System and method for secure networking in a virtual space
First Claim
1. A system for secure networking in a virtual space comprising:
- a network;
subscriber computing devices, wherein the subscriber computing device is associated with a subscriber identifier and wherein each computing device is connected to the network;
a profile datastore, wherein the profile datastore comprises a subscriber security profile comprising information indicative of a security status of a subscriber and wherein the subscriber security profile is associated with the subscriber'"'"'s subscriber identifier;
an information processor connected to the network, wherein the information processor comprises instructions for;
monitoring subscriber identifiers associated with the subscriber devices that are logged into a website, wherein the website defines a virtual space and the logged-in subscriber devices are characterized as present in the virtual space;
serving web pages to the computing devices of the present subscribers via the network, wherein a web page of a present subscriber comprises a subscriber icon associated with the present subscriber and subscriber icons of other present subscribers;
determining whether a subscriber security profile associated with the present subscriber matches the subscriber security profiles associated with the other present subscribers according to security matching criteria (herein, the “
security matching determination”
);
in response to the security matching determination, assigning a security attribute to the icons associated with the other present subscribers having security profiles that match the security profile of the present subscriber according to security matching criteria; and
providing selected security profile information to the present subscriber of a selected one of any of the other present matching subscribers.
3 Assignments
0 Petitions
Accused Products
Abstract
Secure networking in a virtual space over a network. Subscriber computing devices each operated by a subscriber are associated with a subscriber identifier. Each computing device is connected to the network. A subscriber security profile is created in a security profile datastore, wherein the subscriber security profile comprises information indicative of a security status and wherein the subscriber security profile is associated with the subscriber'"'"'s subscriber identifier. Subscriber identifiers associated with subscribers who are logged in to a website are monitored. The website defines a virtual space and the logged-in subscribers are characterized as present in the virtual space. A web page is served to the computing devices of the present subscribers via the network. The web page of a first subscriber comprises a first subscriber icon associated with the first subscriber and subscriber icons of other present subscribers. A determination is made whether the first subscriber security profile matches the subscriber security profile of one or more of the other present subscribers according to security matching criteria. An attribute is assigned to the icons of the other present subscribers having security profiles that match the security profile of the first subscriber according to security matching criteria. Selected security profile information is provided to the first subscriber of a selected one of any of the other present matching subscribers.
-
Citations
20 Claims
-
1. A system for secure networking in a virtual space comprising:
-
a network; subscriber computing devices, wherein the subscriber computing device is associated with a subscriber identifier and wherein each computing device is connected to the network; a profile datastore, wherein the profile datastore comprises a subscriber security profile comprising information indicative of a security status of a subscriber and wherein the subscriber security profile is associated with the subscriber'"'"'s subscriber identifier; an information processor connected to the network, wherein the information processor comprises instructions for; monitoring subscriber identifiers associated with the subscriber devices that are logged into a website, wherein the website defines a virtual space and the logged-in subscriber devices are characterized as present in the virtual space; serving web pages to the computing devices of the present subscribers via the network, wherein a web page of a present subscriber comprises a subscriber icon associated with the present subscriber and subscriber icons of other present subscribers; determining whether a subscriber security profile associated with the present subscriber matches the subscriber security profiles associated with the other present subscribers according to security matching criteria (herein, the “
security matching determination”
);in response to the security matching determination, assigning a security attribute to the icons associated with the other present subscribers having security profiles that match the security profile of the present subscriber according to security matching criteria; and providing selected security profile information to the present subscriber of a selected one of any of the other present matching subscribers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for secure networking in a virtual space over a network comprising:
-
associating subscriber computing devices with subscriber identifiers, wherein each computing device is connected to the network; creating a subscriber security profile in a profile datastore, wherein the subscriber security profile comprises information indicative of a security status of a subscriber and wherein the subscriber security profile is associated with the subscriber'"'"'s subscriber identifier; monitoring subscriber identifiers associated with the subscriber devices that are logged in to a website, wherein the website defines a virtual space and the logged-in subscriber devices are characterized as present in the virtual space; serving web pages to the computing devices of the present subscribers via the network, wherein a web page of a present subscriber comprises a subscriber icon associated with the present subscriber and subscriber icons of other present subscribers; determining whether a security profile associated with the present subscriber matches the subscriber security profiles associates with the other present subscribers according to security matching criteria (herein, the “
security matching determination”
);in response to the security matching determination, assigning a security attribute to the icons of the other present subscribers having security profiles that match the security profile of the present subscriber according to security matching criteria; and providing selected security profile information to the present subscriber of a selected one of any of the other present matching subscribers. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification