Confidential presentations in virtual world infrastructure

ABSTRACT

Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a Continuation of U.S. patent application Ser. No.12/201,107, filed on Aug. 29, 2008, which is fully incorporated hereinby reference.

FIELD OF THE INVENTION

The present invention relates generally to confidential presentationswithin a virtual world, and more particularly the invention relates toproviding confidential presentations within a virtual worldinfrastructure where confidential information is mapped onto virtualworld objects, and resides only outside of the virtual world.

BACKGROUND OF THE INVENTION

A virtual world is a computer-based simulation environment where usersare intended to inhabit and interact via avatars. A user accesses acomputer-simulated world which presents perceptual stimuli to the user,who in turn can manipulate elements of the modeled world and thusexperiences telepresence to a certain degree. Such modeled worlds mayappear similar to the real world or instead may depict fantasy worldsVirtual worlds are not limited to games but can encompass computerconferencing and text based chat rooms.

By way of example, virtual worlds (VWs), such as Second Life, offeravatars public places in which to meet and hold meetings. However,within a company environment, not all meetings are open to the public.Confidential meetings are often necessary. The community aspects ofvirtual worlds directly conflict with the need for confidentialmeetings. In virtual worlds, the servers, and therefore the operators ofthe virtual world, usually learn the content and metadata of all objectsbecause they need to distribute these pieces of data to the community aspart of the virtual world environment. Thus, the goal of confidentialityaffects other users of the virtual world and the virtual world serverinfrastructure.

SUMMARY OF THE INVENTION

Principles of the invention provide, for example, methods and apparatusfor forming and presenting confidential presentations within a virtualworld, that is, a computing environment associated with a virtualapplication. Confidential textures are mapped onto objects, for example,screens existing within the virtual world. The confidential texturesexist only outside of the virtual world in a secure environment. Theconfidential textures can be slides of a confidential presentation.

For example, in accordance with one aspect of the invention, a methodfor forming a confidential presentation is provided. The method forforming the confidential presentation comprises obtaining acorrespondence indicator from an asset server, obtaining a first texturefrom the asset server, and overlaying the first texture onto a firstobject. The correspondence indicator indicates the first texturecorresponds to the first object. The first object is within a computingenvironment associated with a virtual application. The first texture andthe asset server are inaccessible by the computing environmentassociated with the virtual application. The confidential presentationcomprises the first texture.

Since the asset server is inaccessible by the computing environmentassociated with the virtual application, it may be considered aconfidential asset server.

In accordance with another aspect of the invention, a network forforming a confidential presentation is provided. The network for formingthe confidential presentation comprises an asset server, and a proxy.The method for forming the confidential presentation comprises obtaininga correspondence indicator from the asset server, obtaining a firsttexture from the asset server, and overlaying the first texture onto thefirst object. The correspondence indicator indicates the first texturecorresponds to a first object. The first object is within a computingenvironment associated with a virtual application. The first texture isoverlaid by the proxy. The first texture and the asset server areinaccessible by the computing environment associated with the virtualapplication, and the confidential presentation comprises the firsttexture.

Advantages of the invention include, for example: enabling confidentialmeetings and presentations within a virtual world, where confidentialmaterial exists only on secure resources residing exclusively outside ofthe virtual world; and enabling meeting nonparticipants to viewalternate non-confidential material, such as, for example,advertisements.

These and other features, objects and advantages of the presentinvention will become apparent from the following detailed descriptionof illustrative embodiments thereof, which is to be read in connectionwith the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates apparatus for attending a confidential presentationaccording to a first exemplary embodiment of the invention.

FIG. 2 illustrates apparatus for forming and hosting a confidentialpresentation according to a second exemplary embodiment of theinvention.

FIG. 3 illustrates apparatus for a non-confidential presentationaccording to a third exemplary embodiment of the invention.

FIG. 4 shows a method for forming a confidential presentation accordingto a fourth exemplary embodiment of the invention.

FIG. 5 illustrates a map, or a correspondence indicator, according to anexemplary embodiment of the invention.

FIG. 6 illustrates a computer system in accordance with which one ormore components/steps of the techniques of the invention may beimplemented, according to an embodiment of the invention.

DETAILED DESCRIPTION OF THE INVENTION

An asset is an item in a virtual world. Assets include, but are notlimited to, objects, shapes of objects, textures, digitized audio clips,avatar shape and appearance, avatar skin textures, scripts, andinformation written on note cards. Each asset is referenced by aUniversally Unique Identifier (UUID). Assets are typically stored on aserver, for example, one or more asset servers, supporting the virtualworld.

The term confidential asset server, as used herein, is a securecomputing resource that stores and provides at least one texture and atleast one map for a confidential presentation. The confidential assetserver, optionally, may also form the map. The confidential asset serveris only outside of the virtual world. The confidential asset serverbeing only outside of the virtual world means that the confidentialasset server is not part of the virtual world infrastructure. Theconfidential asset server does not reside on, and is not accessible by,any computing device or other computing infrastructure maintained by aservice provider of the virtual world application.

Access to the confidential asset server is limited to authorizedentities, such as participants, persons hosting the confidential meeting(hosts), and the computer resources or clients of participants andpersons hosting the confidential meeting. Nonparticipants are deniedaccess to the confidential asset server. The confidential asset servertypically stores confidential information. Confidential asset serversare not necessarily associated with an item in a virtual world termed an“asset.”

An avatar is a representation inside of the virtual world of a computeruser. The avatar can be in the form of a three-dimensional model, atwo-dimensional icon or picture, or a text construct. As used herein, anavatar is an object representing, within a virtual world, the embodimentof the user.

A host is the person or user controlling, originating, hosting, orproviding content for a secure meeting or confidential presentation. Thehost is, for example, a person hosting the secure meeting orconfidential presentation. The host typically provides the confidentialpresentation.

The term nonparticipant, as used herein, specifies a user not authorizedto attend a secure meeting or confidential presentation.

The term participant, as used herein, specifies a user authorized toattend a secure meeting or confidential presentation.

The term proxy, as used herein, is a computing entity, typically acomputing entity associated with a participant and/or a meeting host,adapted injecting data into a virtual world data stream. The proxy mayalso be adapted to filtering data or removing data from the virtualworld data stream. The proxy is only outside of the virtual world.

Second Life is an internet based virtual world.

In general, a texture is a digital image within or outside of a virtualworld. A texture can comprise a pattern or a more complex imageincluding shape, form, or text. A texture may decorate an object. Atexture may be a confidential texture or a non-confidential texture. Todistinguish between non-confidential textures and confidential textures,a confidential texture comprises information or data that is part of aconfidential presentation, for example, confidential information, orconfidential data. A texture that is provided by, or resides within, aconfidential asset server is a confidential texture. A confidentialtexture may be, for example, a presentation slide. As used herein, atexture that is confidential is only available outside of the virtualworld.

A Universally Unique Identifier (UUID) is an identifier, for example, anidentifier according to a standard used in software construction. Thetypical UUID is standardized by the Open Software Foundation as part ofthe Distributed Computing Environment. The intent of UUIDs is to enabledistributed systems to uniquely identify information without significantcentral coordination. Thus, anyone can create a UUID and use it toidentify something with reasonable confidence that the identifier willnever be unintentionally used to identify anything else. Information oritems labeled with UUIDs can therefore be combined into a singledatabase without needing to resolve name conflicts. UUIDs are used toidentify objects within a virtual world.

A virtual world is a computing environment associated with a virtualapplication, that is, a computer-based simulation environment whereusers are intended to inhabit and interact via avatars. A uses accesses,through a computer, a computer-simulated world which presents perceptualstimuli to the user, who in turn can manipulate elements of the modeledworld and thus experiences telepresence to a certain degree. Suchmodeled worlds may appear similar to the real world or instead maydepict fantasy worlds. The model world may simulate rules based on thereal world, rules of the fantasy world, or hybrid rules of real andfantasy worlds. Communication between users may include, but is notlimited to, text, graphical icons, visual, video, sound, and forms usingtouch and balance senses. Communication with real-time voicecommunication using voice-over-Internet-protocol (VOIP) is alsopossible. Virtual worlds are not limited to games but can encompasscomputer conferencing and text based chat rooms.

There is a need to enable confidential and secure meetings in virtualworlds such that the audio and video channels can be secure, havingcontent available to only authorized people, i.e., the people invited tothe meeting.

An aspect of the invention is a method for one or more objects, whichexists within the VW, to display slides of a presentation usingtextures. Although the objects exist within the VW, some slides and sometextures, for example, those that are confidential, do not exist withinthe VW. The textures will be different for meeting participants than fornonparticipants. The participants will view the actual presentationslides. The nonparticipants, as well as the VW server infrastructure,will receive default pictures, e.g., advertisements. The participantswill get the presentation slide textures from a dedicated confidentialasset server, access to which is granted only to participants.

Features of the invention include, for example: allowing arbitraryrenderable content, for example, text, pictures, slides, presentationsand video streams to be displayed to multiple participants, the contentcan extend arbitrary assets, and the content can not only come from thecomputing resource of the participant or host, but can be obtained froma confidential asset server typically coupled to the Internet or anintranet. These features make the invention highly suitable forrealizing confidential business presentations in virtual worlds.

The following describes how the virtual presentation functions, how itobtains the secure content, and how the content is controlled by thepresenter or host.

As shown in FIG. 1, a first embodiment of the invention 100 comprises: aparticipant object 112 within a VW 110 on which textures are rendered; aparticipant proxy 131 residing at or within a client or participantcomputing resource 130; and a confidential asset server 140 located onlyoutside of the virtual world 110. The confidential asset server 140stores confidential information, for example, the confidentialpresentation. Access to the confidential asset server 140 is allowedonly to participants 120, hosts 220 (FIG. 2), and, optionally, otherauthorized individuals and entities. Confidential asset server 140 isnot available to other non-authorized individuals, and is not otherwisegenerally available within the VW 110. An example of the participantobject 112 is a screen onto which textures are rendered. The texturesare, for example, slides of a confidential presentation. In alternateembodiments, textures are, for example, audio, text, pictures or videostreams. The participant proxy 131 is adapted to removing data from theVW data stream; in this case, removing data from the data stream comingfrom the VW 110, for example, form the VW servers 113, to theparticipant computing resource 130. The term VW data stream, as usedherein, comprises the data stream coming from the VW 110, for example,from the VW servers 113, to the participant computing resource 130 orhost computing resource 230 (FIG. 2), and the data stream going from theparticipant computing resource 130 or the host computing resource 230 tothe VW 110, for example, to the VW servers 113. Because the participantcomputing resource 130 comprises the participant proxy 131, datareaching the participant computing resource 130 is available to theparticipant proxy 131. The participant computing resource 130 istypically associated with the participant 120. Other participants (notshown) have their own computing resources (not shown).

FIG. 1 further shows participant avatar 111 within the virtual world110. As indicated by the participant-to-avatar link 154, participantavatar 111 is typically associated with and, at least partially, underthe control of the participant 120. The avatar-to-object link 155indicates that participant avatar 111 at some time can “see”, within theVW 110, participant object 112. Data from the VW server 113 goes to theparticipant computing resource 130 through a VW-to-proxy network link156. Data goes from the confidential asset server 140 to the participantproxy 131 through a confidential asset server-to-computer resourcenetwork link 152.

A screen is an object, for example, the participant object 112 in FIG.1, in VW 110, having a UUID. In this case, a texture, for example, aslide, can be mapped onto the screen. Alternatively, the screen couldcomprise a plurality of objects, each object having a UUID. In thiscase, for each object, a texture, for example, a slide, can be mappedonto the screen.

FIG. 2 illustrates a second embodiment of the invention 200 where host220 has replaced the participant 120 in FIG. 1. The second embodiment200 comprises similar components and links, with similar functions, asthe components and links in the first embodiment 100 in FIG. 1. Thesecond embodiment 200 comprises VW 110 comprising host avatar 211, hostobject 212 and VW server 113. The second embodiment 200 furthercomprises host computing resource 230 comprising host proxy 231. Thehost computing resource 230 is typically associated with the host 220.The second embodiment 200 further comprises confidential asset server140. As indicated by a host-to-avatar link 254, host avatar 211 istypically associated with and, at least partially, under the control ofthe host 220. An avatar-to-object link 255 indicates that host avatar211 at some time can “see”, within the VW 110, host object 212. Datafrom the VW server 113 goes to the host computing resource 230 through aVW-to-proxy network link 256. Data goes from the confidential assetserver 140 to the host proxy 231 through a confidential assetserver-to-computing resource network link 252.

The second embodiment 200, shown in FIG. 2, differs from the firstembodiment 100, shown in FIG. 1, in that the host 220 replaces theparticipant 120. The host 220 can function as a meeting participant, butalso has additional functions. The host 220 may provide the confidentialpresentation to the confidential asset server 140 as indicated by thehost-to-asset sever link 251. The host 220 may provide the confidentialpresentation through the host computing resource 230 using theconfidential asset server-to-computing resource network link 252.Furthermore, the host 220 controls the confidential presentation,typically through host avatar 211, as indicated by the host-to-avatarlink 254 and the avatar-to-object link 255. The host object 212optionally comprises controls 214 operable by the host 220, typicallythrough host avatar 211. The controls typically comprise control buttonsand/or pointers to navigate within the confidential presentation.

As in the first embodiment 100, for the second embodiment 200 shown inFIG. 2, a screen is an object in VW 110, having a UUID. For example, thescreen is host object 212 in FIG. 2. In this case, a texture, forexample, a slide, can be mapped onto the screen. Alternatively, thescreen could comprise a plurality of objects, each object having a UUID.In this case, for each object, a texture, for example, a slide, can bemapped onto the screen.

FIG. 3 illustrates a third embodiment of the invention 300 showing anonparticipant 320. The nonparticipant is not invited to theconfidential presentation, is not authorized to access the confidentialasset server, and does not have access to the confidential asset server.The third embodiment of the invention 300 comprises VW 110 comprisingnonparticipant avatar 311, nonparticipant object 312, VW server 113, andnonparticipant computing resource 330. The nonparticipant computingresource 330 is typically associated with the nonparticipant 320. Asindicated by a nonparticipant-to-avatar link 354, nonparticipant avatar311 is typically associated with and, at least partially, under thecontrol of the nonparticipant 320. An avatar-to-object link 355indicates that nonparticipant avatar 311 at some time can “see”, withinthe VW 110, nonparticipant object 312. Data from the VW server 113 goesto the nonparticipant computing resource 330 through a VW-to-computingresource network link 356.

Because the nonparticipant does not have access to the confidentialasset server and does not view the confidential presentation, the thirdembodiment of the invention 300 does not comprise a confidential assetserver or a proxy similar to asset server 140 and participant proxy 131.

Although the host object 212 and participant object 112 are within theVW 110, the textures or slide mapped onto the host object 212 andparticipant object 112, are viewed on host computing resource 230 andparticipant computer resource 130, respectively. Thus, the textures andslides of the confidential meeting are not within the VW 110.

FIG. 4 illustrates a method 400 for forming a confidential presentationaccording to an embodiment of the invention. The first step 410 is theproviding of the confidential presentation. The host 220 may provide theconfidential presentation to the confidential asset server 140 throughthe host-to-asset server link 251 (FIG. 2). The host 220 may provide theconfidential presentation to the confidential asset server 140 using thehost computing resource 230. In this case, the confidential assetserver-to-computer resource network link 252 is used to provide theconfidential presentation to the confidential asset server 140.

The second step 420 is the formation of the map. In one embodiment, allparticipants will see the same texture on the object or screen. In theVW, the UUID associated with an object always stay the same. A UUID canbe mapped to a slide for a particular presentation. In this case, thenumber of available UUIDs limits the number of slides in thepresentation.

The map comprises the required information for mapping the confidentialpresentation, for example, textures or slides, onto objects, forexample, screens. The mapping is expressed as m \in M (m is an elementof the set M). The map contains the correspondence of objects totextures wherein the objects are indicated by the UUIDs of the objects.Once a presentation has been uploaded to the confidential asset server,the map is formed. The map is formed, for example, by the host 220and/or by the confidential asset server 140. The map is formed, forexample, automatically by execution of a program, or with manualintervention, for example, by running a program and providing data tothe program.

Let U={u1, u2, u3 . . . } be a set of UUIDs. Let P={p1, p2, p3 . . . }be a set of slide identifiers, for slides stored on a confidential assetserver 140, where a slide identifier is sufficient to uniquely referencea slide on the confidential asset server 140. Note that the UUIDs of Uand the slide identifiers of P may contain UUIDs and slide identifiersother than those required for a particular confidential presentation.Then the mapping m \in M is a set as follows: m \subseteq U′ \times P′,where U′ is the set of UUIDs for the objects or screens the mapping isdesignated for, and P′ is the set of slide references of thepresentation the mapping applies to. Note that |{u: (u_k, p_l) \inm}|=|m|, that is, each UUID in the mapping is mapped to exactly onetexture.

FIG. 5 illustrates a map example 500 of a map 510 according to anexemplary embodiment of the invention. In this map example 500, the setof screen UUIDs residing on the confidential asset server 140 is U={u1,u2, u3, u4, u5, u6, u7, u8, u9, u10, u22, u_k}. The set of slideidentifiers residing on the confidential asset server is P={p1, p2, p3,p4, p5, p6, p7, p_l}. Not all the screens indicated by the UUIDs withinU and not all of the slides indicated by the slide identifiers within Pare used in the presentation of the map example 500. The presentationcomprises five slides indicated by slide identifiers 511 p1, p2, p3, p4,and p_l. The map 510 shows the screens, indicated by screen UUIDs 512u1, u2, u3, u22, u_k, corresponding to slides indicated by slideidentifiers 511 p1, p2, p3, p4, and p_l. The correspondence contained inthe map 510 is u1 to p1, u3 to p2, u_k to p3, u2 to p4, and u22 to p_l.

The confidential asset server 140 stores not only the confidentialpresentation but also the associated map. Because access to theconfidential asset server 140 is restricted to authorized entities, forexample, the host 220 and participants 120, availability to the map islikewise restricted.

The third step 430 is authorization of the participants 120. The step430 of authorization includes, for example, authentication. There are anumber of ways known in the art for authorization of a user to access aserver, many of which are suitable for authorizing access ofparticipants 120 to attend the confidential presentation through accessto the confidential asset server 140. A suitable method of the inventionfor authorization of a participant 120 to access the confidential assetserver 140 and therefore access the confidential presentation ispresented herein.

The confidential asset server is adapted to perform at least part of thestep of authorizing the participant 120 to access the confidential assetserver 140. The confidential asset server 140 provides a token to thehost 220. The host 220 distributes the token to the participants 120.The token refers to the map m of the confidential presentation stored onthe confidential asset server 140. The participants 120 instruct theirlocal proxies 131 to use the map specified by the token for determiningthe textures to show on the objects 112.

It must be guaranteed that only authorized users can access the slidesfor the presentation, that is, the slides referenced by the map m. Thiscan be done by appropriate authentication, for example, using the token,and access control at the confidential asset server 140 side.

The token can be distributed via email or instant message outside of theVW 110. Alternately, the token can be distributed via email or instantmessage within the VW 110. Any other suitable distribution channel canbe used, for example, a file transferred from at least one of theconfidential asset server 140 and a host computing resource 230 to atleast one of a participant proxy 131 and a participant computingresource 130. Additionally, the token may specify when and in whichisland/domain of the VW 110 the token is valid. Using this method, theparticipant proxy 131 does not often need to check for overlays.

The token can be carry authentication functionality towards theconfidential asset server 140 to have strong authentication ofparticipants 120 to the confidential asset server 140 and the respectiveconfidential presentation and map. The token can further includepointers/authentication information to set up a secure connection to theconfidential asset server 140 and/or information to initiate a relatedvoice-over-Internet-protocol (VOIP) session to realize a conferencecall.

The participant proxy 131 optionally handles the authentication of theparticipant 130 to the assert server 140. Authorization of a participant120 comprises authorization of the participant proxy 131 to access theconfidential asset server. Secure authentication is a key element incase of stringent confidentiality requirements.

The host 220 is also a participant 120 in the meeting. Authenticationand authorization of the host 220 is similar to authentication andauthorization of the participant 120.

The fourth step 440 is for the participant 120 or the participantcomputing resource 130 to obtain the map of the confidentialpresentation from the confidential asset server 140. The map is sentfrom the confidential asset server 140 to the participant computingresource 130 over the confidential asset server-to-computer resourcenetwork link 152. Use of the token in obtaining the map has beendescribed above. The participant proxy 131 has access to the map becausethe map resides on the participant computing resource 130.

The fifth step 450 is obtaining textures from the confidential assetserver 140. To display slides, the participant proxy 131 filters the VWdata stream. When the participant object 112 comes into the virtualsight of participant avatar 111, participant avatar 111 virtuallyrealizes that a texture corresponding to the UUID of the participantobject 112 is to be fetched from the confidential asset server 140.Participant computing resource 130 consults the map of the confidentialpresentation to determine, based upon the UUID of the participant object112, the texture that is to be fetched. If the texture corresponding toUUID u_k needs to be obtained, the texture is identified by p_l where(u_k, p_l) \in m. Thus, p_l is obtained from the confidential assetserver 140. Thus, the texture is fetched from the confidential assetserver 140. Alternately, if the participant proxy 131 has previouslyfetched this texture, this texture may be obtained from the cache memoryof the participant proxy 131.

The sixth step 460 is overlaying the textures. After obtaining atexture, the participant proxy 131 then provides the texture, forexample, the texture p_l corresponding to UUID u_k, to the participantcomputing resource 130 by injecting it into the VW data stream. Inaddition, the participant proxy 131 may also remove one or more texturesfrom the VW data stream. For example, it may replace a non-confidentialtexture with a confidential texture, for example, the confidentialtexture p_l. Textures are only removed, inserted or replaced by proxieswith access to the textures, for examples host proxy 231 and participantproxy 131. Host proxy 231 and participant proxy 131 are associated withthe host 220 and the participant 120, respectively. As shown in FIG. 3,the nonparticipant 320 does not have a proxy, nor access to theconfidential asset server 140. Therefore, the nonparticipant 320 doesnot have access to the confidential textures, for example, texture p_l.

The data within the confidential textures gets known to the hostcomputing resource 230, and the participant computing resources 130, butnot to the VW server 113 or any other user in the system who is anonparticipant 320 to the confidential presentation. Confidentiality ismaintained in a strong sense, that is, the VWs infrastructure does notneed to be trusted. The strong trust model, featured by the invention,is essential when hosting meetings in VWs where confidential material isdiscussed.

The seventh step 470 is displaying the confidential presentation to atleast one participant 120 and/or the host 220. After the VW data streamhas been filtered, that is, data has been inserted and, optionally,other data has been removed, a resulting data stream is displayed on theparticipant computing resource 130 and/or on the host computing resource220. The resulting data stream that is displayed is the confidentialpresentation.

Because the VW data stream going to a participant computer resource 330has not been filtered, that is, no data has been inserted or removed bya proxy similar to participant proxy 131, the nonparticipant 320 doesnot view the confidential presentation. Instead, the nonparticipant 320views a default presentation comprised of the original, unfiltered andunmodified VW data stream. The default presentation may comprise, forexample, an advertisement.

In an embodiment of the invention, the confidential asset server tailorsthe one or more textures, for example, slides, for the participant 120and/or host 220 based upon one or more criteria or one or moreattributes associated with the participant 120 and/or host 220.Optionally, different textures or slides can be presented to differentparticipants or to the host. Multiple maps may be formed and used fordifferent participants and the host, enabling different textures orslides to be presented to different participants and/or the host. Eachof the multiple maps may map a different texture to the same object orscreen.

Examples of criteria or attributes are confidentiality of presentationmaterial, confidentiality level, age, gender, income, occupation, andinterests of the participant 120 and/or host 220. For example, the host220 may see the confidential presentation with slide annotations,whereas participants 120 see the confidential presentation withoutannotations. For another example, a first participant may see slidecontent that is a subset of slide content seen by a second participant.For instance, a first participant, who is a customer, may seepromotional content within a slide, while a second participant, who is amember of a sales team, may see sales quota material in addition to thepromotional material. For an additional example, certain advertisementsmay be restricted from a participant under eighteen years of age. For afurther example, advertisements may be targeted based upon preferences.Because of the high security of presentation material, privacy-enhancingattribute-based target advertising/marketing in virtual worlds isfostered.

In yet another embodiment, the confidential asset server may not onlyshow a variety of static textures, but also generate texturesdynamically, potentially influenced by the attributes of the participant120 or host 220.

FIG. 6 illustrates a computer system 600 in accordance with which one ormore components/steps of the techniques of the invention may beimplemented. In an embodiment of the invention, confidential assetserver 140 comprises processor 605 (FIG. 6). The confidentialpresentation and/or the map are stored in memory 610. It is to befurther understood that the individual components/steps of the inventionmay be implemented on one such computer system or on more than one suchcomputer system. In the case of an implementation on a distributedcomputing system, the distributed computer system may comprise one ormore computer systems implementing aspects of the invention. Theindividual computer systems and/or devices may be connected via asuitable network, e.g., the Internet or World Wide Web. However, thesystem may be realized via private or local networks, for example, anintranet. In any case, the invention is not limited to any particularnetwork. Thus, the computer system shown in FIG. 6 may represent one ormore servers, or one or more other processing devices capable ofproviding all or portions of the functions described herein.

The computer system may generally include the processor 605, the memory610, input/output (I/O) devices 615, and network interface 620, coupledvia a computer bus 625 or alternate connection arrangement.

It is to be appreciated that the term “processor” as used herein isintended to include any processing device, such as, for example, onethat includes a central processing unit (CPU) and/or other processingcircuitry. It is also to be understood that the term “processor” mayrefer to more than one processing device and that various elementsassociated with a processing device may be shared by other processingdevices.

The term “memory” as used herein is intended to include memoryassociated with a processor or CPU, such as, for example, random accessmemory (RAM), read only memory (ROM), a fixed memory device (e.g., harddisk drive), a removable memory device (e.g., diskette, compact disk,digital video disk or flash memory module), flash memory, non-volatilememory, etc. The memory may be considered a computer readable storagemedium.

In addition, the phrase “input/output devices” or “I/O devices” as usedherein is intended to include, for example, one or more input devices(e.g., keyboard, mouse, camera, etc.) for entering data to theprocessing unit, and/or one or more output devices (e.g., display, etc.)for presenting results associated with the processing unit.

Still further, the phrase “network interface” as used herein is intendedto include, for example, one or more transceivers to permit the computersystem to communicate with another computer system via an appropriatecommunications protocol.

Accordingly, software components including instructions or code forperforming the methodologies described herein may be stored in one ormore of the associated memory devices (e.g., ROM, fixed or removablememory) and, when ready to be utilized, loaded in part or in whole(e.g., into RAM) and executed by a CPU.

In any case, it is to be appreciated that the techniques of theinvention, described herein and shown in the appended figures, may beimplemented in various forms of hardware, software, or combinationsthereof, e.g., one or more operatively programmed general purposedigital computers with associated memory, implementation-specificintegrated circuit(s), functional circuitry, etc. Given the techniquesof the invention provided herein, one of ordinary skill in the art willbe able to contemplate other implementations of the techniques of theinvention.

Although illustrative embodiments of the invention have been describedherein with reference to the accompanying drawings, it is to beunderstood that the invention is not limited to those preciseembodiments, and that various other changes and modifications may bemade therein by one skilled in the art without departing from the scopeof the appended claims.

What is claimed is:
 1. A method for forming a confidential presentation,the method comprising the steps of: securely storing textures andcorrespondence indicators in a memory of a confidential asset serveroutside a computing environment associated with a virtual application,wherein the confidential asset server is not accessible by a computingresource maintained by a service provider of the virtual application;obtaining, by an authorized entity, a correspondence indicator from theconfidential asset server, wherein the correspondence indicatorindicates a first texture that corresponds to a first object, whereinthe first object is within the computing environment associated with thevirtual application, wherein the first texture comprises confidentialcontent that is securely stored by the confidential asset server outsidethe computing environment associated with the virtual application;obtaining the first texture from the confidential asset server, whereinthe confidential presentation comprises the first texture; andoverlaying the first texture onto the first object.
 2. The method ofclaim 1, further comprising the steps of: providing the confidentialpresentation to the asset server, wherein the confidential presentationis provided by a host; displaying the confidential presentation; formingthe correspondence indicator; and authorizing a first participant toaccess the asset server.
 3. The method of claim 1, wherein theconfidential presentation comprising the first texture is displayed to afirst participant, and wherein the method of claim 1 further comprisesthe steps of: obtaining a second texture from the asset server, whereina second participant correspondence indicator indicates the secondtexture corresponds to the first object; and displaying to the secondparticipant a second participant confidential presentation comprisingthe second texture.
 4. The method of claim 3, wherein a content of thesecond texture is chosen based upon at least one of confidentiality ofpresentation material, confidentiality level of the second participant,age of the second participant, preferences of the second participant,income of the second participant, occupation of the second participant,interests of the second participant, and gender of the secondparticipant, and wherein the content is generate by one of staticallygenerated and dynamically generated.
 5. The method of claim 1, whereinthe step of displaying the confidential information comprises displayingthe confidential information to at least one of a first participant anda host, wherein the step of the overlaying of the first texturecomprises the step of at least one of injecting the first texture into adata stream of the computing environment associated with the virtualapplication, and removing a second texture from the data stream, whereinthe data stream comprises the second texture coming from a server of thecomputing environment associated with the virtual application, whereinthe first texture is overlaid by a proxy, wherein a first UniversallyUnique Identifier indicates the first object, and wherein thecorrespondence indicator comprises the correspondence between the firstUniversally Unique Identifier and the first texture.
 6. The method ofclaim 1, wherein the first object comprises a screen adapted to renderthe first texture.
 7. The method of claim 6, wherein the screencomprises at least one control adapted to perform at least one ofnavigating within the presentation and pointing within the presentation.8. The method of claim 1, wherein a first slide of the confidentialpresentation comprises the first texture.
 9. The method of claim 1,wherein a first computing resource comprises a proxy, wherein the proxyis adapted to perform at least one of removing first data and injectingsecond data into a data stream of the computing environment associatedwith the virtual application, wherein the data stream comprises thefirst data coming from a server of the computing environment associatedwith the virtual application, to the first computing resource, andwherein the proxy is inaccessible by the computing environmentassociated with the virtual application.
 10. The method of claim 1,wherein a nonparticipant is prevented from accessing the asset server,wherein the nonparticipant is prevented from performing the steps of theobtaining of the first texture, the overlaying of the first texture, andthe displaying of the confidential presentation, and wherein a secondtexture is viewed by the nonparticipant.
 11. The method of claim 1,wherein a first participant views the confidential presentation, andwherein a nonparticipant views at least one of a default presentationand an advertisement.
 12. The method of claim 1, wherein a firstparticipant comprises a plurality of participants, and wherein theplurality of participants views the confidential presentation.
 13. Themethod of claim 1, wherein the first texture comprises at least one of aslide, text, a picture, and a video stream.
 14. The method of claim 2,wherein the asset server is adapted to perform at least part of the stepof authorizing the first participant to access the asset server, andwherein authorizing the first participant comprises authorizing theproxy to access the asset server.
 15. The method of claim 2, wherein thestep of authorizing comprises the steps of: providing a token to thehost, wherein the token indicates the correspondence indicator; andproviding the token to the first participant, wherein the token isprovided using at least one of an email, an instant message, and a filetransferred from at least one of the asset server and a host computingresource to at least one of a proxy and a first participant computingresource.
 16. A network, comprising: a confidential asset server tosecurely store textures and correspondence indicators outside acomputing environment associated with a virtual application, wherein theconfidential asset server is not accessible by a computing resourcemaintained by a service provider of the virtual application; and a proxyauthorized to access the confidential asset server and configured toform a confidential presentation by performing the steps of: obtaining acorrespondence indicator from the confidential asset server, wherein thecorrespondence indicator indicates a first texture that corresponds to afirst object, wherein the first object is within the computingenvironment associated with the virtual application, wherein the firsttexture comprises confidential content that is securely stored by theconfidential asset server outside the computing environment associatedwith the virtual application; obtaining the first texture from theconfidential asset server, wherein the confidential presentationcomprises the first texture; and overlaying the first texture onto thefirst object, wherein the first texture is overlaid by the proxy. 17.The network of claim 16, further comprising: a first network linkbetween the asset server and the proxy; and a second network linkbetween the proxy and the computing environment associated with thevirtual application, wherein the proxy is outside of the computingenvironment associated with the virtual application.
 18. The network ofclaim 16, wherein the method for forming the confidential presentationfurther comprises the steps of: displaying the confidentialpresentation; providing the confidential presentation to the assetserver, wherein the confidential presentation is provided by a host;forming the correspondence indicator; and authorizing a firstparticipant to access the asset server.
 19. Apparatus for forming aconfidential presentation, the apparatus comprising: a memory; and aprocessor coupled to the memory and configured to: obtain acorrespondence indicator from a confidential asset server, wherein theconfidential asset server securely stores textures and correspondenceindicators outside a computing environment associated with a virtualapplication, wherein the confidential asset server is not accessible bya computing resource maintained by a service provider of the virtualapplication, wherein the correspondence indicator indicates a firsttexture that corresponds to a first object, wherein the first object iswithin the computing environment associated with the virtualapplication, wherein the first texture comprises confidential contentthat is securely stored by the confidential asset server outside thecomputing environment associated with the virtual application; obtainthe first texture from the confidential asset server, wherein theconfidential presentation comprises the first texture; and overlay thefirst texture onto the first object.
 20. An article of manufacture forforming a confidential presentation, the article comprising a computerreadable storage medium having one or more programs embodied therewith,wherein the one or more programs, when executed by a computer, performsteps of: securely storing textures and correspondence indicators in amemory of a confidential asset server outside a computing environmentassociated with a virtual application, wherein the confidential assetserver is not accessible by a computing resource maintained by a serviceprovider of the virtual application; obtaining, by an authorized entity,a correspondence indicator from the confidential asset server, whereinthe correspondence indicator indicates a first texture that correspondsto a first object, wherein the first object is within the computingenvironment associated with the virtual application, wherein the firsttexture comprises confidential content that is securely stored by theconfidential asset server outside the computing environment associatedwith the virtual application; obtaining the first texture from theconfidential asset server, wherein the confidential presentationcomprises the first texture; and overlaying the first texture onto thefirst object.
 21. A confidential asset server for forming a confidentialpresentation, the confidential asset server configured to: securelystore textures and correspondence indicators outside a computingenvironment associated with a virtual application, wherein theconfidential asset server is not accessible by a computing resourcemaintained by a service provider of the virtual application; provide acorrespondence indicator, wherein the correspondence indicator indicatesa first texture that corresponds to a first object, wherein the firstobject is within the computing environment associated with the virtualapplication, wherein the first texture comprises confidential contentthat is securely stored by the confidential asset server outside thecomputing environment associated with the virtual application; andprovide the first texture, wherein the confidential presentationcomprises the first texture.
 22. The asset server of claim 21 furtherconfigured to: authorize a first participant to access the asset server;and store the confidential presentation and the correspondenceindicator.