Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SPIRIT REALMS: ARMY, THRONE, BARRIER, WEAPON AND DEFENSE STACKING AND STOCKPILING TRADING CARD GAME
Document Type and Number:
WIPO Patent Application WO/2014/178953
Kind Code:
A2
Abstract:
Disclosed herein is a novel game that utilizes virtual or physical trading cards as game components. In one aspect of the game, game components/cards are used to build an army of minion, leader, and army cards, and further forming a perimeter comprising at least one of a barrier or fort card to protect a throne card. The goal is to destroy at least one of the barrier or fort cards by reducing the points of each to zero, thus capturing the opponent's throne card. The game involves strategy and chance, during which players create a deck for use against the deck(s) of one or more opposing players. The game may be played on various media, including, but not limited to, electronic game consoles, computers, and interactive and social media networks accessed using computers, cellular devices, tablets, etc.

Inventors:
COLON JULIO (US)
MACHADO ERICK (US)
Application Number:
PCT/US2014/027578
Publication Date:
November 06, 2014
Filing Date:
March 14, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
GERARD TED ANDRE LUCQUITO II (US)
International Classes:
A63F1/00
Foreign References:
US20060017229A12006-01-26
US7216870B12007-05-15
US6601851B12003-08-05
US20070235940A12007-10-11
US20020147039A12002-10-10
US5662332A1997-09-02
US20090295092A12009-12-03
Other References:
BOARDGAMEGEEK: 'Warhammer: Invasion (2009).' BOARDGAMEGEEK.COM, [Online] 2009, pages 1 - 3 Retrieved from the Internet:
MAGIC WIKI: 'Magic the Gathering: Rules.', [Online] 20 August 2012, pages 3 , 5 - 10 Retrieved from the Internet:
Attorney, Agent or Firm:
YANNEY, Pierre, R. et al. (180 Maiden LaneNew York, NY, US)
Download PDF:
Claims:
CLAIMS

1. A method of playing a card game by at least a first player and a second player, each player using at least a first playing deck, wherein each card in the first playing deck includes an attack point value, a defensive point value, the method comprising: selecting a first set of plurality of cards from the first playing deck; constructing a defensive perimeter using at least one of the first set plurality cards from said first playing deck around a throne card, wherein the defensive perimeter includes a defensive perimeter total value and at least one of an environment card, a fort card and a barrier card; determining which of the first and second players is eligible to initiate at least one action turn; performing the at least one action turn responsive to said determining, each action comprising at least one movement, wherein said movement includes at least one of the following:

(a) building an army, wherein the army includes an attack total

value,

(b) fortifying a defensive barrier using at least one structure card,

(c) attacking a defensive perimeter or an army of the second player,

(d) selecting at least one card from the first playing deck, and

(e) ending said action turn; and repeating said performing the at least one action turn for each player until the throne card of at least one of the players is captured and the defensive perimeter total value of the at least one of the players comprises a predetermined value.

2. The method of claim 1, wherein said building an army, comprises stacking at least a first minion card and a second leader card, and wherein the building comprising at least one of an attack point value of the first minion card and the second leader card added together to form the attack total value, and a defensive point value of the first minion card and the second leader card added together to form the defensive total value.

3. The method of claim 1, wherein attacking the defensive perimeter of the second player deducts the attack total value of the army from the defensive perimeter total value.

4. The method of claim 1, wherein fortifying the defensive barrier includes adding at least one of a second environment card, a second fort card, a second barrier card, a terrain card, a forge card or a blockade card.

5. The method of claim 1, wherein the attacking the army or the defensive perimeter of the second player utilizes at least one of an equipment card or an attribute included in a second set of plurality of cards comprising the army, wherein the attribute includes at least one attribute of elemental base, spiritual base, science base, power base, or diplomatic base.

6. The method of claim 5, wherein said attacking further causes damage when the attribute included in the second set of plurality of cards comprising the army matches another attribute included in the third set of plurality of cards comprising the army of the second player.

7. The method of claim 1, wherein the first set of plurality of cards comprise at least one strategy card including a blockade card, a corruption cards, a purity card, a magic card, a boost card, a character card, a weapon card, a siege card, a treachery card, a terrain card, an alliance card, and a tech card.

8. The method of claim 1 wherein a predetermined number of movements per action defines a wall to action of the first and second player, and wherein the wall to action of the first or second player increases when the first or second player takes more than the predetermined number of movements per action.

9. The method of claim 8, wherein stacking at least one of the structure card or equipment card on at least one minion card reduces the wall to action, and wherein stacking the at least one minion card on the at least one structure card or equipment card increases the wall to action.

10. The method of claim 1, wherein at least one of a minion card, an equipment card, an ability card, and the structure card is used to modify the performing the at least one of the attack and action turn.

11. The method of claim 1 wherein attacking the defensive perimeter or army of the second player comprises stockpiling a weapon card or an armor card on at least one of a leader card or a minion card, the stockpiling requiring a predetermined value to proceed with the attack.

12. The method of claim 1, wherein building the army or fortifying the defensive barrier further comprises combining at least a first and second card, the first and second card including a same glyph printed on a side of the first and second card.

13. The method of claim 4 wherein attacking the army of the second player destroys a minion card before a fort card or a barrier card can be destroyed.

14. A stacking and stockpiling trading card game, comprising: at least two throne cards, each throne card including a sovereign image and sovereign description text; at least two perimeter creation cards, each perimeter creation card including an perimeter image, perimeter defense text, and an attack-defense point characteristic; at least two environment cards including an environment image and environment instruction text, wherein the environment instruction text includes a point determinative; and a plurality of strategic cards, each strategic card comprising a strategic image and strategic instruction text, wherein the strategic instruction text includes state altering components.

15. The card game of claim 14, wherein at least one of the perimeter creation cards comprises at least a Fort card, a barrier card point value, and wherein the plurality of strategic cards comprises at least one minion card including a minion attack-defense point value.

16. A method of playing a stacking and stockpiling trading card game played by a plurality of players on a battlefield, the method comprising the steps of: (a) at least two players obtaining a plurality of cards in an initial deck;

(b) each player drawing an initial playing hand before inception of game play;

(c) each player maintaining a throne card in a passive state during the game unless the throne card is replaced by another card per predetermined rules of the game; and

(d) each player setting up before game play one fort, one barrier and one environment, or two fort cards and one environment cards to create a defensive perimeter in front of the throne card.

17. The method of claim 16, further comprising each player setting into game play a plurality of strategic cards comprising at least one of: a blockade card, a corruption cards, a purity card, a magic card, a boost card, a character card, a weapon card, a siege card, a treachery card, a terrain card, an alliance card, and a tech card;

18. The method of claim 16, further comprising consolidating a predetermined number of character cards used for attacking and destroying at least one of a barrier and a fort and capturing the throne card of another player.

19. The method of claim 16, further comprising the step of each player laying down cards to create a 360 degree perimeter in front of a throne card, and the perimeter is created to protect the throne card.

20. The method of claim 16, wherein the players control and manipulate a Wall to Action by increasing or the decreasing of player movements and opponents movements.

21. The method of claim 20, further comprising the step of combining cards in a passive state with cards in an active state to modify the Wall to Action to activate a Tribute.

22. The method of claim 16, further comprising the step of using a game card to control one or more cards outside of a class and a type of a player throne card.

23. The method of claim 16, further comprising the step of at least one of attacking and defending an opponent's barrier and/or fort cards utilizing one or more game components that are either in an active or in a passive in game play state.

24. The method of claim 16, further comprising the step of adding one or more game components to a fort card to increase both the offensive and defensive characteristics of the fort card.

25. The method of claim 20, further comprising the step of each player drawing at least one additional card to determine which player can maintain the Wall to Action, wherein the loser concedes to attack by the other player or is unable to attack.

26. The method of claim 16, further comprising the step of initiating a Quick Action Play wherein Quick ActionPlay determines which player is able to attack and automatically destroy at least one of a fort card or barrier card of another player.

27. The method of claim 16, further comprising the step of allowing a player to temporarily use an opponent's army or to disassemble the army for the remaining duration of the game where cards, which are in one of a passive or active state of play are used to modify the rules of game play.

28. The method of claim 20, further comprising the step of each player increasing the Wall to Action for an opponent by forcing the opponent to pay a penalty for going over a mandatory number of movements allowed per turn.

29. The method of claim 1 further comprising declaring a war and laying a siege on the defensive barriers of the second player, wherein a predetermined number of cards are selected from the first playing deck, and a highest amount of combined attack points and defensive points from the predetermined number of cards selected from the first playing deck wins the war.

30. The method of claim 1 further comprising an alternate mini-game wherein battling a strongest card of the first player battles with a strongest card of the second player from the first playing deck of the second player, the second player utilizing other cards from the first playing deck of the second player until the strongest card of the first player is defeated.

31. The method of claim 1 further comprising limiting a particular type of card in the first playing deck of at least one of the first or second player responsive to a number indicator on the card.

25

Description:
NON-PROVISIONAL SPECIFICATION

SPIRIT REALMS: ARMY, THRONE, BARRIER, WEAPON AND DEFENSE

STACKING AND STOCKPILING TRADING CARD GAME

CROSS REFERENCE TO RELATED APPLICATION

This application claims priority to U.S. Provisional Application No. 61/787,089, filed March 15, 2013, which is hereby incorporated by reference in its entirety.

Field of the Invention

The field of the present invention relates to games of strategy and chance and, particularly, stacking and stockpiling trading card games utilizing virtual or physical game components/cards for novel method of gameplay.

Description of Related Art

Trading cards are used by many as a way of distributing and collecting information about a variety of topics. Topics range from educational information to comic book and cartoon characters. Popular examples of trading cards include well-known characters from Dragonball Z, Naruto, and Pokemon.

Since 1993, the year the "Magic: The Gathering "trading card game (hereinafter "Magic") was released, the popularity of trading card games significantly increased. In these and other types of trading card games, cards are traded and/or exchanged among fans and enthusiasts. By trading and exchanging cards, they seek to complete individual sets or decks of cards, which are often not readily available for purchase. Collection of cards in this manner allows a player to build decks of cards for use during game play. During a game, a player will then draw cards at random, after shuffling a deck. Each player then executes a series of actions such as drawing and discarding cards, according to rules of play. Magic begins with each player placing his deck into a "library" and then drawing a set number of cards, namely seven (7) cards from the library. Magic cards are categorized into three basic card groups: character/creature cards, enhancing/land/mana cards, and variation/magic cards. Game play is based on "tapped" cards (cards placed sideways/horizontally) and "untapped" cards (cards placed straight up/vertically). Enhancing/land/mana cards allow a player to bring character/creature cards and variation/magic cards into play. In order to play one of these card types, a player must first "tap" an enhancing/land/mana card that is equal to the cost of mana (the cost characteristic), as indicated on the character/creature or variation/magic card. After each turn, a player "untaps" (turns straight/vertically) his "tapped" cards, draws a new card or cards from his "library" and, if any are left, plays one enhancing/land/mana card. These actions allow a player to bring a character/creature card into play and attack an opponent's card. Attack points (offensive characteristics) and defensive points (defensive characteristics) of the character/creature card(s) determine the outcome of an attack. One outcome is that either the player or his opponent has a card that "dies" and/or is destroyed. When this occurs one or more cards are placed in the "graveyard". The graveyard is a stack of cards that have been removed from the game for the remainder of gameplay.

The YU-GI-OH!™ trading card game (hereinafter "Yu-Gi-Oh") is another well-known card game, which was inspired by Magic. Differences between the two games include game jargon, card types, the numbering system for points, conflict naming (e.g. attacking an opponent vs. dueling with the opponent's monster cards), and the use of a side deck. Yu-Gi-Oh, for example, has equip, monster, spell and trap cards. Like Magic, Yu-Gi-Oh uses cards already in play to provide resources in order to continue and move the play of the game forward. Monster cards are used as enhancement cards that are "sacrificed" as payment to "summon" and bring other higher level monster cards and/or variation/spell cards into play. Yu-Gi-Oh utilizes a "turn based" system of play which uses "tapping". According to this system, if a monster card is placed face up and horizontally/sideways, then the card is in defensive mode where only the defensive points of the card are active and a player cannot use it to attack. When a monster card is placed vertically/straight up, the card is then considered to be in standard attack mode. In "turn based" play, each player is given the opportunity to do several things during a turn including but not limited to: 1) placing cards on the field of play in an attempt to lay a trap for an opponent by placing a trap and/or spell card face down, 2) putting a card on the field face up and vertically in attack mode or 3) placing a monster card on the field face up and horizontally in defense mode. This method of play utilizes strategies that allow the player(s) a chance to extend the conflict through the creation and use of new strategies. The player who has the best strategy and/or deck will become the winner.

While Magic, Yu-Gi-Oh, and other trading card games are useful for their intended purpose there is still a need for new and improved trading card games. The present invention fulfills this need and provides further related advantages as described below.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1-A shows one type of "throne" card.

FIG. 1-B shows one type of "minion" card.

FIG. 1-C shows one type of "leader" card.

FIG. 1-D shows one type of "fort" or "blockade" card.

FIG. 2-Ashows one type of "leash" card.

FIG. 2-B shows one type of "corruption" card.

FIG. 2-C shows one type of "ability" card.

FIG. 2-D shows one type of "ancient" card.

FIG. 3 -A shows one type of "alliance" and "treachery" card.

FIG. 3-B shows one type of "armor" card.

FIG. 3-C shows one type of "vehicle" card.

FIG. 3-D shows one type of "environment" card.

FIG. 4-A shows one type of "weapon" card.

FIG. 4-B shows one type of "army" card.

FIG. 5-A shows one type of "siege" card. FIG. 5-B shows one type of "relic or ancient relic" card. FIG. 6-A shows one type of "barrier" card. FIG. 6-B shows one type of "purity" card.

FIG. 7-A shows one example of stockpiling with a primary character card being stocked. FIG. 7-B shows an example of stockpiling with a secondary card.

FIG. 8-A shows one example of conscription stacking with the primary character leader card being stacked and an army that is created for attack.

FIG. 8-B shows an example of conscription stacking with secondary character leader cards being stacked onto the primary card shown in FIG. 8-A.

FIG. 8-C shows an example of conscription stacking with a tertiary character minion card being stacked onto a primary character leader card and secondary character leader cards.

FIG. 9-A shows one example of conscription stacking that creates a "loose" army.

FIG. 9-B shows an example of conscription stacking with a "swapped" and "condensed" army.

FIG. 10 illustrates the layout of a playing surface for two players.

FIG. 11 shows one example, illustrating the stockpiling of forts.

FIG. 12 shows one example of card placement on the layout in FIG. 10.

FIG. 13 shows an example of one type of card layout.

FIG. 14 shows an example of a cover layout for the game.

FIG. 15 shows another example of a type of card layout.

FIG. 16-A shows one type of "throne" card layout.

FIG. 16-B shows one type of "minion" card layout.

FIG. 16-C shows one type of "barrier/fort" card layout. FIG. 16-D shows one type of "environment" card layout.

FIG. 17-A shows one type of "greater minion" card layout.

FIG. 17-B shows one type of "siege" card layout.

FIG. 17-C shows one type of "leader" card layout.

FIG. 17-D shows one type of "weapon" card layout.

FIG. 18-A shows one type of "armor" card layout.

FIG. 18-B shows one type of "alliance" card layout.

FIG. 18-C shows one type of "treachery" card layout.

FIG. 18-D shows one type of "upgrade" card layout.

FIG. 19-A shows one type of "purity" card layout.

FIG. 19-B shows one type of "corruption" card layout.

FIG. 19-C shows one type of "nullify" card layout.

FIG. 19-D shows one type of "leash" card layout.

FIG. 20-A shows one type of "relics/ancient relics" card layout.

FIG. 20-B shows one type of "hallowed ground" card layout.

FIG. 20-C shows one type of "army" card layout.

FIG. 20-D shows one type of "ultimate purity" card layout.

FIG. 21 -A shows one type of "equip/tech" card layout.

FIG. 21-B shows one type of "boost/upgrade" card layout.

FIG. 21-C shows one type of "ability" card layout.

FIG. 21-D shows one type of "barrier" card layout. FIG. 22 shows a generalized computer network to facilitate game play.

FIG. 23 shows a detailed computer network to facilitate game play.

FIG. 24 shows a method of playing the game.

DETAILED DESCRIPTION

FIGs. 1-24 illustrate and describe game components/cards, game elements, and component/card layouts for a stacking and stockpiling trading card game 10. The game could be played by two or more players. The game could include a plurality of game components/cards 12, which could be in a virtual or physical form. A game component/card 12 may therefore have any shape and is not necessarily limited to a rectangular shape.

Game components/cards 12 can take varied forms. For example, game components/cards 12 may be hand-held trading cards. In other versions of the game, players may interact with virtual cards via gaming consoles, personal computers, cellular devices such as phones or tablets, and interactive applications and social media networks, which are accessed using computers, cellular devices, tablets, such that gaming components are displayed visually on a monitor or screen. Therefore, the present invention, including the tradable aspects thereof, is not limited to the embodiments described herein. In some embodiments, players use between 50 to 200 game cards/components during a game. Each game card/component 12 includes various images, indicia, text and/or other elements to facilitate game play, as shown in FIGs. 1A-6B, 13,15 and 16A - 21D. These figures each also illustrate a game component/card layout 15. FIG. 14 provides one example of a game cover 13, which includes SPIRIT REALMS™ trademark.

According to some embodiments, as illustrated in FIG. 15, each game card/component 12 may include a glyph/symbol 11 on a portion of the card and utilized to attack, defend, and modify character rules during game play. Each game card/component 12 may also include a number 15 printed on a portion of the card, indicating the maximum number of a particular card type a player may keep in their deck at a time.

FIG. 13 illustrates one embodiment wherein a game component/card layout 14 may include a title section 16, a point value section 18, a game card name section 20, an image 22, a symbol area 24 that includes one or more symbol areas 26, description text 30 and an artist acknowledgment text or copyright information area 32. These elements, however, may be designated according to specific categories that reflect the nature and purpose of the game component/card. The trading card game 10 may include, but is not limited to, one or more of the following categories of game components/cards:

• Throne card 40 - this card type is representative of a King piece in a chess game. As such, it is to be either protected or captured. This card cannot defend itself or attack other cards. Other cards, which are aligned with a specific throne cards, can have its point value boosted by association with a specific throne card. As shown in FIG. 1A, according to some embodiments, a throne card could include a sovereign image 42, a card type 44, sovereign description text 46, and artist acknowledgment text 32. In the throne card example shown in FIG. 1 A, a male sovereign is shown. The sovereign image may include other types of sovereigns including kings.

• In some embodiments, perimeter creation cards 50 can surround the throne card via perimeter 51 , as illustrated in FIG. 12, and also defends the throne card 40. Each perimeter creation card could include a perimeter image 52, which may include an image of a power 54 (e.g. a frozen tundra barrier) and perimeter defensive text 56 that describes the effect of the power, as illustrated in FIG. 6A. Perimeter creation cards 50, could include, but are not limited to, one or more of the following card types:

o Barrier cards 58 (FIG. 6 A)

o Fort cards 60 (FIG. 11)

• According to some embodiments, environment cards 62 can be strategically positioned at the start of the game. They determine which strategy the player utilizes during a game, by boosting some of a player's cards and reducing the attack/defense points of an opponent's cards. An environment card 62, in one embodiment, is illustrated in FIG. 3-D.

• Strategic cards 64 affect strategic game play. As illustrated in FIG. 1-C, these types of cards could include a strategic image 66 and strategic instruction text 68, which may also include one or more strategic altering components 70. The strategic image 66, strategic instruction text 68, and the strategic altering components 70 may be used alone or in some combination to indicate the type of strategy employed by the card. The remaining cards in the deck are considered strategic cards. These cards could include, but are not limited to one or more of the following: Corruption cards, Purity cards, Magic cards, Boost cards, Character cards, Weapon cards, Siege cards, Treachery cards, Alliance cards, Equip cards, and Tech cards. Each strategic card could also include strategic instruction text 68, with state altering components 70 and a strategic image 66. The state altering components 70 allow a player to change game components and rules of play. State altering components 70 include, but are not limited to, changing or modifying the effects of one or more of the following: game cards/components, existing rules, and a player's fort, barrier or minion card value, which requires both the elimination of other game components and the suspension of one or more rules of play. Strategic cards, could include, but are not limited to, one or more of the following card types:

o Minion, Greater Minion, or Pet cards 74; FIG. 1-B

o Leader cards 84; FIG. 1-C

o Blockade or Fort cards 72; FIG. 1-D

o Leash cards 73; FIG. 2-A

o Corruption cards 76; FIG. 2-B

o Ability cards 83; FIG. 2-C

o Ancient cards 200; FIG. 2-D

o Treachery 90 and Alliance cards 92; FIG.3-A

o Armor cards 95; FIG.3-B

o Vehicle cards 201; FIG. 3-C

o Weapon cards 83; FIG. 4-A

o Army cards 81 ; FIG.4-B

o Siege cards 88; FIG. 5-A

o Relics or Ancient Relics 79; FIG. 5-B

o Purity or Ultimate Purity cards 78; FIG.6-B

o Boost/Upgrade cards 82; FIG. 18-D

o Equip/tech cards 94; FIG. 21 -A

o Barrier cards 58; FIG. 6-A

In another embodiment, game component/cards 12 can be traded by each player to create individual playing decks. While game components/cards may be duplicated, some cards may have fewer duplicates than others. For example, one type of throne card may be sold as a limited edition card.

In some alternative embodiments, players established their decks by drawing a plurality of cards from their respective deck. The initial plurality of cards drawn by each player could range between five and seven cards. Each player will position a drawing deck 96, a reserve deck 98, and a void deck 100 on a virtual, physical, or imaginary gaming areal02. The gaming area 102 includes a battlefield 106 for each player. FIG. 10 shows one example of a gaming area 102 including a first battle field 106a for player one and a second battlefield 106b for player two.

FIG. 12 shows one possible arrangement of the drawing deck 96, the reserve deck 98, the void deck 100, the throne card 40, the Environment card 62, and the perimeter creation cards 50 ( a Barrier card 58 and a Fort card 60) on a battlefield 106. Each game component/card 12 is considered to be either in an "active" or a "passive" state of play. The throne card, for example, remains in a "passive state" for the duration of the game unless it is replaced with another card per game rules. Cards are considered "in play" whether on the field, in a hand or in the deck. In any of these states of play a game component/card can be attacked, defended, or modified.

In another embodiment, at the beginning of the game, a player will set up a defensive perimeter 108 near or around the throne card. This perimeter could include at least (1) one fort, one barrier and one environment, or (2) two fort cards and one environment card. To create a perimeter, a player positions cards on his/her battlefield such that the perimeter cards surround the throne card. The perimeter may be positioned near or around the throne card in any manner. In some arrangements, however, the perimeter cards encircle the throne card such that a 360° perimeter is established. As more perimeter cards are obtained, a wider perimeter may be established.

During a turn, a player is provided with a maximum number of "movements" to complete an "Action." The player consolidates a certain number of game components, in a strategic and specific way, to create a new set of cards for attacking and destroying an opponent's perimeter such that the throne card can be captured.

The game also includes a method for tracking barrier and/or fort value(s) so that players know that when their barrier and/or fort value(s) have been reduced to zero and the throne card captured thereby eliminates the player from the game. Players are also allowed to combine characteristics, powers and/or abilities of two or more cards through two systems called "Conscription" stacking and "Stockpiling."

In some embodiments, boost cards, ability cards, magic cards, blockade cards, siege cards, and character cards could affect a player or their opponent's cards. In another embodiment, players take turns executing a sequence of actions, each sequence is called an "Action" and each step in an "Action" is called a "Movement." A movement could comprise of drawing, playing and discarding cards in accordance with the rules of play until the game ends. For initial game play, each player can make five active and/or passive actions to play per stage. In a typical battle, each player has a defensive value assigned to two barrier or two fort cards or one barrier and one fort card. When a player's barrier card(s) and/or fort card(s) defensive value has been reduced to zero (0) and the throne card is attacked and captured, the player is eliminated from the game.

In other embodiments, each player is required to create an army. Army creation could be accomplished by selecting and combining a chosen "leader" card with lower ranking minion cards and/or lower ranking leader cards, called "conscription" stacking. Specifically, "Conscription" stacking, as shown in FIG. 8-Athru 8-C, is the act of placing at least one minion card or leader card ,on top of a primary leader card at the lower half of the card, with the specific purpose of creating an army. The attack value of the cards being stacked onto a leader card, including the leader card, must total, in this embodiment, at least 2,500 attack points before a player is able to attack the opponent's barrier card and/or fort cards that are protecting the throne card. A player can swap out his combined minion cards and/or leader cards known as a "loose army" for a singular army card, as shown in FIG-9-A and FIG. 9-B. A leader card, in this embodiment, regardless of its attack value, cannot attack a barrier card or fort card without being combined with minion cards or at least one army card. Each player is given two slots that lay just before the throne card as shown in FIG- 12. In one embodiment, each player will utilize minion cards to create armies. These armies are used to attack and destroy blockade cards (e.g. barrier cards and fort cards). Once the blockade cards have been destroyed the player then uses an army or another card with at least 2500 attack points for a final attack sequence to capture the throne card.

In some methods of playing the game, each player selects and "stockpiles" a particular fort card or leader card, which enables each player to forgo creating an army. "Stockpiling" a leader card, as shown in FIG. 7-A thru 7-B, is the act of placing a single weapon card (offensive characteristic), a single armor card (defensive characteristic), or a plurality of weapon and/or armor cards under or on top of a main card. Cards with attack points only are placed at the top left corner of the main card and cards with defense points only and cards with both attack and defense points, are placed in the top right corner, wherein the offensive characteristic (attack points) and/or the defensive characteristic (defense points) are added together. Alternatively, when stockpiling a fort, the throne card must be present, wherein the weapon cards (attack characteristic) and the barrier cards (defensive characteristic) are placed on the outer edges of the Fort cards as shown in FIG. 11. Weapon cards are placed on the upper edges whereas barrier cards are placed on the lower edges of the fort cards.

In an alternative embodiment, each player can agree to forgo the creation of their armies or can sacrifice their armies, and instead stockpile one of the aforementioned cards to a predetermined attack value and/or defense value. Each player stockpiles one or more character cards using only the cards in his "hand." The player that has stockpiled his cards to at least 2500 attack points can attack both his opponent's minions and/or the barrier cards that remain until each defense value reaches zero. Once the defensive value of a player's primary barriers protecting the throne card reaches zero and the throne card is captured, the game is over. In accordance with another method of the game, according to some embodiments, players can play a siege card on the field to lower the "Wall to Action," which enables a player to attack an opponent's fort and/or barrier cards without having the required amount of attack points. At any point during the turn, when a siege card is being played, the other player can counter by playing a blockade card. Each player must then draw five cards from either their reserve or regular deck, and lay them in a row as shown in FIG. 13. The player who started the siege also has the option of using any army card(s) the player has in play on the field. Once each player utilizes all five cards, the player who played the siege must count their card's attack points and his opponent must count his own cards defense points. The player who has the most combined points of their characteristic can attack their opponent's barriers. During the siege part of the game, cards with no attack points or defense points are counted as zero (0).

Alternatively, according to some embodiments, during the game's siege portion, players can opt to have each individual card stand on its own, wherein every card, whether it has an offensive characteristic, defensive characteristic or neither, can be utilized during the siege phase of the game.

In another method of play, according to some embodiments, each player can steal an opponent's armies and use them to create a defensive perimeter. If an opponent is forced to attack their own army after a player steals it, the opponent loses the game. A player can steal an opponent's character, weapons and armor cards with the use of "passive" state cards such as, but not limited to, one or more of a treachery, alliance or corruption card. When an armor or weapon card has been stolen, it is turned in the opposite direction. Furthermore, when a player has lost an army to an opponent, the leader card is placed at the bottom of the conscription stacked cards and all cards in the combined stack are turned in the opposite direction. Once this happens, the player is forced to attack and remove this "lost army" from play first before he can attack his opponent's cards in the first movement of their next turn.

In one method of game play, according to another embodiment, a battle arena card enables a player to select a 'champion' from his deck. While playing this card, a player cannot use any other card. The opponent must keep drawing and playing his cards to battle the 'champion' until the 'champion' is defeated. The challenging card always goes first. The winning card does not remain on the battlefield and returns to the bottom of the deck. This card can only be removed after the 'champion' has been defeated. Normal play will not continue unless this card is removed. If the 'champion' cannot be defeated, it automatically captures the opponent's Throne.

Another method of game play, according to some embodiments, is based on reducing or increasing the "Wall to Action" which can be described as the number of steps or "movements" in an "Action" required to execute a certain outcome. Each player is given five movements per turn to execute an action. A player can reduce the number of movements or increase the number of movements for an opponent. In this way, a player can also reduce the time it takes to complete a particular action. Players who are able to reduce the "Wall to Action" for themselves can, amongst other options, add more barrier cards, set up to three more cards to surround the throne card, or build armies faster. Players who increase the "Wall to Action" for opponents can, amongst other options, keep their opponents from building armies or adding more barriers to their perimeter.

Another method of game play, according to some embodiments, is based on the form of play where a player is able to sacrifice one of their armies on the field in order to add an extra fort card to the perimeter of his throne card. A player can sacrifice up to a total of four armies in order to create a wider perimeter of forts to protect the throne card. Another method of game play, according to some embodiments, is based on each player obtaining an opening hand of at least 54 cards, of which their deck comprises. Each player must execute a turn in order to play a minion, leader and other aforementioned cards, i.e. FIG-1 A thru FIG-6D to attack, defend and modify the game rules, with the intention of destroying or remove an opponent's barrier cards to capture the throne card. The steps, each known as an Action, comprise a predetermined number of movements. A player can perform, but is not limited to, the following action sequence:

First Action

1. Lay down a throne card and the place two fort cards or one fort card and one barrier card directly in front of the throne card to create a perimeter. In addition, place one Environment card either to the right or left of the perimeter.

2. During the first play ONLY, play one character card at the same time to determine who is first. The player with the highest attack point value proceeds first.

Second Action

1. Draw five to seven cards from a deck to your hand.

2. Lay down one army, minion or leader card on to the battlefield.

Third Action

1. Primary Movements include at least one of, but are not limited to, the following: a. Attack - Attack an opponent's minion, army, barrier or fort. In one embodiment, An opponent's Minions on the field should be destroyed before the fort or primary barriers are attached, unless a siege card is used.

b. Stay - A player allows both his card and an opponent's card to stay on the field of battle unharmed. During this stage, each player is allowed to place one extra card on the battlefield without losing a turn, which includes, but is not limited to: i. Add at least one card to (i.e., an army, minion or leader card) in an effort to create, grow or swap an army, ii. Place at least one card on the field from a deck or hand in an effort to modify game rules in the next movement,

iii. Set up a new environment,

iv. Stockpile forts with either one barrier or one weapon card,

v. Lay down a blockade card,

vi. Create and place up to five cards into a reserve deck; only if Toys in the Attic card is in play.

c. Defend - A player can chose not to attack but rather allow his opponent to attack and use counter moves. Alternatively, in some embodiments, a player may place an environment card face down, resonate, or synch the environment card with other cards. A player can also choose to add more barriers to widen the perimeter around his throne card by sacrificing an army.

d. Build or Break - A player can "build" or "break" an alliance by playing an alliance or treachery card. A player can also re-enforce his barriers after a siege. Furthermore, a player can lay down leader and minion cards to create an army; See "Conscription" stacking.

e. Siege - A player may play a siege card such as War, which lowers the "Wall to Action." By lowering the "Wall to Action," a player no longer has to create an army or have a minimum amount of 2500 attack points in order to attack an opponent's barriers and/or forts.

f. Blockade - A player may play a blockade card, which increases the "Wall to Action" by setting up an immediate defense to any siege, at which point each player must draw five cards and place them in a row facing each other. The player with the most attack points relative to the opponent's defense points wins this part of the game.

g. Attrition - The action of stealing an opponent's weapons, armor and armies and using them to form a perimeter to defend your throne card. In order to win, an opponent is forced to destroy their cards before an opponent attacks a player's cards. Destroying cards compromises the opponent's ability to attack and defend their barrier and fort cards.

h. Conscription - Combining at least two, but no more than five character cards, to create an army with a primary leader card at the top and the remaining cards below it, as illustrated in FIG. 8A thru 8-D. i. Stockpile/Stockpiling - The action of combining an army, leader, or minion card with one armor or weapon card or a fort card with one weapon or barrier card, unless otherwise stated in rules of play.

j. Swapping - Swap out any "loose" armies created with minion or leader cards for a "condensed" army within the same type and class. A condensed army comprises a combined army of undead minions (e.g. two or more undead minion cards), of which can only be swapped with a single army card of undead minions, unless otherwise stated on the card or in the rules of the game system.

k. Synching - The action of combining two or more cards, including but not limited to, army cards and "loose" and/or "condensed" armies through the use of a tertiary card for a particular action (i.e. attack, defense or modifying game rules).

1. Resonance/Resonate - The action of combining cards with the same glyphs printed on the card for the purpose of attack, defense, modifying character cards or modifying rules of play.

m. Quick Action Play- This is a form of play wherein, if a player cannot form an army or stockpile a leader or fort, the player can battle using the cards left in his hand and/or deck(s). The battle comprises either of (1) simultaneously playing five cards face up with the opponent or (2) laying down five cards face down each turn and simultaneously turn them face up. For both forms of play a player accrues wins when his card's attack points is higher than the opponent's defensive points. Furthermore, in both forms of play, the player with the most wins within three turns automatically destroys one of the barriers or forts protecting a throne card. If there are cards with no attack or defense points the following rules, of which are not limiting, apply: Character cards beat Ability/Equip cards, Ability/Equip cards beat Magic cards, Magic cards beat Character cards and Structure cards beat all cards.

n. Leash - This group of cards is designed for the purpose of controlling a Greater

Minion "Pet" card, that is not of the same class or type as the player's throne card.

"Pet" cards are Greater Minion cards that can only be used on specific throne cards. Leash cards allow a player to control another throne's pet for a limited number of turns. Leash cards also allows a player to both decrease his "Wall to

Action" and increase his opponent's "Wall to Action." Increasing an opponent's

"Wall to Action" allows a player to harness a Greater Minion of a different class or type with a higher attack and defensive characteristic without having to utilize the throne or leader card necessary to have the Greater Minion on the field of play.

o. Tribute - This is a form of play where a player penalizes an opponent for going over the number of movements allowed per turn. The penalty comprises, but is not limited to, the sacrifice of a high level character card, such as a Greater Minion or an Army card, for a predetermined number of turns. A player forces the opponent into a "Wall" for up to two turns. The player then turns his card or cards face down, which then prevents the opponent from attacking the face down cards until a "Wall," expires. A "Wall" can last for more than two turns. Another form of penalty is forcing your opponent to discard one of his cards.

FIG. 22 illustrates a generalized schematic diagram of a system 2200 on which an interactive user display application may be implemented in accordance with some embodiments of the present invention. As illustrated, system 2200 may include one or more workstations 2202. Workstations 2202 may be local to each other or remote from each other. Workstations 2202 are connected by one or more communications links 2204 to a communications network 206 that is linked via a communications link 2208 to a server 2210.

System 2200 may include one or more servers 2210. Server 2210 may be any suitable server for providing access to the application, such as a processor, a computer, a data processing device, or a combination of such devices. Communications network 2206 may be any suitable computer network including the Internet, an intranet, a wide-area network ("WAN"), a local-area network ("LAN"), a wireless network, a digital subscriber line ("DSL") network, a frame relay network, an asynchronous transfer mode ("ATM") network, a virtual private network ("VPN"), or any combination of any of such networks. Communications links 2204 and 2208 may be any communications links suitable for communicating data between workstation 2202 and server 2210, such as network links, dial-up links, wireless links, hard- wired links, any other suitable communications links, or a combination of such links. Workstations 2202 enable a user to access features of the application. Workstation 2202 may be personal computers, laptop computers, mainframe computers, dumb terminals, data displays, Internet browsers, personal digital assistants ("PDAs"), smartphones, tablets, multimedia devices, two-way pagers, wireless terminals, cellular phones, portable telephones, handheld devices, any other suitable access device, or any combination of such devices. Workstations 2202 and server 2210 may be located at any suitable location. In one embodiment, workstations 2202 and server 2210 may be located within an organization. Alternatively, workstations 2202 and server 2210 may be distributed between multiple organizations.

The server and one of the workstation computers, which are depicted in FIG. 22, are illustrated in more detail in FIG. 23. Referring to FIG. 23, workstation 2202 may include processor 2302, display 2304, input device 2306, and memory 2308, which may be

interconnected. In another embodiment, memory 2308 contains a storage device for storing a workstation program for controlling processor 2302.

Processor 2302 uses the workstation program to present on display 2304 the application and the data received through communications link 2204 and commands and values transmitted by a user of workstation 2202. It should also be noted that data received through

communications link 2204 or any other communications links may be received from any suitable source. Input device 2206 may be a computer or device keyboard, a cursor-controller, dial, switch bank, lever, or any other suitable input device as would be used by a designer of input systems or process control systems. In some embodiments, input device 2206 may be an instrument with a Musical Instrument Digital Interface (MIDI), which enables, computers, and other suitable equipment to communicate, control, and synchronize with each other.

Server 2210 may include processor 2320, display 2322, input device 2324, and memory 2326, which may be interconnected. In some embodiments, memory 2326 contains a storage device for storing data received through communications link 2208 or through other links, and also receives commands and values transmitted by one or more users. The storage device further contains a server program for controlling processor 2320.

In some embodiments, the application may include an application program interface (not shown), or alternatively, the application may be resident in the memory of workstation 2202 or server 2210. In another suitable embodiment, the only distribution to workstation 2202 may be a graphical user interface ("GUI") which allows a user to interact with the application resident at, for example, server 2210.

In one particular embodiment, the application may include client-side software, hardware, or both. For example, the application may encompass one or more Web-pages or Web-page portions (e.g., via any suitable encoding, such as HyperText Markup Language ("HTML"), Dynamic HyperText Markup Language ("DHTML"), Extensible Markup Language ("XML"), JavaServer Pages ("JSP"), Active Server Pages ("ASP"), Cold Fusion, or any other suitable approaches).

Although the application is described herein as being implemented on a workstation and/or server, this is only illustrative. The application may be implemented on any suitable platform (e.g., a personal computer ("PC"), a mainframe computer, a dumb terminal, a data display, a two-way pager, a wireless terminal, a portable telephone, a portable computer, an automobile PC, a laptop computer, tablet, multimedia device, a cellular phone, a personal digital assistant ("PDA"), smartphone, etc., to provide such features.

It will also be understood that the detailed description herein may be presented in terms of program procedures executed on a computer or network of computers, which represents well known systems to implement the instant invention. These procedural descriptions and

representations are the means used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art.

FIG. 24 describes a method of game play, wherein players first build a defensive perimeter by selecting a throne card, in addition to a combination of fort, barrier, and

environment cards. Players then build a starting hand by shuffling a first playing deck and selecting the first five cards from the top of the deck. Next, players battle for the first turn by selecting the first card from the top of the deck, wherein the players compare the attack points of their respective selected card; the player with the higher attack value proceeds first. After, the first player initiates an action turn by performing five movements, which include, but are not limited to, at least one of the following actions: selecting two cards from the player's first deck, build an army, defend barriers, attack the opponent's army or defensive barrier, or stay. Once the opponent's defensive barrier reaches zero and their throne is captured, the game concludes.

Another feature of the present invention, according to some embodiments, is the limited availability of cards, of which are collectables. The limited availability of particular cards encourages players to trade for more powerful, rarer cards. In addition, players can complete a set of cards for both game playing and for collecting purposes. The method of play can be expanded to include a winner taking one or more of the loser's cards at the end of the game or tournament. However, many players are unwilling to utilize uncommon, unique or rare cards in this method of play. As such, an unlimited version, comprising of all card types, can be made available. In this sense, the current invention embodying unique game concepts and components can be modified within the spirit and the scope of the invention.

The terms and expressions that have been employed in this specification are used as terms of description rather than limitations, and are not intended to exclude equivalents of the features shown and described herein .