Browse Prior Art Database

Appearance of Virtual Character Reflects User Security Risk Attributes

IP.com Disclosure Number: IPCOM000226261D
Publication Date: 2013-Mar-25
Document File: 1 page(s) / 18K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a method to determine the security risk of interactions between users as well as physical and virtual assets within a three-dimensional, multi-user application. The solution includes a multi-user virtual world that represents one or multiple physical data centers where user or object appearance is directly modified to reflect the overall security risk.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 79% of the total text.

Page 01 of 1

Appearance of Virtual Character Reflects User Security Risk Attributes

In a multi-user application, it is often useful to know the security level (i.e., how secure the user and the user's connection are) of the different users currently logged in. Indicators of the strength of the user's security include access privileges, strength of the password, the use of an encrypted channel to access the application, the presence of a firewall installed in the operating system, etc.

Given the implementation of a complex three-dimensional (3D) world that allows interaction with physical and virtual assets as well as other users, a need arises for a method to easily determine the security risk of such interactions.

The novel contribution is a solution that includes a multi-user virtual world that represents one or multiple physical data centers where user or object appearance is directly modified to reflect the overall security risk. One way to do this is by using an entirely different character/object model. Another way is to change the existing model through re-texturing or addition of other objects/icons to serve as tags.

The client-side of the application is responsible for taking a set of security measurements on the system attempting a connection. These are communicated to the application server during login, and then the server analyzes this information with the addition of its own security measurements on the account and previous application usage/history. These data...