×

Preventing propagation of malicious content in a virtual universe

  • US 9,785,909 B2
  • Filed: 08/27/2009
  • Issued: 10/10/2017
  • Est. Priority Date: 08/27/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for preventing propagation of malicious content within a virtual universe, comprising:

  • a computing device determining whether an avatar has entered a new region in the virtual universe;

    the computing device scanning, in response to a determination that the avatar has entered the new region in the virtual universe, a plurality of inventory items within an inventory of an avatar within the virtual universe, the virtual universe being a server-based virtual environment in a client-server system in which a plurality of client users interact with each other and with the virtual environment via avatars associated with the client users, each inventory item of the plurality of inventory items being a virtual item that is associated with the avatar, visible within the virtual universe and usable by the avatar within the virtual universe,the computing device determining whether the avatar has received an item from another avatar;

    the computing device scanning, in response to a determination that the avatar has received an item from another avatar, the plurality of inventory items;

    the computing device determining whether the avatar has purchased an item;

    the computing device scanning, in response to a determination that the avatar has the avatar has purchased an item, the plurality of inventory items;

    the computing device determining whether the avatar has teleported;

    the computing device scanning, in response to a determination that the avatar has teleported, the plurality of inventory items;

    the computing device determining whether the avatar has used an item;

    the computing device scanning, in response to a determination that the avatar has used an item, the plurality of inventory items;

    the computing device determining whether the avatar has interacted with an item;

    the computing device scanning, in response to a determination that the avatar has interacted with an item, the plurality of inventory items;

    the computing device identifying a set of malicious inventory items from the plurality of inventory items;

    the computing device providing a visual notification rendered within the virtual universe identifying the set of malicious inventory items; and

    the computing device preventing propagation of malicious content within the virtual universe by replacing the set of malicious inventory items with a set of non-malicious inventory items within the inventory of the avatar.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×