PREVENTING PROPAGATION OF MALICIOUS CONTENT IN A VIRTUAL UNIVERSE
First Claim
1. A method for preventing propagation of malicious content within a virtual universe, comprising:
- scanning a plurality of inventory items within a virtual universe;
identifying a set of malicious inventory items from the plurality of inventory items; and
preventing propagation of malicious content within the virtual universe by performing at least one of the following;
isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items.
2 Assignments
0 Petitions
Accused Products
Abstract
An invention for preventing propagation of malicious content within a virtual universe is provided. In one embodiment, a malicious content propagation prevention tool provides this capability. The malicious content propagation prevention tool includes a scanning component configured to scan a plurality of inventory items within a virtual universe. An identification component is configured to identify a set of malicious inventory from the plurality of inventory items. The malicious content propagation prevention tool further comprises an assurance component configured to prevent propagation of malicious content within the virtual universe by performing at least one of the following: isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items.
29 Citations
24 Claims
-
1. A method for preventing propagation of malicious content within a virtual universe, comprising:
-
scanning a plurality of inventory items within a virtual universe; identifying a set of malicious inventory items from the plurality of inventory items; and preventing propagation of malicious content within the virtual universe by performing at least one of the following;
isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system for preventing propagation of malicious content within a virtual universe, comprising:
-
at least one processing unit; memory operably associated with the at least one processing unit; and a malicious content propagation prevention tool storable in memory and executable by the at least one processing unit, the malicious content propagation prevention tool comprising; a scanning component configured to scan a plurality of inventory items within a virtual universe; an identification component configured to identify a set of malicious inventory items from the plurality of inventory items; and an assurance component configured to prevent propagation of malicious content within the virtual universe by performing at least one of the following;
isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-readable medium storing computer instructions, which when executed, enables a computer system to prevent propagation of malicious content within a virtual universe, the computer instructions comprising:
-
scanning a plurality of inventory items within a virtual universe; identifying a set of malicious inventory items from the plurality of inventory items; and preventing propagation of malicious content within the virtual universe by performing at least one of the following;
isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for deploying a malicious content propagation prevention tool for use in a computer system that prevents propagation of malicious content within a virtual universe, comprising:
providing a computer infrastructure operable to; scan a plurality of inventory items within a virtual universe; identify a set of malicious inventory items from the plurality of inventory items; and prevent propagation of malicious content within the virtual universe by performing at least one of the following;
isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items.- View Dependent Claims (20, 21, 22, 23, 24)
Specification