METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING E-TOKEN BASED ACCESS CONTROL FOR VIRTUAL WORLD SPACES
First Claim
1. A method for providing e-token based access control to virtual world (VW) spaces, comprising:
- intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network;
using a secret associated with the first VW member to generate an e-token, the e-token including a name or identifier of the second VW member and an identifier of the VW space;
sending the e-token inside the VW network for storage;
in response to a request, by the second VW member, for access to the VW space, sending the e-token outside of the VW network for verification; and
upon successful verification of the e-token outside of the VW network, accessing the VW network and controlling a guard bot residing inside the VW network to grant access to the second VW member with respect to the VW space;
wherein the guard bot adds the second VW member to an access control list for the VW space.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list.
-
Citations
6 Claims
-
1. A method for providing e-token based access control to virtual world (VW) spaces, comprising:
-
intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network; using a secret associated with the first VW member to generate an e-token, the e-token including a name or identifier of the second VW member and an identifier of the VW space; sending the e-token inside the VW network for storage; in response to a request, by the second VW member, for access to the VW space, sending the e-token outside of the VW network for verification; and upon successful verification of the e-token outside of the VW network, accessing the VW network and controlling a guard bot residing inside the VW network to grant access to the second VW member with respect to the VW space;
wherein the guard bot adds the second VW member to an access control list for the VW space. - View Dependent Claims (2, 3)
-
-
4. A system for providing e-token based access control to virtual world (VW) spaces, comprising:
-
a VW server; an administrator system executing a verification and tracking application; a first VW member system in communication with the VW server and the administrator system; and a proxy application and an e-tokenizer application executing on the first VW member system, the proxy application and the e-tokenizer application implementing a method, comprising; the proxy application intercepting a request from the first VW member system to invite a second VW member system to a VW space within a VW network, the request intercepted outside of the VW network; the e-tokenizer application using a secret code associated with the first VW member system to generate an e-token, the e-token including a name of identifier of the second VW member system and an identifier of the VW space; sending the e-token inside the VW network for storage; in response to a request, by the second VW member system, for access to the VW space, sending the e-token outside of the VW network to the verification and tracking application for verification; and upon successful verification of the e-token, the verification and tracking application accesses the VW network and controls a guard bot residing inside the VW network to grant access to the second VW member with respect to the VW space;
wherein the guard bot adds the second VW member to an access control list for the VW space. - View Dependent Claims (5, 6)
-
Specification