Preventing propagation of malicious content in a virtual universe
First Claim
1. A method for preventing propagation of malicious content within a virtual universe, comprising:
- a computing device determining whether an avatar has entered a new region in the virtual universe;
the computing device scanning, in response to a determination that the avatar has entered the new region in the virtual universe, a plurality of inventory items within an inventory of an avatar within the virtual universe, the virtual universe being a server-based virtual environment in a client-server system in which a plurality of client users interact with each other and with the virtual environment via avatars associated with the client users, each inventory item of the plurality of inventory items being a virtual item that is associated with the avatar, visible within the virtual universe and usable by the avatar within the virtual universe,the computing device determining whether the avatar has received an item from another avatar;
the computing device scanning, in response to a determination that the avatar has received an item from another avatar, the plurality of inventory items;
the computing device determining whether the avatar has purchased an item;
the computing device scanning, in response to a determination that the avatar has the avatar has purchased an item, the plurality of inventory items;
the computing device determining whether the avatar has teleported;
the computing device scanning, in response to a determination that the avatar has teleported, the plurality of inventory items;
the computing device determining whether the avatar has used an item;
the computing device scanning, in response to a determination that the avatar has used an item, the plurality of inventory items;
the computing device determining whether the avatar has interacted with an item;
the computing device scanning, in response to a determination that the avatar has interacted with an item, the plurality of inventory items;
the computing device identifying a set of malicious inventory items from the plurality of inventory items;
the computing device providing a visual notification rendered within the virtual universe identifying the set of malicious inventory items; and
the computing device preventing propagation of malicious content within the virtual universe by replacing the set of malicious inventory items with a set of non-malicious inventory items within the inventory of the avatar.
2 Assignments
0 Petitions
Accused Products
Abstract
An invention for preventing propagation of malicious content within a virtual universe is provided. In one embodiment, a malicious content propagation prevention tool provides this capability. The malicious content propagation prevention tool includes a scanning component configured to scan a plurality of inventory items within a virtual universe. An identification component is configured to identify a set of malicious inventory from the plurality of inventory items. The malicious content propagation prevention tool further comprises an assurance component configured to prevent propagation of malicious content within the virtual universe by performing at least one of the following: isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items.
16 Citations
20 Claims
-
1. A method for preventing propagation of malicious content within a virtual universe, comprising:
-
a computing device determining whether an avatar has entered a new region in the virtual universe; the computing device scanning, in response to a determination that the avatar has entered the new region in the virtual universe, a plurality of inventory items within an inventory of an avatar within the virtual universe, the virtual universe being a server-based virtual environment in a client-server system in which a plurality of client users interact with each other and with the virtual environment via avatars associated with the client users, each inventory item of the plurality of inventory items being a virtual item that is associated with the avatar, visible within the virtual universe and usable by the avatar within the virtual universe, the computing device determining whether the avatar has received an item from another avatar; the computing device scanning, in response to a determination that the avatar has received an item from another avatar, the plurality of inventory items; the computing device determining whether the avatar has purchased an item; the computing device scanning, in response to a determination that the avatar has the avatar has purchased an item, the plurality of inventory items; the computing device determining whether the avatar has teleported; the computing device scanning, in response to a determination that the avatar has teleported, the plurality of inventory items; the computing device determining whether the avatar has used an item; the computing device scanning, in response to a determination that the avatar has used an item, the plurality of inventory items; the computing device determining whether the avatar has interacted with an item; the computing device scanning, in response to a determination that the avatar has interacted with an item, the plurality of inventory items; the computing device identifying a set of malicious inventory items from the plurality of inventory items; the computing device providing a visual notification rendered within the virtual universe identifying the set of malicious inventory items; and the computing device preventing propagation of malicious content within the virtual universe by replacing the set of malicious inventory items with a set of non-malicious inventory items within the inventory of the avatar. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer system for preventing propagation of malicious content within a virtual universe, comprising:
-
at least one processing unit; memory operably associated with the at least one processing unit; and a malicious content propagation prevention tool storable in memory and executable by the at least one processing unit, the malicious content propagation prevention tool comprising; an event handler configured to check for an occurrence of a set of events, including; an avatar entering a new region in the virtual universe; the avatar receiving an item from another avatar; the avatar purchasing an item; the avatar teleporting; the avatar using an item; and the avatar interacting with an item; a scanning component configured to scan, in response to the occurrence of any of the set of events, a plurality of inventory items within an inventory of an avatar within a virtual universe, the virtual universe being a server-based virtual environment in a client-server system in which a plurality of client users interact with each other and with the virtual environment via avatars associated with the client users, each inventory item of the plurality of inventory items being a virtual item that is associated with the avatar, visible within the virtual universe and usable by the avatar within the virtual universe, an identification component configured to identify a set of malicious inventory items from the plurality of inventory items; a notification component configured to provide a visual notification rendered in the virtual universe in the case that a set of malicious inventory items is identified; and an assurance component configured to prevent propagation of malicious content within the virtual universe by replacing the set of malicious inventory items with a set of non-malicious inventory items within the inventory of the avatar. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium storing computer instructions, which when executed, enables a computer system to prevent propagation of malicious content within a virtual universe, the computer instructions comprising:
-
checking for an occurrence of a set of events, including; an avatar entering a new region in the virtual universe; the avatar receiving an item from another avatar; the avatar purchasing an item; the avatar teleporting; the avatar using an item; and the avatar interacting with an item; scanning, in response to the occurrence of any of the set of events, a plurality of inventory items within an inventory of an avatar within a virtual universe, the virtual universe being a server-based virtual environment in a client-server system in which a plurality of client users interact with each other and with the virtual environment via avatars associated with the client users, each inventory item of the plurality of inventory items being a virtual item that is associated with the avatar, visible within the virtual universe and usable by the avatar within the virtual universe, identifying a set of malicious inventory items from the plurality of inventory items; providing a visual notification rendered within the virtual universe identifying the set of malicious inventory items; and preventing propagation of malicious content within the virtual universe by replacing the set of malicious inventory items with a set of non-malicious inventory items within the inventory of the avatar. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method for deploying a malicious content propagation prevention tool for use in a computer system that prevents propagation of malicious content within a virtual universe, comprising:
providing a computer infrastructure operable to; check for an occurrence of a set of events, including; an avatar entering a new region in the virtual universe; the avatar receiving an item from another avatar; the avatar purchasing an item; the avatar teleporting; the avatar using an item, and the avatar interacting with an item; scan, in response to the occurrence of any of the set of events, a plurality of inventory items within an inventory of an avatar within a virtual universe, the virtual universe being a server-based virtual environment in a client-server system in which a plurality of client users interact with each other and with the virtual environment via avatars associated with the client users, each inventory item of the plurality of inventory items being a virtual item that is associated with the avatar, visible within the virtual universe and usable by the avatar within the virtual universe, identify a set of malicious inventory items from the plurality of inventory items; provide a visual notification rendered within the virtual universe identifying the set of malicious inventory items; and prevent propagation of malicious content within the virtual universe by replacing the set of malicious inventory items with a set of non-malicious inventory items within the inventory of the avatar. - View Dependent Claims (17, 18, 19, 20)
Specification