摘要:
The present invention provides for using a virtual universe (VU) to validate user access and manage activities within a secured environment. The secured environment is associated with a security system. The VU and the security system are generated by a VU simulation engine by inserting an abstraction layer between the VU simulation engine. A plurality of application programming interfaces (APIs) are provided between the VU simulation engine and elements of the security system.
摘要:
In general, the present invention provides a system and method for creating, managing and utilizing virtual worlds for enhanced management of an Information Technology (IT) environment. Two dimensional (2D) and three dimensional (3D) virtual world renditions are automatically created to replicate the associated real-life IT environment. Such virtual environments can then be used to familiarize staff with remote locations and to securely provide virtual data center tours to others. The virtual environments are managed through an information monitor and management module that generates a work order sent to the physical location for reconfiguration of the real-life environment.
摘要:
In general, the present invention provides a system and method for creating, managing and utilizing virtual worlds for enhanced management of an Information Technology (IT) environment. Two dimensional (2D) and three dimensional (3D) virtual world renditions are automatically created to replicate the associated real-life IT environment. Such virtual environments can then be used to familiarize staff with remote locations and to securely provide virtual data center tours to others. The virtual environments are managed through an information monitor and management module that generates a work order sent to the physical location for reconfiguration of the real-life environment.
摘要:
In general, the present invention provides a system and method for creating and utilizing virtual worlds for enhanced management of an Information Technology (IT) environment. Two dimensional (2D) and/or three dimensional (3D) virtual world renditions are automatically created to replicate the associated real-life IT environment. Such virtual environments can then be used to familiarize staff with remote locations and to securely provide virtual data center tours to others. This invention comprises a system and method of automatically creating a virtual world environment to reflect a real world environment using information stored in databases and floor plans. The virtual world environment is rendered utilizing a Virtual World Rendering Module and is updated utilizing a Virtual Instrument Update Module.
摘要:
Provided is a method for authentication and verification of a user in a virtual world (VU) based upon such criteria as the physical location of a user in the real world and the logical location of the user's avatar in the VU. The disclosed technology combines physical and application aspects of security to enhance security options within virtual environments. In addition to traditional credential-based authentication, physical constraints corresponding to the real world and logical locations in a VU are employed, wherein an authentication server requires each component to be in the proper association state, location or proximity before authenticating a user. Further, the disclosed technology provides for the termination of a user's authentication if the user moves from an approved physical or VU location to an unapproved location. Techniques are provided to track a user's credentials and real-time physical and logical location of a user.
摘要:
Embodiments of the present invention provide an approach for transmitting/broadcasting messages/content (e.g., audio) by routing such messages to an intended audience/recipient(s), and optionally applying audio preferences to broadcast characteristics. Specifically, embodiments of the present invention may receive a message/broadcast in a queue, and identify a set of intended recipients of the broadcast (e.g., based on the content therein). Once the intended recipients have been identified, a set of locations of the intended recipients may be determined. Based on the locations, at least one output device is selected (e.g., based on proximity of the output device(s) to the intended recipients). Thereafter, the broadcast may be transmitted to the intended recipients via the selected output device(s), while any associated audio preferences are applied. In one embodiment, if an intended recipient is listening to other content, such content may be muted and/or paused so that the transmitted broadcast may be heard.
摘要:
A method for market segmentation analysis includes a computer collecting virtual universe data associated with interactions between avatars, entities, and objects in a virtual universe. The computer collecting the virtual universe data includes the computer recording portions of the virtual universe data as the interactions occur. The method includes the computer determining criteria with which to perform a market segmentation analysis on the virtual universe data. The method further includes the computer performing the market segmentation analysis on the virtual universe data, which includes the computer analyzing a plurality of groups of the virtual universe data. The groups are formed based on whether an avatar activity includes social activity and business activity in the virtual universe relative to a time of day. The method further includes the computer generating a report indicating results of the market segmentation analysis.
摘要:
A method for market segmentation analysis includes a computer collecting virtual universe data associated with interactions between avatars, entities, and objects in a virtual universe. The computer collecting the virtual universe data includes the computer recording portions of the virtual universe data as the interactions occur. The method includes the computer determining criteria with which to perform a market segmentation analysis on the virtual universe data. The method further includes the computer performing the market segmentation analysis on the virtual universe data, which includes the computer analyzing a plurality of groups of the virtual universe data. The groups are formed based on whether an avatar activity includes social activity and business activity in the virtual universe relative to a time of day. The method further includes the computer generating a report indicating results of the market segmentation analysis.
摘要:
A method and system are disclosed for detecting affinity between entities in a virtual universe (VU) using real time access to descriptions prepared from information about objective entities available in VU databases as well as descriptive information made available by the objective entities. Objective entities may be aggregations of virtual entities. Activators for affinity determinations are provided. The information on an objective entity is compared with descriptive information on a VU subject to determine affinity, and corresponding action of the VU subject. In this manner also the comparative affinities of different objective entities may determine actions of the VU subject.
摘要:
A method for controlling access to a target application in accordance with an exemplary embodiment is provided. The method includes determining whether a user is within a predetermined distance from at least one predetermined base device. The method further includes determining whether the predetermined base device is within a predetermined geographical region. The method further includes receiving user access information associated with the user and authenticating the user access information. The method further includes authorizing a user computer only when the user is within the predetermined distance from the predetermined base device, and the predetermined base device is within the predetermined geographical region, and the user access information corresponds to predetermined user access information associated with the user. The method further includes allowing the user computer to access the target application when the user computer has been authorized.