System and method for triggering and performing scans to protect virtual environments
First Claim
1. A computer system comprising a processor and a memory, the computer system generating a virtual universe having at least one avatar, the computer system comprising:
- a trigger identification unit for receiving an identified item scan trigger circumstance;
an item scanner for scanning, based on a location of the virtual item in the virtual universe, each virtual item in an inventory of the avatar, including the virtual item, to determine whether the virtual item is malicious, wherein a frequency of scanning the inventory of the avatar is increased in the case that the location of the virtual item in the virtual universe indicates a higher potential for malicious items;
an item movement sensor for sensing the movement of the virtual item; and
an avatar teleport sensor for sensing the teleporting of the avatar.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and inventories wherein the scans may be triggered by an avatar moving or teleporting from one region to another, or by an avatar picking up, dropping off, or accepting or purchasing an item. The degree of scanning may depend upon factors such as location where these scan triggers occur. The signature of the item may be identified by the scan process. The item signature may be compared against signatures of known malicious items stored in an inventory item signatures database and a summary of the signature comparison may be sent to a resident and stored in the resident'"'"'s inventory.
16 Citations
18 Claims
-
1. A computer system comprising a processor and a memory, the computer system generating a virtual universe having at least one avatar, the computer system comprising:
-
a trigger identification unit for receiving an identified item scan trigger circumstance; an item scanner for scanning, based on a location of the virtual item in the virtual universe, each virtual item in an inventory of the avatar, including the virtual item, to determine whether the virtual item is malicious, wherein a frequency of scanning the inventory of the avatar is increased in the case that the location of the virtual item in the virtual universe indicates a higher potential for malicious items; an item movement sensor for sensing the movement of the virtual item; and an avatar teleport sensor for sensing the teleporting of the avatar. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for triggering scans of items in a virtual universe, the virtual universe having at least one avatar owned by a resident, the at least one avatar having a virtual item and an item inventory, the method comprising:
-
receiving an item scan trigger circumstance; and scanning, based on a location of the virtual item in the virtual universe, each virtual item in an inventory of the avatar, including the virtual item, to determine whether the virtual item is malicious, wherein a frequency of scanning the inventory of the avatar is increased in the case that the location of the virtual item in the virtual universe indicates a higher potential for malicious items; determining if background monitoring is enabled and, if background monitoring is enabled, scanning at least a portion of the item inventory belonging to the avatar; determining if the virtual item is acting differently than a normal virtual item, and if so; triggering an item alert and blocking the virtual item, checking attributes against attributes of known malicious virtual items, and updating an inventory item safety summary accordingly. - View Dependent Claims (7, 8, 9)
-
-
10. A method for deploying a computing infrastructure comprising integrating computer-readable code into a computing system, wherein the code in combination with the computing system is capable of performing a process for triggering scans of virtual items in a virtual universe, the virtual universe having at least one avatar owned by a resident, the at least one avatar having a virtual item and an item inventory, the process comprising:
-
receiving an item scan trigger circumstance; scanning, based on a location of the virtual item in the virtual universe, each virtual item in an inventory of the avatar, including the virtual item, to determine whether the virtual item is malicious, wherein a frequency of scanning the inventory of the avatar is increased in the case that the location of the virtual item in the virtual universe indicates a higher potential for malicious items; determining if background monitoring is enabled and, if background monitoring is enabled, scanning at least a portion of the item inventory belonging to the avatar; determining if the virtual item is acting differently than a normal virtual item, and if so; triggering an item alert and blocking the virtual item, comparing attributes of the virtual item with attributes of known malicious virtual items, identifying similarities and differences between the attributes of the virtual item with attributes of known malicious items, determining the maliciousness of the virtual item based upon the identified similarities and the differences, and updating an inventory item safety summary with the determined maliciousness of the virtual item. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer program product embodied in a computer readable storage device for operating in a system comprising at least one computer system having a network adapter for accessing a network, a processing unit, and a memory, for implementing a method for triggering scans of virtual items in a virtual universe, the virtual universe having at least one avatar owned by a resident, the at least one avatar having a virtual item and an item inventory, the method comprising:
-
receiving item scan trigger circumstance has occurred; scanning, based on a location of the virtual item in the virtual universe, each virtual item in an inventory of the avatar, including the virtual item, to determine whether the virtual item is malicious, wherein a frequency of scanning the inventory of the avatar is increased in the case that the location of the virtual item in the virtual universe indicates a higher potential for malicious items; determining if background monitoring is enabled and, if background monitoring is enabled, scanning at least a portion of the item inventory belonging to the avatar; determining if the virtual item is acting differently than a normal virtual item, and if so; triggering an item alert and blocking the virtual item, comparing attributes of the virtual item with attributes of known malicious virtual items, identifying similarities and differences between the attributes of the virtual item with attributes of known malicious items, determining the maliciousness of the virtual item based upon the identified similarities and the differences, and updating an inventory item safety summary with the determined maliciousness of the virtual item. - View Dependent Claims (16, 17, 18)
-
Specification