Method, system, and computer program product for providing e-token based access control for virtual world spaces
First Claim
1. A method for providing e-token based access control to virtual world (VW) spaces, comprising:
- intercepting a request including an invitation for access to a first VW space from a first VW member associated with the first VW space to a second VW member associated with a second VW space, the first and second VW spaces being located within a VW network, the request being intercepted outside of the VW network;
using a secret code associated with the first VW member to generate an e-token, the e-token including a name or identifier of the second VW member and an identifier of the first VW space;
sending the e-token inside the VW network for storage;
in response to a request, by the second VW member, for the access to the first VW space, sending the e-token outside of the VW network for verification, the verification including determining whether a number of users that may be granted access to the first VW space has been exceeded; and
upon successful verification of the e-token outside of the VW network, accessing the VW network and controlling a guard bot residing inside the VW network to grant the access to the second VW member with respect to the first VW space upon verifying that the number of users to the first VW space has not been exceeded;
wherein the guard bot adds the second VW member to an access control list for the first VW space.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list.
-
Citations
6 Claims
-
1. A method for providing e-token based access control to virtual world (VW) spaces, comprising:
-
intercepting a request including an invitation for access to a first VW space from a first VW member associated with the first VW space to a second VW member associated with a second VW space, the first and second VW spaces being located within a VW network, the request being intercepted outside of the VW network; using a secret code associated with the first VW member to generate an e-token, the e-token including a name or identifier of the second VW member and an identifier of the first VW space; sending the e-token inside the VW network for storage; in response to a request, by the second VW member, for the access to the first VW space, sending the e-token outside of the VW network for verification, the verification including determining whether a number of users that may be granted access to the first VW space has been exceeded; and upon successful verification of the e-token outside of the VW network, accessing the VW network and controlling a guard bot residing inside the VW network to grant the access to the second VW member with respect to the first VW space upon verifying that the number of users to the first VW space has not been exceeded; wherein the guard bot adds the second VW member to an access control list for the first VW space. - View Dependent Claims (2, 3)
-
-
4. A system for providing e-token based access control to virtual world (VW) spaces, comprising:
-
a VW server; an administrator system executing a verification and tracking application; a first VW member system in communication with the VW server and the administrator system; and a proxy application and an e-tokenizer application executing on the first VW member system, the proxy application and the e-tokenizer application implementing a method, comprising; the proxy application intercepting a request from the first VW member system to invite a second VW member system to a VW space within a VW network, the request intercepted outside of the VW network; the e-tokenizer application using a secret code associated with the first VW member system to generate an e-token, the e-token including a name of identifier of the second VW member system and an identifier of the VW space; sending the e-token inside the VW network for storage; in response to a request, by the second VW member system, for access to the VW space, sending the e-token outside of the VW network to the verification and tracking application for verification, the verification including determining whether a number of users that may be granted access to the first VW space has been exceeded; and upon successful verification of the e-token, the verification and tracking application accesses the VW network and controls a guard bot residing inside the VW network to grant the access to the second VW member with respect to the VW space upon verifying that the number of users to the first VW space has not been exceeded; wherein the guard bot adds the second VW member to an access control list for the VW space. - View Dependent Claims (5, 6)
-
Specification