SYSTEM AND METHOD FOR TRIGGERING AND PERFORMING SCANS TO PROTECT VIRTUAL ENVIRONMENTS
First Claim
1. A method for triggering scans of items in a virtual universe, the virtual universe having at least one avatar owned by a resident, at least one avatar having an item and an item inventory, the method comprising:
- scanning at least a portion of the item inventory belonging to the avatar;
determining if the item inventory is acting differently than a normal virtual item, and if so;
triggering an item alert and blocking the virtual item,checking attributes against attributes of known malicious virtual items, andupdating an inventory item safety summary accordingly.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and inventories wherein the scans may be triggered by an avatar moving or teleporting from one region to another, or by an avatar picking up, dropping off, or accepting or purchasing an item. The degree of scanning may depend upon factors such as location where these scan triggers occur. The signature of the item may be identified by the scan process. The item signature may be compared against signatures of known malicious items stored in an inventory item signatures database and a summary of the signature comparison may be sent to a resident and stored in the resident'"'"'s inventory.
1 Citation
20 Claims
-
1. A method for triggering scans of items in a virtual universe, the virtual universe having at least one avatar owned by a resident, at least one avatar having an item and an item inventory, the method comprising:
-
scanning at least a portion of the item inventory belonging to the avatar; determining if the item inventory is acting differently than a normal virtual item, and if so; triggering an item alert and blocking the virtual item, checking attributes against attributes of known malicious virtual items, and updating an inventory item safety summary accordingly. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for dynamically expanding computing resources in a networked computing environment, comprising:
-
a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to the bus that when executing the instructions causes the system to; provide a virtual universe having at least one avatar owned by a resident, the at least one avatar having an item and an item inventory; scan at least a portion of the item inventory; determine if the item inventory is acting differently than a normal virtual item, and if so; trigger an item alert and blocking the virtual item, check attributes against attributes of known malicious virtual items, and update an inventory item safety summary accordingly. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product embodied in a computer readable medium for operating in a system comprising at least one computer system having a network adapter for accessing a network, a processing unit, and a memory, for implementing a method for triggering scans of items in a virtual universe, the virtual universe having at least one avatar owned by a resident, at least one avatar having an item and an item inventory, the method comprising:
-
scan at least a portion of the item inventory belonging to the avatar; determine if the item inventory is acting differently from a normal virtual item, and if so; trigger an item alert and blocking the virtual item, check attributes against attributes of known malicious virtual items, and update an inventory item safety summary accordingly. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification