Detecting a phishing entity in a virtual universe
First Claim
Patent Images
1. A method for detecting a phishing virtual entity in a virtual universe, comprising:
- identifying a first virtual entity using characteristics of multiple physical aspects of the first virtual entity wherein the first virtual entity represents a store within a virtual universe;
detecting a characteristic of at least one of the multiple physical aspects of a second virtual entity; and
comparing the characteristic of the second virtual entity with the characteristic of the first virtual entity of a same physical aspect to determine whether one of the first virtual entity or the second virtual entity is a phishing virtual entity that lures visitors into providing personal information.
4 Assignments
0 Petitions
Accused Products
Abstract
An invention for detecting a phishing virtual entity in a virtual universe is disclosed. A virtual entity may be registered as authentic and be identified with multiple physical characteristics thereof. Another virtual entity will be monitored to detect whether it includes a physical characteristic that is sufficiently similar to that of a registered virtual entity to cause confusion. A phishing virtual entity is detected based on the monitoring and phishing prevention processes may be implemented on the phishing virtual entity.
95 Citations
25 Claims
-
1. A method for detecting a phishing virtual entity in a virtual universe, comprising:
-
identifying a first virtual entity using characteristics of multiple physical aspects of the first virtual entity wherein the first virtual entity represents a store within a virtual universe; detecting a characteristic of at least one of the multiple physical aspects of a second virtual entity; and comparing the characteristic of the second virtual entity with the characteristic of the first virtual entity of a same physical aspect to determine whether one of the first virtual entity or the second virtual entity is a phishing virtual entity that lures visitors into providing personal information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for detecting a phishing virtual entity in a virtual universe, comprising:
-
a computer configured to perform the method comprising; identifying a first virtual entity using characteristics of multiple physical aspects of the first virtual entity wherein the first virtual entity represents a store within a virtual universe; detecting a characteristic of at least one of the multiple physical aspects of a second virtual entity; and comparing the characteristic of the second virtual entity with the characteristic of the first virtual entity of a same physical aspect to determine whether one of the first virtual entity or the second virtual entity is a phishing virtual entity that lures visitors into providing personal information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for detecting a phishing virtual entity in a virtual universe, comprising:
-
computer usable program code embodied in a non-transitory computer readable medium, which when executed by a computer system enables the computer system to; identify a first virtual entity using characteristics of multiple physical aspects of the first virtual entity wherein the first virtual entity represents a store within a virtual universe; detect a characteristic of at least one of the multiple physical aspects of a second virtual entity; and compare the characteristic of the second virtual entity with the characteristic of the first virtual entity of a same physical aspect to determine whether one of the first virtual entity or the second virtual entity is a phishing virtual entity that lures visitors into providing personal information. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for providing a system for detecting a phishing virtual entity in a virtual universe, comprising:
-
at least one of;
creating, maintaining, deploying or supporting a computer infrastructure being operable to;identify a first virtual entity using characteristics of multiple physical aspects of the first virtual entity wherein the first virtual entity represents a store within a virtual universe; detect a characteristic of at least one of the multiple physical aspects of a second virtual entity; and compare the characteristic of the second virtual entity with the characteristic of the first virtual entity of a same physical aspect to determine whether one of the first virtual entity or the second virtual entity is a phishing virtual entity that lures visitors into providing personal information. - View Dependent Claims (23, 24, 25)
-
Specification