network has rights to, such that the at least one predetermined game parameter for the first session is determined based on selection of the one or more digital tokens by the first member or the second member and selection of the first icon and/or the second icon by the user.
  1. The method of claim 1 , further comprising: sending a friend request to the second member of the social network on behalf of the user in response to the selection by the user selecting the second icon;in response to the second member of the social network accepting the friend request, registering the second member of the social network as a new friend of the user in the social network.
  2. The method of claim 1 , wherein: the first session is implemented such that the user plays an offensive role in the first session against a simulated player acting as a corresponding one of the first member or the second member of the social network, the simulated player being in a defensive role in the first session;and the simulated player executes, by a computer processor, actions determined by attributes of the one or more digital tokens and according to at least one predetermined game rule set by the first member or the second member of the social network.
  3. The method of claim 1 , further comprising providing a different set of uses for individual ones of the one or more digital tokens in another game.
  4. The method of claim 1 , further comprising: providing the user with at least one standard token from a first set of tokens, the first set of tokens being shared and substantially identical between a plurality of users playing the first game;verifying, by a computer processor, rights of the user to non-standard tokens from a second set of tokens;providing the user with at least one non-standard token from the second set of tokens based on said verifying;receiving over an electronic network a first instruction from the user to use the at least one non-standard token during the first game;based on the first instruction, executing by a computer processor a second instruction that modifies an attribute of at least one of a standard token provided to one of the plurality of users playing the first game and a non-standard token provided to one of the plurality of users playing the first game;restricting the further use of the non-standard tokens that have been used by the user;and after a period of time, providing the user with an option to make the used non-standard tokens useable again.
  5. The method of claim 5 , wherein the first set of tokens consists of a pool of possible tokens corresponding to units for a real-time strategy game.
  6. The method of claim 6 , wherein the second instruction modifies an attribute of a standard token provided to one of the plurality of users, the modified attribute including a health score of a unit.
  7. The method of claim 6 , wherein the second instruction modifies an attribute of a standard token provided to one of the plurality of users, the modified attribute including a movement speed of a unit.
  8. The method of claim 5 , wherein the computer-implemented game is provided in coordination with a social networking site.
  9. A non-transitory computer-readable storage medium including instruction for causing a computer to perform a method comprising: providing, by a computer processor, instructions for displaying a first display to a user, the first display including a plurality of icons including a first icon and a second icon, wherein the first icon represents a first member of the social network that is a friend of the user in the social network and that is playing the game;and the second icon represents a second member of the social network that is not a friend of the user in the social network and that is playing the game, receiving a selection of the first icon and/or the second icon by the user, and implementing and beginning a first session of a first game with the user based on the received selection by the user, the first session being implemented such that the first session includes at least one game parameter predetermined by the first member or the second member of the social network, wherein for at least a portion of the first session of the first game, gameplay by the first member or the second member is simulated based on the at least one predetermined game parameter, such that for at least a portion of the first session, a participant of the first session does not include the first member or the second member of the social network, and wherein the at least one predetermined game parameter includes a selection by the first member or the second member of the social network, prior to the first session of the first game, of one or more digital tokens for use in the first session, the one or more digital tokens being selected from digital tokens that the first member of the social network or the second member of the social network has rights to, such that the at least one predetermined game parameter for the first session is determined based on selection of the one or more digital tokens by the first member or the second member and selection of the first icon and/or the second icon by the user.
  10. The computer-readable storage medium of claim 10 , the instructions further comprising: sending a friend request to the second member of the social network on behalf of the user in response to the selection by the user selecting the second icon;in response to the second member of the social network accepting the friend request, registering the second member of the social network as a new friend of the user in the social network.
  11. The method of claim 1 , wherein, the first session includes a first set of tokens including first tokens, the first set of tokens being shared and identical between the user and an opposing player opposing to the user in the first session, and a plurality of second sets of tokens, the individual ones of the plurality of second sets of tokens including second tokens that are associated with a respective one of the user and the opposing player, the first session being further implemented such that execution of the first session includes;determining at least one of the first tokens for assignment to the user and the opposing player;receiving from at least one of the user and the opposing player an instruction indicating an use of at least one of the second tokens associated with the one of the user and the opposing player;implementing by a computer processor a first rule in the first online game based on the use of the at least one of the second tokens, the first rule including modifying an attribute of the at least one of the first tokens assigned to one of the user and the opposing player;and determining a winner of the first online game based on the modified attribute.
  12. The method of claim 12 , wherein the opposing player is one of a member of the computer-implemented social network or a simulated player using at least one predetermined game rule set by a member of the computer-implemented social network.
  13. The method of claim 1 , further comprising: presenting in the first session of the first game that the user may select use of a digital token;implementing by a computer processor a first rule in the first session of the first game based on a use of the digital token selected by the user;implementing and beginning a second session of a second game with the user, the second session including a presentation that the user may select use of the digital token, wherein the second session includes at least a different presentation and a different set of rules from the session;and implementing by a computer processor a second rule in the second session based on a use of the digital token selected by the user.
  14. The method of claim 14 , wherein: the first session includes presenting the user with a display including cards from a standard 52 card deck assigned to individual users playing the game;the first rule in the first session includes modifying an attribute of at least one of the cards assigned to the users playing the game;and the second online game includes a real-time strategy gameplay.
  15. The method of claim 14 , wherein the first online game and the second online game are provided in coordination with a social networking site.

Disclaimer: Data collected from the USPTO and may be malformed, incomplete, and/or otherwise inaccurate.