EVIDENCE-BASED VIRTUAL WORLD VISUALIZATION
First Claim
1. A computer-implemented method for providing evidence-based virtual world visualization, the computer-implemented method comprising computer-implemented operations for:
- receiving evidence;
determining whether the evidence is sufficient to determine whether to block transmission of virtual world data to a client device;
in response to determining that the evidence is sufficient to determine whether to block transmission of the virtual world data to the client device, determining whether to block transmission of the virtual world data to the client device based on the evidence; and
in response to determining to block transmission of the virtual world data to the client device based on the evidence, transforming a data protection and abstraction module to a first state that blocks the transmission of the virtual world data to the client device.
2 Assignments
0 Petitions
Accused Products
Abstract
When evidence is received, a determination is made as to whether the evidence is sufficient to determine whether to block transmission of virtual world data to a client device. If it is determined that the evidence is sufficient, then another determination is made as to whether to block transmission of virtual world data to the client device based on the evidence. If it is determined to block transmission of virtual world data to the client, a data protection and abstraction module is transformed to a first state that blocks transmission of the virtual world data to the client device.
-
Citations
20 Claims
-
1. A computer-implemented method for providing evidence-based virtual world visualization, the computer-implemented method comprising computer-implemented operations for:
-
receiving evidence; determining whether the evidence is sufficient to determine whether to block transmission of virtual world data to a client device; in response to determining that the evidence is sufficient to determine whether to block transmission of the virtual world data to the client device, determining whether to block transmission of the virtual world data to the client device based on the evidence; and in response to determining to block transmission of the virtual world data to the client device based on the evidence, transforming a data protection and abstraction module to a first state that blocks the transmission of the virtual world data to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system, comprising:
-
a processor; a memory operatively coupled to the processor; an evidence collection module (i) which executes in the processor from the memory and (ii) which, when executed by the processor, causes the computer system to obtain evidence by collecting evidence through a push-based process, providing the evidence to a server module, receiving a request for additional evidence, in response to receiving the request to collect additional evidence, collecting the additional evidence through a query-based process, and upon collecting the additional evidence, providing the additional evidence to the server module; and the server module (i) which executes in the processor from the memory and (ii) which, when executed by the processor, causes the computer system to provide evidence-based virtual world visualization by receiving the evidence from the evidence collection module, determining whether the evidence is sufficient to determine whether to block transmission of virtual world data to a client device over a network, in response to determining that the evidence is sufficient to determine whether to block transmission of the virtual world data to the client device, determining whether to block transmission of the virtual world data to the client device over the network based on the evidence, in response to determining to block transmission of the virtual world data to the client device based on the evidence, transforming a data protection and abstraction module to a first state that blocks transmission of the virtual world data to the client device over the network, and in response to determining to permit transmission of virtual world data to the client device based on the evidence, transforming the data protection and abstraction module to a second state that permits transmission of the virtual world data to the client device over the network. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-storage medium having computer-executable instructions stored thereon which, when executed by a computer, cause the computer to:
-
receive evidence from an evidence collection module, the evidence comprising information regarding a virtual world and information regarding a real world; determine whether the evidence is sufficient to determine whether to block transmission of a virtual object to a client computer over a network, the client computer operative to render the virtual object for display; in response to determining that the evidence is not sufficient to determine whether to block transmission of the virtual object to the client computer, transmit a request to the evidence collection module for additional evidence, and upon transmitting the request to the evidence collection module for the additional evidence, receive the additional evidence from the evidence collection module; in response to determining that the evidence is sufficient to determine whether to block transmission of the virtual object to the client computer, determine whether to block transmission of the virtual object to the client computer over the network based on the received evidence; and in response to determining to block transmission of the virtual object to the client computer based on the received evidence, transform a data protection and abstraction module to a first state that blocks transmission of the virtual object to the client computer over the network; and in response to determining to permit transmission of the virtual object to the client computer based on the evidence, transform the data protection and abstraction module to a second state that permits transmission of the virtual object to the client computer over the network. - View Dependent Claims (17, 18, 19, 20)
-
Specification