SYSTEM AND METHOD FOR PERFORMING SECURITY TASKS
First Claim
1. An avatar engine, comprising a controller to:
- retrieve a profile of a user;
present the user an avatar having characteristics that correlate to the profile;
detect one or more responses of the user during a communication exchange between the avatar and the user;
identify a request of the user to apply a security protocol to a task identified in the request;
retrieve the security protocol;
engage in the task according to the security protocol;
detect while engaged in the task a breach in the security protocol;
identify a communication device of the user to engage in a communication session with the user;
establish a communication session with the communication device; and
present by way of the communication device the avatar describing the security breach.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that incorporates teachings of the present disclosure may include, for example, an avatar engine having a controller to retrieve a profile of a user, present the user an avatar having characteristics that correlate to the profile, detect one or more responses of the user during a communication exchange between the avatar and the user, identify a request of the user to apply a security protocol to a task identified in the request, retrieve the security protocol, engage in the task according to the security protocol, detect while engaged in the task a breach in the security protocol, identify a communication device of the user to engage in a communication session with the user, establish a communication session with the communication device, and present by way of the communication device the avatar describing the security breach. Other embodiments are disclosed.
36 Citations
25 Claims
-
1. An avatar engine, comprising a controller to:
-
retrieve a profile of a user; present the user an avatar having characteristics that correlate to the profile; detect one or more responses of the user during a communication exchange between the avatar and the user; identify a request of the user to apply a security protocol to a task identified in the request; retrieve the security protocol; engage in the task according to the security protocol; detect while engaged in the task a breach in the security protocol; identify a communication device of the user to engage in a communication session with the user; establish a communication session with the communication device; and present by way of the communication device the avatar describing the security breach. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage medium, comprising computer instructions for:
-
presenting a user an avatar having characteristics that correlate to a profile of the user; identifying a request to apply a security protocol to a task from a communication exchange between the user and the avatar; engaging in the task according to the security protocol; detecting a breach in the security protocol while engaged in the task; and notifying the user of the security breach by way of the avatar. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
- 22. In an avatar engine, a method, comprising engaging in a task according to a security protocol responsive to detecting a request to engage in the task from a communication exchange between a user and an avatar.
Specification