Authentication-based presentation of virtual content

ABSTRACT

The disclosed techniques enable virtual content displayed in an experience to be restricted and/or tailored based on a user identification. User information (e.g., login name, authentication credentials such as a password or biometric data, etc.) can be used to determine and/or authenticate an identification of a user that enters and/or consumes an experience via a head-mounted display device or another computing device connected to a head-mounted display device. The user identification can be used to determine which virtual content is displayed to the user as part of an experience. Consequently, different users that enter the same experience can be presented with different virtual content. This enables a creator of the experience to restrict the viewing of confidential and/or sensitive information. This also enables the creator of the experience to tailor or customize the virtual content that is displayed to each user that enters and/or consumes the experience.

BACKGROUND

As use of head-mounted display devices becomes more prevalent, anincreasing number of users can participate in an experience in whichcontent is displayed via augmented reality techniques, mixed realitytechniques, and/or virtual reality techniques. Furthermore, more andmore people are creating these experiences for a particular purpose(e.g., an employee training experience for new employee training, amarketing experience for potential purchasers of a service such as avacation or an item such as a pair of skis, etc.).

Conventional systems enable an experience to be consumed via ahead-mounted display device that is configured to display content in athree-dimensional immersive environment. However, these conventionalsystems do not allow an author or a creator of the experience torestrict and/or to tailor the presentation of the content based on useridentification. Rather, when multiple different users access the sameexperience, these conventional systems present the same content to thedifferent users regardless of their identifications.

SUMMARY

The techniques described herein enable content displayed in anexperience to be restricted and/or tailored based on a useridentification. User information (e.g., login name, authenticationcredentials such as a password or biometric data, etc.) can be used todetermine and/or authenticate an identification of a user (may bereferred to herein as a “user identification”) that enters and/orconsumes an experience via a head-mounted display device or anothercomputing device connected to a head-mounted display device. The useridentification can be used to determine which content is displayed tothe user as part of an experience. Consequently, different users thatenter the same experience can be presented with different content. Thisenables a creator (e.g., an author) of the experience to restrict theviewing of confidential and/or sensitive information. This also enablesthe creator of the experience to tailor or customize the content that isdisplayed to each user that enters and/or consumes the experience.

As used herein, an experience can include two-dimensional scenes and/orthree-dimensional scenes. Generally, an experience includes relatedand/or linked content that can be accessed and/or displayed for aparticular purpose. The content in an individual three-dimensional scenecan comprise a collection of different two-dimensional and/orthree-dimensional objects. For example, a creator of an experience thatauthors a three-dimensional scene may start with a background templatefor the three-dimensional scene and then access a library of objects toselect different objects to be added to the background template tocomplete the three-dimensional scene for the experience. In someinstances, the creator may design his or her own objects to be added tothe background template to complete the three-dimensional scene.

In some implementations, a user can consume an experience using twodevices. For instance, a user may initially access an experience hostedover a network using a Web browser or an application of a computingdevice (e.g., a laptop computing device, a desktop computing device, atablet computing device, a smartphone computing device, etc.). Theexperience can include multiple three-dimensional scenes configured todisplay content that is accessible via one or more network locationssuch as a Web page, for example. The user can switch from consuming theexperience on the computing device to consuming the experience on ahead-mounted display device that is in some way connected to thecomputing device. For instance, the connection can comprise a wiredand/or wireless Universal Serial Bus (USB) connection, a BLUETOOTHconnection, a Wi-Fi connection, or another type of connection. Inalternative implementations, a user can access and consume theexperience using a single device such as a head-mounted display device.

In a more specific example and to further illustrate, an experience caninclude company content an employer wants a new employee to know, to beinformed about, or to learn, and thus, the new employee can access theexperience, from a network location (e.g., an Intranet page), when he orshe starts a new job. In various examples, an experience can include oneor more spaces. A space comprises a segment or type of content withinthe broader experience. Continuing the example from above, one space caninclude company content that relates to job training for a new employee,while another space in the same experience can include company contentrelated to different interest and activity groups for which the employerprovides a budget (e.g., a hiking group, a skiing group, a chess group,a religious study group, etc.). This example shows how the two types ofcontent relate to a situation where a new employee is beginningemployment with a company, yet the types of content are different andtherefore different spaces can be part of a broader experience.

In various implementations described herein, an identification of a userconsuming an experience can be received and/or verified. When viewing athree-dimensional scene in the experience, the user identification canbe compared to information that defines user permissions associated withobjects in the three-dimensional scene that have been designated forrestriction. The user permissions indicate whether a user is allowed toview content of an object or is restricted from viewing the content ofthe object when consuming the three-dimensional scene. Accordingly,different users that consume the same three-dimensional scene authoredfor the same experience are presented with different content. That is, afirst user may be allowed to view content of a first object in thethree-dimensional scene while a second user is restricted from viewingthe content of the first object. In contrast, the second user may beallowed to view content of a second object in the three-dimensionalscene while the first user is restricted from viewing the content of thesecond object.

In various examples, the user identification can be compared to a listof user identifications associated with an object that is designated forrestricted viewing. If the user identification is included on the listof user identifications, then the user is authorized to view the contentof the object (e.g., the list is an “authorized” list of useridentifications). For instance, the list can be an access control listmaintained in association with the object by a network provider (e.g., acontent or service provider that stores the object data). In otherexamples, if the user identification is included on the list of useridentifications, then the user is not authorized to view the content ofthe object (e.g., the list is a “prohibited” list of useridentifications). In even further examples, a level of authenticationassociated with the user identification (e.g., based on a class of anemployee, a type of customer, etc.) can be compared to a threshold levelof authentication associated with the object or some sort of predefinedcondition for authorization. If the level of authentication associatedwith the user satisfies the threshold level of authentication or thepredefined condition, then the user is authorized to view the content ofthe object.

The information that defines the user permissions can be metadataassociated with an object. The information can be accessed using awidget associated with an object. A widget comprises information useableto access and display content such as an object. Thus, the widget can beembedded in, or part of, a three-dimensional scene. As part of therendering process of the three-dimensional scene, a head-mounted displaydevice or a device connected to the head-mounted display device can usethe widget to retrieve data useable to render and display the content ofthe object. Moreover, the widget can be used to retrieve the metadatathat defines user permissions. In one example, a widget can comprise auniform resource locator (URL).

In various examples, the user identification and/or the information thatdefines the user permissions can be accessed via an applicationprogramming interface (API) call to a service or an applicationconfigured to access the information that defines the user permissions.That is, when rendering the three-dimensional scene, a head-mounteddisplay device or a device connected to the head-mounted display devicecan determine that an object is a restricted object. The object, or thewidget associated with the object, can include data that indicates theobject is a restricted object. Moreover, the object, or the widgetassociated with the object, can include data that indicates an owner ofthe object. Accordingly, the API call can be used to retrieve the userpermissions from the owner of the object.

In this context of this disclosure, the owner of the object can be aprovider and/or a network location (e.g., a URL) that stores the data ofthe object (e.g., the content of the object). The owner of the objectcan be a designer of the object. Or the owner of the object can be acreator of the three-dimensional scene. The head-mounted display deviceor a device connected to the head-mounted display device can beconfigured to provide an option for a viewing user to request permissionto view content of a restricted object. In this scenario, the user maysee graphical data that indicates the object exists, but the object hasnot been populated with its content because the user is not authorizedto view the content. The head-mounted display device or a deviceconnected to the head-mounted display device can receive user input thatselects the option, and based on receiving the user input, thehead-mounted display device or a device connected to the head-mounteddisplay device can be configured to send a request to an owner of theobject for user permission to view the content of the object.

In additional implementations described herein, after receiving and/orverifying an identification of a user consuming an experience, the useridentification can be used to populate an object in thethree-dimensional scene with tailored content. For instance, the objectcan comprise information that maps user identities to different contentuseable to populate the object. That is, a first user identification canbe associated with first content for the object, a second useridentification can be associated with a second content for the object,and so forth. In a more specific example, the object can comprise aframe on a wall that is configured to list individual performancemetrics for employees. At a time when a three-dimensional scene isrendered for display, a widget associated with the object can referenceand retrieve a specific performance report for an employee so that theemployee sees his or her own report and not the performance reports ofother employees. Accordingly, different users that consume the samethree-dimensional scene authored for the same experience are presentedwith different content.

In some examples, a user identification can be associated with acategory or a class of users (e.g., a new “engineering” employee, a new“sales” employee, a new “information technology” employee, etc.) and awidget useable to access the tailored content can be used for thecategory or class of users. Thus, users in the same category or classcan be presented with the same content while users in differentcategories or classes can be presented with different content.

In even further implementations described herein, after receiving and/orverifying an identification of a user consuming an experience, the useridentification can be used to navigate from a current three-dimensionalscene to a next three-dimensional scene. Here, the nextthree-dimensional scene may be identified and/or selected from aplurality of available next three-dimensional scenes. Consequently,based on different user identifications, different navigation paths inthe same experience can be encountered. A navigation path comprises asequence or an order of three-dimensional scenes that are rendered anddisplayed.

In various examples, user input to navigate, or switch, from onethree-dimensional scene to the next can be based on an interaction witha displayed object. For instance, the user may employ a controllingmechanism, a gesture, a voice command, and/or user motion to select(e.g., click on, touch, walk through, etc.) the displayed object. Thedisplayed object, in this example, can serve as a link betweenthree-dimensional scenes. Accordingly, a display of the head-mounteddisplay device may fade out of a currently displayed three-dimensionalscene and fade into a newly displayed three-dimensional scene based onthe user input.

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key or essentialfeatures of the claimed subject matter, nor is it intended to be used asan aid in determining the scope of the claimed subject matter. The term“techniques,” for instance, may refer to system(s), method(s),computer-readable instructions, module(s), algorithms, hardware logic,and/or operation(s) as permitted by the context described above andthroughout the document.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is described with reference to the accompanyingfigures. In the figures, the left-most digit(s) of a reference numberidentifies the figure in which the reference number first appears. Thesame reference numbers in different figures indicate similar oridentical elements.

FIG. 1 is a diagram illustrating an example of how different users thatenter a same experience and consume a same three-dimensional scene usingrespective head-mounted display devices are presented with differentcontent based on their user identities and different user permissions.

FIG. 2 is a diagram illustrating another example of how different usersthat enter a same experience and consume a same three-dimensional sceneusing respective head-mounted display devices are presented withdifferent content (e.g., tailored content) based on their useridentities.

FIG. 3 is a diagram illustrating yet another example of how differentusers that enter a same experience using respective head-mounted displaydevices are presented with different content (e.g., differentthree-dimensional scenes) based on their user identities.

FIG. 4 is a diagram illustrating an example experience, of whichthree-dimensional scene(s) being consumed by a user can be a part.

FIG. 5 is a diagram of an example device that can implement thetechniques described herein.

FIG. 6 is a diagram that illustrates an example of how networkcommunications can be used to implement the techniques described herein.

FIG. 7 is a diagram of an example flowchart that illustrates operationsdirected to determining whether restricted content can be rendered fordisplay based on a user identity.

FIG. 8 is a diagram of an example flowchart that illustrates operationsdirected to rendering and displaying tailored content based on a useridentity.

FIG. 9 is a diagram of an example flowchart that illustrates operationsdirected to rendering and displaying a tailored sequence ofthree-dimensional scenes based on a user identity.

DETAILED DESCRIPTION

The techniques described herein enable content displayed in anexperience to be restricted and/or tailored based on a useridentification. User information (e.g., login name, authenticationcredentials such as a password or biometric data, etc.) can be used todetermine and/or authenticate an identification of a user that entersand/or consumes an experience via a head-mounted display device oranother computing device connected to a head-mounted display device. Theuser identification can be used to determine which content is displayedto the user as part of an experience. Consequently, different users thatenter the same experience can be presented with different content. Thisenables a creator of the experience to restrict the viewing ofconfidential and/or sensitive information. This also enables the creatorof the experience to tailor or customize the content that is displayedto each user that enters and/or consumes the experience.

Various examples, scenarios, and aspects are described below withreference to FIGS. 1-9.

FIG. 1 is a diagram 100 illustrating an example of how different users(e.g., a first user 102 and a second user 104) that enter a sameexperience and consume a same three-dimensional scene in the experienceusing respective head-mounted display devices 106, 108 are presentedwith different content based on their user identities and different userpermissions. The example three-dimensional scene in the diagram 100 ofFIG. 1 includes a background template of a living room (e.g., walls, afloor, a couch, a chair, a coffee table, a book case, etc.). Moreover, acreator of the example three-dimensional scene has added objects tocomplete the three-dimensional scene. These objects include a plant, adog, and two wall frames. The plant and the dog are objects that havenot been designated as restricted objects based on user identities, andthus, the content of these objects is viewable by any user (e.g., user102 and/or user 104) that consumes the three-dimensional sceneillustrated in FIG. 1. However, the two wall frames are displayeddifferently for user 102 and user 104, and thus, these objects have beendesignated as restricted objects (e.g., by the designer of the objects,by the creator of the three-dimensional scene, etc.).

In a view 110 of the three-dimensional scene provided by a display ofthe head-mounted display device 106 to user 102, a first wall frame onthe left of the room wall is populated with content such as an image ofa person. The person and/or a position of the person within anorganization may be sensitive and/or confidential information to whichsome people likely to consume the three-dimensional scene are not privy.Thus, the first wall frame on the left of the room wall comprises anobject that has been designated as a restricted object. In the view 110,this object has been populated with content (e.g., the image of theperson) based on an identity 112 of user 102. For example, an identityof the user 102 may be included on a list of users that have permissionto view the image of the person. In another example, an identity of theuser 102 may be mapped to a level of authentication that satisfies athreshold level of authentication associated with the object (e.g., user102 may be an employee with a position that satisfies certainqualifications or experience).

Furthermore, in the view 110 of the three-dimensional scene provided bythe display of the head-mounted display device 106 to user 102, a secondwall frame on the right of the room wall is not populated with content.The second wall frame on the right of the room wall also comprises anobject that has been designated as a restricted object. However,visibility into an existence, or presence, of the unpopulated secondwall frame 114 is provided. That is, the head-mounted display device 106renders and displays graphical data to indicate the object exists, butthe object is not populated with content that is restricted. In thisway, the user 102 may know or deduce that the three-dimensional sceneincludes additional content which he or she is unable to view. Thus, thesecond wall frame on the right of the room wall comprises an object thatis not populated based on an identity of user 102.

In contrast, in a view 116 of the three-dimensional scene provided by adisplay of the head-mounted display device 108 to user 104, visibilityinto the existence of the first wall frame on the left of the room wallis not provided 118 based on an identity of user 104. Thus, the firstwall frame on the left of the room wall comprises not only an objectthat is not populated based on an identity of user 104, but also anobject that is not even visible to user 104 (e.g., there is novisibility into the existence of the object in the three-dimensionalscene). Furthermore, in the view 116 of the three-dimensional sceneprovided by the display of the head-mounted display device 108 to user104, the second wall frame on the right of the room wall is populatedwith content 120 (e.g., an image of another person) based on an identityof the user 104.

Accordingly, the example illustrated in FIG. 1 shows how a creator of(i) an experience, (ii) a three-dimensional scene that is part of anexperience, and/or (iii) an object to be rendered for display in thethree-dimensional scene that is part of the experience, can restrict thedisplay of content based on user identity. That is, a head-mounteddisplay device, or a device connected to the head-mounted displaydevice, can be configured to cause a user identity of a user consuming athree-dimensional scene to be compared to information that defines userpermissions associated with an object in the three-dimensional scenethat has been designated for restriction. The user permissions indicatewhether a user is allowed to view content of an object or is restrictedfrom viewing the content of the object when consuming thethree-dimensional scene. Accordingly, different users that consume thesame three-dimensional scene authored for the same experience arepresented with different content based on different user permissions.

In various examples, a head-mounted display device can compare a useridentification to a list of user identifications associated with anobject that is designated for restricted viewing. If the useridentification is included on the list of user identifications, then theuser is authorized to view the content of the object (e.g., the list isan “authorized” list of user identifications). For instance, the listcan be an access control list maintained in association with the objectby a network provider (e.g., a content or service provider that storesthe object data). In other examples, if the user identification isincluded on the list of user identifications, then the user is notauthorized to view the content of the object (e.g., the list is a“prohibited” list of user identifications). In even further examples, ahead-mounted display device can compare a level of authenticationassociated with the user identification (e.g., based on a class of anemployee, a type of customer, etc.) to a threshold level ofauthentication associated with the object or some sort of predefinedcondition for authorization. If the level of authentication associatedwith the user satisfies the threshold level of authentication or thepredefined condition, then the user is authorized to view the content ofthe object.

As described above, the information that defines the user permissionscan be metadata associated with an object. In some examples, theinformation can be accessed using a widget associated with an object.Thus, the widget can be embedded in, or part of, a three-dimensionalscene. As part of the rendering process of the three-dimensional scene,a head-mounted display device, or a device connected to the head-mounteddisplay device, can use the widget to retrieve data useable to renderand display the content of the object. Moreover, the widget can be usedto retrieve the metadata that defines user permissions.

In various examples, the user identification and/or the information thatdefines the user permissions can be accessed via an applicationprogramming interface (API) call to a service or an applicationconfigured to access the information that defines the user permissions.That is, when rendering the three-dimensional scene, a head-mounteddisplay device can determine that an object is a restricted object. Theobject, or the widget associated with the object, can include data thatindicates the object is a restricted object. Moreover, the object, orthe widget associated with the object, can include data that indicatesan owner of the object. Accordingly, the API call can be used toretrieve the user permissions from the owner of the object.

In some examples, a head-mounted display device can be configuredprovide an option for a viewing user to request permission to viewcontent of a restricted object. For example, FIG. 1 illustrates aselectable control 122 associated with the wall frame on the right ofthe room wall. The user 102 can provide input to activate the selectablecontrol 122, and based on this input, the head-mounted display device106 can be configured to send a request to an owner of the object foruser permission to view the content of the object.

FIG. 2 is a diagram 200 illustrating another example of how differentusers (e.g., a first user 202 and a second user 204) that enter a sameexperience and consume a same three-dimensional scene using respectivehead-mounted display devices 206, 208 are presented with differentcontent (e.g., tailored content) based on their user identities. Similarto FIG. 1, the example three-dimensional scene in the diagram 200 ofFIG. 2 includes a background template of a living room (e.g., walls, afloor, a couch, a chair, a coffee table, etc.). Moreover, a creator ofthe example three-dimensional scene has added objects to complete thethree-dimensional scene. These objects include a plant and a dog. Theseobjects have not been designated as objects configured to displaytailored content based on user identities, and thus, the viewing ofthese objects by any user (e.g., user 202 and/or user 204) that consumesthe three-dimensional scene illustrated in FIG. 2 is the same.

As illustrated, in a view 210 of the three-dimensional scene provided bya display of the head-mounted display device 206 to user 202, a firsttelevision screen on the left of the room wall is populated with contentsuch as a list of company clients. The list of company clients mayinclude some individual clients that are confidential and to which somepeople likely to consume the three-dimensional scene are not privy.Thus, the first television screen on the left of the wall comprises anobject that has been designated as a tailored object. In the view 210,this object has been populated yet some of the elements of the objectare not fully disclosed (e.g., confidential information is hidden fromview) based on an identity 212 of user 202. For example, the identity ofuser 202 may allow him or her to view Company ABC and Company XYZ asclients of his or her employer, but the identity of user 202 does notallow him or her to view higher level (e.g., confidential) clientslisted in the object. That is, user 202 may have clearance to view“level 2” clients as shown, but not “level 1” clients. Accordingly, thefirst television screen on the left of the wall is populated withcontent tailored to a user identity (e.g., some elements are disclosedand some elements are undisclosed or hidden).

Further in the view 210 of the three-dimensional scene provided by thedisplay of the head-mounted display device 206 to user 202, a secondtelevision screen on the right of the room wall is populated withcontent such as a list of clients for which user 202 will be working.The second television screen on the right of the room wall alsocomprises an object that has been designated as a tailored object, andthe object is populated with tailored content (e.g., user 202 will beworking on Company ABC's account) based on a user identity 214.

The view 216 of the three-dimensional scene provided by a display of thehead-mounted display device 208 to user 204 displays the same populatedobject in the form of the first television screen on the left of theroom wall, but the object discloses the complete list of elements 218such as company clients (e.g., no elements are undisclosed or hiddenfrom view). For example, the identity of user 204 may allow him or herto view Alpha Company, Beta Company, Company ABC, and Company XYZ asclients of his or her employer. That is, user 204 is likely a higherlevel of employee than user 202 because user 204 has clearance to view“level 1” and “level 2” clients as shown, while user 202 is unable toview the names of the “level 1” clients—Alpha Company and Beta Company.Further in the view 216 of the three-dimensional scene provided by thedisplay of the head-mounted display device 208 to user 204, the secondtelevision screen on the right of the room wall is populated withcontent such as a list of clients for which user 204 will be working.The second television screen on the right of the room wall alsocomprises an object that has been designated as a tailored object, andthe object is populated with tailored content (e.g., user 204 will beworking on the accounts of Beta Company and Company ABC) based on a useridentity 220.

Similar to the discussion above, a widget associated with an object canbe used to retrieve data useable to render and display tailored contentof an object based on a user identity. Accordingly, a user identityand/or authorization credentials can be provided to a network providerthat stores tailored content for an object. The network provider can beidentified via a widget in the three-dimensional scene. The networkprovider can then determine and provide the tailored content based onthe user identity. In some examples, the network provider can providethe tailored content to a class or a category of users. Thus, a useridentification or other user information, can first be associated with aspecific class or category of users. Consequently, a widget (e.g., aURL) can be used to pass along a user identification or a user categoryto a network provider, and the network provider is responsible foridentifying the tailored content to be rendered and displayed based onthe user identity or the user category.

FIG. 3 is a diagram 300 illustrating yet another example of howdifferent users (e.g., a first user 302 and a second user 304) thatenter a same experience using respective head-mounted display devices306, 308 are presented with different content (e.g., differentthree-dimensional scenes) based on their user identities.

In the example of FIG. 3, a user identification can be used to navigatefrom a current three-dimensional scene to a next three-dimensionalscene. As illustrated via view 310 provided by head-mounted displaydevice 306 and view 312 provided by head-mounted display device 308,both users 302 and 304 are viewing a same three-dimensional scene thatstates “Welcome to our Employee Training Lobby! Please open the door forthe next phase.” Continuing a previous example described, users 302 and304 may be new employees of a company and the experience may be createdfor the new employees of the company.

The experience may be a unique experience for an individual useridentity in the sense that after one or more three-dimensional scenesthat are commonly viewed across different user identities, one or morenext three-dimensional scenes may be user specific. Alternatively, theexperience may be a unique experience for a group of users (e.g., newemployees with a particular job title, new employees that are part of aspecific department, etc.), and thus the one or more nextthree-dimensional scenes may be specific to a group of users.

Accordingly, when user 302 provides input to navigate from the currentlydisplayed three-dimensional scene to a next three-dimensional scene(e.g., the input can be motion that represents the opening of the doorand/or walking through the door), an identity of the user 302 can beused to identify a next three-dimensional scene 314. Similarly, whenuser 304 provides input to navigate from the currently displayedthree-dimensional scene to a next three-dimensional scene, an identityof the user 304 can be used to identify a next three-dimensional scene316 that is different when compared to the next three-dimensional scene314. Consequently, the next three-dimensional scene may be identifiedand/or selected from a plurality of available next three-dimensionalscenes, and therefore, different navigation paths in the same experiencecan be configured for different users.

In various examples, a view may be configured with a control toimplement the switch between three-dimensional scenes. A “control” cancomprise a displayed graphical user interface (GUI) element (e.g., abutton, an object, etc.) that is activated based on an interactionbetween the GUI element and user input (e.g., a user selects or clickson the GUI element). A control can alternatively be configured to acceptand/or detect other forms of input such as a voice command or a gesture.Thus, a control may be configured to receive user input but may notnecessarily be displayed as a GUI element. Consequently, user input tonavigate, or switch, from one three-dimensional scene to the next can bebased on an interaction with a displayed object. For instance, the usermay employ user input devices such as a controller, a keyboard, a mouse,a pen, a voice input device, a touch input device, a gestural inputdevice, a movement input device, etc. to select (e.g., click on, touch,walk through, etc.) the displayed object. The displayed object, in thisexample, is a door that serves as a link between the employee traininglobby and the next phase of training for two different users (e.g., user302 may be a newly hired salesperson and user 304 may be a newly hiredengineer).

The examples provided above with respect to FIGS. 1-3 illustrate how asingle experience can be created yet objects, content of objects, and/orthree-dimensional scenes displayed to different users as part of theexperience can be different. This enables a creator of the experience toprotect confidential, sensitive, and/or private information from usersthat are not authorized to see such information. Moreover, this enablesthe creator of the experience to provide tailored content to a user orto a group of users that belong to a same class or category.Accordingly, during the creation process, a creator of the experiencemay define the information useable to display restricted and/or tailoredcontent. For example, the creator of the experience may define a list ofauthorized or prohibited users. In another example, the creator of theexperience may provide widgets that are used to populate objects withrestricted and/or tailored content based on user identifications.Alternatively, a creator of an object may define the information useableto display restricted and/or tailored content.

FIG. 4 is a diagram 400 illustrating an example experience 402, of whichthree-dimensional scene(s) being consumed by a user can be a part. Asshown, the experience 402 can include two-dimensional scenes and/orthree-dimensional scenes. Generally, an experience 402 includes relatedand/or linked content that can be accessed and/or displayed for aparticular purpose. As a specific example, the experience 402 caninclude company content an employer wants a new employee to know, to beinformed about, or to learn, and thus, the new employee can access theexperience 402 when he or she starts a new job. In another specificexample, the experience 402 can include lesson content a school teacherwants a student to know, to be informed about, or to learn, and thus,the student can access the experience when he or she dives into aparticular lesson. In accordance with these examples and others, thedisplay of restricted and/or tailored content based on user identitiescan be implemented.

An experience 402 can include one or more spaces 404(1) through 404(N)(where N is a positive integer number such as one, two, three, four, andso forth). A space comprises a segment or type of content within thebroader experience 402. There is no limitation how one segment or typeof content can be distinguished from another segment or type of contentin the same experience 402. Moreover, an experience may only include asingle space. Continuing an example from above and to furtherillustrate, space 404(1) can include company content that relates to jobtraining for a new employee, while space 404(N) can include companycontent related to different interest and activity groups for which theemployer provides a budget (e.g., a hiking group, a skiing group, achess group, a religious study group, etc.). The employer may have apolicy to inform a new employee about these interest and activity groupswhen he or she starts a new job, so the new employee can join if acommon interest is shared. This example shows how the two types ofcontent relate to a situation where a new employee is beginningemployment with a company, yet the types of content are different andtherefore different spaces can be created and/or consumed within abroader experience 402.

As described above, a space can include three-dimensional scenes. Invarious implementations, an entry point for a user to consume a spacecan comprise a Web page or an Intranet page (e.g., a URL), accessed viaa head-mounted display device or a computing device connected to thehead-mounted display device. For instance, a new employee can visit“www.companyABC.com/employeetraining” on his or her computing device toenter space 404(1) that is part of the broader experience 402. The newemployee can also visit “www.companyABC.com/employeegroups” on his orher computing device to enter space 404(N) that is part of the broaderexperience 402. In a specific example, space 404(1) may include a homepage that displays two-dimensional content (e.g. text and a few images).This home page may include a first link to three-dimensional scene 406,which may contain links to three-dimensional scene 408 andthree-dimensional scene 410. The three-dimensional scenes 406, 408, and410 may also include links, or anchor points, that enable navigation toone another in a three-dimensional immersive environment. The newemployee can consume the three-dimensional scenes 406, 408, and 410 in athree-dimensional immersive environment using a head-mounted displaydevice. These three-dimensional scenes 406, 408, and 410, can alsocomprise URLs that are part of the Web page (e.g.,“www.companyABC.com/employeetraining/3Dscene408” and“www.companyABC.com/employeetraining/3Dscene410”). Moreover, a scene 410in a first space 404(1) can provide a link 412 (e.g., via the selectionof a two-dimensional or three-dimensional object) to a three-dimensionalscene 414 in a second space 404(N).

Accordingly, the consumption of three-dimensional scenes, as describedherein, can be implemented as part of an experience 402 designed for aparticular type of user (e.g., a new employee, a student of a class,etc.). In various examples, the experience 402 can be associated withone or more Web pages, yet aspects of the experience 402 can include,for example, one or more virtual reality (VR) three-dimensional scenes,one or more augmented reality (AR) three-dimensional scenes, and/or oneor more mixed reality (MR) three-dimensional scenes. While theexperience 402 shown in the example diagram 400 of FIG. 4 shows alimited number of spaces and scenes, it is understood in the context ofthis disclosure, that an experience can include any number of spaces(e.g., one, two, three, four, five, ten, twenty, one hundred) forrelated content and any number of scenes (e.g., one, two, three, four,five, ten, twenty, one hundred, etc.).

FIG. 5 is a diagram of an example device 500 that can implement thetechniques described herein. The device 500 can comprise a head-mounteddisplay device or another device in communication with the head-mounteddisplay device (e.g., a user device or a network device such as aserver). For instance, the device 500 can include, but is not limitedto: a game console, a desktop computer, a laptop computer, a gamingdevice, a tablet computer, a personal data assistant (PDA), a mobilephone/tablet hybrid, a telecommunication device, a network-enabledtelevision, a terminal, an Internet of Things (IoT) device, a workstation, a media player, or any other sort of computing device. Examplesof a head-mounted display device include, but are not limited to:OCCULUS RIFT, GOOGLE DAYDREAM VIEW, MICROSOFT HOLOLENS, HTC VIVE, SONYPLAYSTATION VR, SAMSUNG GEAR VR, GOOGLE CARDBOARD, SAMSUNG HMD ODYSSEY,DELL VISOR, HP HEADSET, LENOVO EXPLORER, ACER HEADSET, ASUS WINDOWSMIXED REALITY HEADSET, or any augmented reality, mixed reality, and/orvirtual reality devices.

Accordingly, in some instances, a head-mounted display device may notinclude a processor or computer-readable media. Rather, the head-mounteddisplay device may comprise an output device configured to render dataaccessible via, and/or stored on, a connected computing device fordisplay. For instance, the head-mounted display device may be tetheredto the computing device. Therefore, interfaces of a computing device anda head-mounted display device can be configured to communicate via awired and/or wireless Universal Serial Bus (“USB”) connection, aBLUETOOTH connection, a High-Definition Multimedia Interface (“HDMI”)connection, and so forth.

The may device 500 includes processor(s) 502 and computer-readable media504. As used herein, a “processor” can represent, for example, aCPU-type processing unit, a GPU-type processing unit including a virtualGPU (VGPU), a field-programmable gate array (FPGA), a digital signalprocessor (DSP), or other hardware logic components that may, in someinstances, be driven by a CPU. For example, and without limitation,illustrative types of hardware logic components that can be used includeApplication-Specific Integrated Circuits (ASICs), Application-SpecificStandard Products (ASSPs), System-on-a-Chip Systems (SOCs), ComplexProgrammable Logic Devices (CPLDs), etc.

As used herein, “computer-readable media” can store instructionsexecutable by a processor and/or data (e.g., model data for a scene, atemplate, or an object). Computer-readable media can also storeinstructions executable by external processing units such as by anexternal CPU, an external GPU, and/or executable by an externalaccelerator, such as an FPGA type accelerator, a DSP type accelerator,or any other internal or external accelerator. In various examples, atleast one CPU, GPU, and/or accelerator is incorporated in a computingdevice, while in some examples one or more of a CPU, GPU, and/oraccelerator is external to a computing device.

Computer-readable media can include computer storage media and/orcommunication media. Computer storage media can include one or more ofvolatile memory, nonvolatile memory, and/or other persistent and/orauxiliary computer storage media, removable and non-removable computerstorage media implemented in any method or technology for storage ofinformation such as computer-readable instructions, data structures,program modules, or other data. Thus, computer storage media includestangible and/or physical forms of memory included in a device and/or ahardware component that is part of a device or external to a device,including but not limited to random-access memory (RAM), staticrandom-access memory (SRAM), dynamic random-access memory (DRAM), phasechange memory (PCM), read-only memory (ROM), erasable programmableread-only memory (EPROM), electrically erasable programmable read-onlymemory (EEPROM), flash memory, compact disc read-only memory (CD-ROM),digital versatile disks (DVDs), optical cards or other optical storagemedia, magnetic cassettes, magnetic tape, magnetic disk storage,magnetic cards or other magnetic storage devices or media, solid-statememory devices, storage arrays, network attached storage, storage areanetworks, hosted computer storage or any other storage memory, storagedevice, and/or storage medium that can be used to store and maintaininformation for access by a computing device.

In contrast to computer storage media, communication media can embodycomputer-readable instructions, data structures, program modules, orother data in a modulated data signal, such as a carrier wave, or othertransmission mechanism. As defined herein, computer storage media doesnot include communication media. That is, computer storage media doesnot include communications media consisting solely of a modulated datasignal, a carrier wave, or a propagated signal, per se.

In some implementations, the device 500 includes input/output (I/O)interfaces that enable communications with input/output devices such asuser input devices including peripheral input devices (e.g., a gamecontroller, a keyboard, a mouse, a pen, a voice input device, a touchinput device, a gestural input device, a motion input device, and thelike) and/or output devices including peripheral output devices (e.g., adisplay screen, a printer, audio speakers, a haptic output device, andthe like).

Device 500 also includes connection interfaces 506 that enable thedevice 500 to communicate over network(s) such as local area networks(LANs), wide area networks (WANs), satellite networks, cable networks,Wi-Fi networks, WiMax networks, mobile communications networks (e.g.,3G, 4G, and so forth), etc. In various implementations, connectioninterfaces 506 of a computing device and/or a head-mounted displaydevice can be configured to operate in accordance with, and communicateover, a personal area network (PAN) that uses a wired and/or a wirelessconnection. For example, a PAN connection can operate in accordance withInfrared Data Association (“IrDA”), BLUETOOTH, wired and/or wirelessUSB, Z-Wave, ZIGBEE, or other short-range wireless technology.

The device 500 further includes a consumption module 508 that isconfigured to use three-dimensional scene data 510 to implement thetechniques described herein. For example, the consumption module 508 maybe a network-enabled application that provides the three-dimensionalscene data 510 to a user device (e.g., a computing device, ahead-mounted display device, etc.), over a network, for rendering anddisplay. In another example, the consumption module 508 may be anapplication configured to retrieve, render, and/or display thethree-dimensional scene data on a display of the head-mounted displaydevice. The three-dimensional scene data 510 may include information(e.g. widgets) that provides access to restricted and/or tailoredcontent (e.g., restricted and/or tailored objects).

The module provided in FIG. 5 is an example, and the number of modulesused to implement the techniques described herein can vary higher orlower. That is, functionality described herein in association with theillustrated modules can be performed by a fewer number of modules or alarger number of modules on one device or spread across multipledevices.

FIG. 6 is a diagram 600 that illustrates an example of how networkcommunications can be used to implement the techniques described herein.The diagram 600 illustrates a first user 602 that employs a head-mounteddisplay device 604 to access and consume an experience 606 provided bynetwork provider(s) 608 (e.g., content and/or service providers).Moreover, the diagram 600 illustrates a second user 610 that employs ahead-mounted display device 612 to access and consume the sameexperience 606 provided by network provider(s) 608. Consequently, theexperience 606 can be accessed, over network(s) 614, by the head-mounteddisplay devices 604, 612. Alternatively, the experience can be accessedover network(s) 614 by user computing devices to which the head-mounteddisplay devices 604, 612 are connected (e.g., via a USB connection).

As described above, the experience 606 can comprise a three-dimensionalscene 616. In accordance with consumption of the experience 606, theidentities of users 602, 610 are determined and/or authenticated 618,620. Accordingly, three-dimensional scene(s) of the experience 606, suchas three-dimensional scene 616, can be consumed using head-mounteddisplay devices 604, 612.

In one example, the head-mounted display devices 604, 612 can identifyan object 622 configured to be populated with restricted content whenrendering the three-dimensional scene 616. The head-mounted displaydevices 604, 612 can be configured to access information that definesuser permissions associated with the restricted object 622. Forinstance, widgets 624, 626 may enable the head-mounted display devices604, 612 to access the information. As shown in FIG. 6, the object 622includes a list of user identifications authorized to view therestricted content of the object 622 (e.g., ID_1 is authorized, ID_2 isauthorized, etc.) and/or the object 622 includes a list of useridentifications not authorized to view the restricted content of theobject 622 (e.g., ID_3 is not authorized, etc.). Consequently, a networkprovider 608 is configured to provide the content of the object 622 forrendering if a corresponding user is determined to be authorized.

In another example, the head-mounted display devices 604, 612 canidentify an object 628 configured to be populated tailored content whenrendering the three-dimensional scene 616. The head-mounted displaydevices 604, 612 can be configured to access the tailored content fortheir respective users 602, 610. For instance, widgets 624, 626 mayenable the head-mounted display devices 604, 612 to access the tailoredcontent for the object 628 (e.g., widget 624 may locate a networkprovider 608 which identifies tailored content_1 for rendering anddisplay of the object 628 to user 602, widget 626 may locate a networkprovider 608 which identifies tailored content_2 for rendering anddisplay of the object 628 to user 610).

In yet another example, the three-dimensional scene 616 can beconfigured with a control (e.g., a selectable object 630) that isconfigured to identify a next three-dimensional scene from a pluralityof available next scenes. Accordingly, when the control is activated,the network provider(s) can provide the head-mounted display devices604, 612 with a next scene based on identities of users 602, 610.

Each of the examples described above enables different users consumingthe same experience and/or the same three-dimensional scene to beprovided with different content for viewing purposes.

Network(s), such as network(s) 614, can include, for example, publicnetworks such as the Internet, private networks such as an institutionaland/or personal intranet, or some combination of private and publicnetworks. Network(s) can also include any type of wired and/or wirelessnetwork, including but not limited to local area networks (LANs), widearea networks (WANs), satellite networks, cable networks, Wi-Finetworks, WiMax networks, mobile communications networks (e.g., 3G, 4G,and so forth) or any combination thereof. Network(s) can utilizecommunications protocols, including packet-based and/or datagram-basedprotocols such as internet protocol (IP), transmission control protocol(TCP), user datagram protocol (UDP), or other types of protocols.Moreover, network(s) can also include a number of devices thatfacilitate network communications and/or form a hardware basis for thenetworks, such as switches, routers, gateways, access points, firewalls,base stations, repeaters, backbone devices, and the like.

In various implementations, network provider(s) 608 may be disparateentities. Consequently, an individual experience and/or an individualthree-dimensional scene can include content that may have been designedby different developers and/or providers. To this end, an individualthree-dimensional scene can include a list of widgets useable to renderobjects in the individual three-dimensional scene.

FIGS. 7-9 each contains a flowchart of a method. It should be understoodthat the operations of the methods disclosed herein are not presented inany particular order and that performance of some or all of theoperations in an alternative order(s) is possible and is contemplated.The operations have been presented in the demonstrated order for ease ofdescription and illustration. Operations may be added, omitted, and/orperformed simultaneously, without departing from the scope of theappended claims.

It also should be understood that the illustrated methods can end at anytime and need not be performed in their entireties. Some or alloperations of the methods, and/or substantially equivalent operations,can be performed by execution of computer-readable instructions includedon a computer-storage media, as defined below. The term“computer-readable instructions,” and variants thereof, as used in thedescription and claims, is used expansively herein to include routines,applications, application modules, program modules, programs,components, data structures, algorithms, and the like. Computer-readableinstructions can be implemented on various system configurations,including single-processor or multiprocessor systems, minicomputers,mainframe computers, personal computers, hand-held computing devices,wearable computing devices, microprocessor-based, programmable consumerelectronics, combinations thereof, and the like.

Thus, it should be appreciated that the logical operations describedherein are implemented (1) as a sequence of computer implemented acts orprogram modules running on a computing system and/or (2) asinterconnected machine logic circuits or circuit modules within thecomputing system. The implementation is a matter of choice dependent onthe performance and other requirements of the computing system.Accordingly, the logical operations described herein are referred tovariously as states, operations, structural devices, acts, or modules.These operations, structural devices, acts, and modules may beimplemented in software, in firmware, in special purpose digital logic,and any combination thereof

Additionally, the operations described herein can be implemented as asequence of computer implemented acts or program modules running on acomputing system (e.g., a device 500).

FIG. 7 is a diagram of an example flowchart 700 that illustratesoperations directed to determining whether restricted content can berendered for display based on a user identity. The operations in FIG. 7can be performed by a head-mounted display device, by a computing deviceconnected to the head-mounted display device, and/or by a networkdevice.

At operation 702, an identification of a user consuming an experience isdetermined and/or authenticated.

At operation 704, an instruction to display a three-dimensional scenethat is part of the experience on a head-mounted display device isreceived, the three-dimensional scene including one or more objects.

At operation 706, information that defines user permissions associatedwith the objects is accessed.

At operation 708, it is determined, based on the user identification,that the information authorizes content of an object to be displayed inthe three-dimensional scene.

At operation 710, it is determined, based on the user identification,that the information restricts content of an object from being displayedin the three-dimensional scene.

At operation 712, the three-dimensional scene with the authorizedcontent and without the restricted content is displayed on a display ofthe head-mounted display device.

FIG. 8 is a diagram of an example flowchart 800 that illustratesoperations directed to rendering and displaying tailored content basedon a user identity. The operations in FIG. 8 can be performed by ahead-mounted display device, by a computing device connected to thehead-mounted display device, and/or by a network device.

At operation 802, an identification of a user consuming an experience isdetermined and/or authenticated.

At operation 804, an instruction to display a three-dimensional scenethat is part of the experience on a head-mounted display device isreceived, the three-dimensional scene including one or more objects.

At operation 806, the user identification is used to access tailoredcontent useable to populate an object.

At operation 808, the three-dimensional scene with the tailored contentis displayed on a display of the head-mounted display device.

FIG. 9 is a diagram of an example flowchart 900 that illustratesoperations directed to rendering and displaying a tailored sequence ofthree-dimensional scenes. The operations in FIG. 9 can be performed by ahead-mounted display device, by a computing device connected to thehead-mounted display device, and/or by a network device.

At operation 902, an identification of a user consuming an experience isdetermined and/or authenticated.

At operation 904, a first three-dimensional scene that is part of theexperience is displayed on a display of a head-mounted display device.The first three-dimensional scene is configured with a control tonavigate to a second three-dimensional scene.

At operation 906, user input that activates the control is received.

At operation 908, information that identifies the secondthree-dimensional scene from a plurality of available nextthree-dimensional scenes is accessed based on the user input and theuser identification.

At operation 910, the second three-dimensional scene that is part of theexperience is displayed on the display of the head-mounted displaydevice.

The disclosure presented herein may be considered in view of thefollowing example clauses.

Example Clause A, a head-mounted display device comprising: a display;at least one processor; and memory storing instructions that, whenexecuted by the at least one processor, causes the head-mounted displaydevice to perform operations comprising: receiving an instruction todisplay a three-dimensional scene, wherein the three-dimensional sceneincludes at least a first object and a second object; accessinginformation that defines user permissions associated with the firstobject and the second object; determining, based at least in part on auser identification, that the information authorizes content of thefirst object to be displayed in the three-dimensional scene;determining, based at least in part on the user identification, that theinformation restricts content of the second object from being displayedin the three-dimensional scene; and displaying the three-dimensionalscene on the display of the head-mounted display device, wherein thethree-dimensional scene includes the content of the first object.

Example Clause B, the head-mounted display device of Example Clause A,wherein determining that the information authorizes the content of thefirst object to be displayed in the three-dimensional scene is based atleast in part on the user identification being included on a list ofuser identifications that have permission to view the content of thefirst object.

Example Clause C, the head-mounted display device of Example Clause A,wherein determining that the information authorizes the content of thefirst object to be displayed in the three-dimensional scene is based atleast in part on a level of authentication associated with the useridentification satisfying a threshold level of authentication associatedwith the content of the first object.

Example Clause D, the head-mounted display device of any one of ExampleClauses A through C, wherein restricting the content of the secondobject from being displayed comprises providing visibility into anexistence of the second object in the three-dimensional scene.

Example Clause E, the head-mounted display device of any one of ExampleClauses A through C, wherein restricting the content of the secondobject from being displayed comprises restricting visibility into anexistence of the second object in the three-dimensional scene.

Example Clause F, the head-mounted display device of any one of ExampleClauses A through E, wherein the information that defines the userpermissions is accessed using a widget associated with the first objector the second object.

Example Clause G, the head-mounted display device of any one of ExampleClauses A through E, wherein the information that defines the userpermissions is accessed via an application programming interface call toan owner of the first object or the second object.

Example Clause H, the head-mounted display device of any one of ExampleClauses A through G, wherein the operations further comprise: providingan option for a user to request permission to view the content of thesecond object; receiving user input that selects the option; and basedat least in part on receiving the user input, sending a request to anowner of the second object for user permission to view the content ofthe second object.

While Example Clauses A through H are described above with respect to adevice, it is understood in the context of this disclosure that thesubject matter of Example Clauses A through H can additionally oralternatively be implemented as a method or via computer readablestorage media.

Example Clause I, a head-mounted display device comprising: a display;at least one processor; and memory storing instructions that, whenexecuted by the at least one processor, causes the head-mounted displaydevice to perform operations comprising: receiving instructions todisplay a three-dimensional scene, wherein the three-dimensional sceneincludes an object; using a user identification to access tailoredcontent useable to populate the object; and displaying thethree-dimensional scene on the display of the head-mounted displaydevice, wherein the three-dimensional scene includes the objectpopulated with the tailored content.

Example Clause J, the head-mounted display device of Example Clause I,wherein the tailored content is accessed using a widget associated withthe object, the widget comprising information that identifies a networklocation from which the tailored content can be retrieved based on theuser identification.

Example Clause K, the head-mounted display device of Example Clause I,wherein the operations further comprise: associating the useridentification with a category of users, wherein the tailored content isaccessed using a widget associated with the object, the widgetcomprising information that identifies a network location from which thetailored content can be retrieved based on the category of users.

Example Clause L, the head-mounted display device of Example Clause J orExample Clause K, wherein the widget comprises a uniform resourcelocator.

Example Clause M, the head-mounted display device of Example Clause I,wherein the tailored content is accessed via an application programminginterface call to an owner of the object, the application programminginterface call including the user identification.

Example Clause N, head-mounted display device of any one of ExampleClauses I through M, wherein the tailored content comprises at least onedisclosed element and at least one undisclosed element.

Example Clause O, head-mounted display device of any one of ExampleClauses I through N, wherein the object is populated differently basedon different user identifications.

While Example Clauses I through O are described above with respect to adevice, it is understood in the context of this disclosure that thesubject matter of Example Clauses I through O can additionally oralternatively be implemented as a method or via computer readablestorage media.

Example Clause P, a head-mounted display device comprising: a display;at least one processor; and memory storing instructions that, whenexecuted by the at least one processor, causes the head-mounted displaydevice to perform operations comprising: displaying a firstthree-dimensional scene on the display of the head-mounted displaydevice, the three-dimensional scene configured with a control tonavigate to a second three-dimensional scene; receiving user input thatactivates the control; accessing, based at least in part on the userinput and a user identification associated with a user that provides theuser input, information that identifies the second three-dimensionalscene from a plurality of available next three-dimensional scenes; anddisplaying the second three-dimensional scene on the display of thehead-mounted display device.

Example Clause Q, the head-mounted display device of Example Clause P,wherein the first three-dimensional scene, the second three-dimensionalscenes, and the plurality of available next three-dimensional scenes arecreated as part of a same experience.

Example Clause R, the head-mounted display device of Example Clause P orExample Clause Q, wherein the control comprises an object displayed inthe first three-dimensional scene and the information that identifiesthe second three-dimensional scene is accessed using a widget associatedwith the object.

Example Clause S, the head-mounted display device of Example Clause P,wherein the operations further comprise associating the useridentification with a category of users, wherein the secondthree-dimensional scene is identified for the category of users.

Example Clause T, the head-mounted display device of Example Clause R,wherein the widget identifies a network provider that hosts anexperience.

Although the techniques have been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the appended claims are not necessarily limited to the features oracts described. Rather, the features and acts are described as exampleimplementations of such techniques.

The operations of the example processes are illustrated in individualblocks and summarized with reference to those blocks. The processes areillustrated as logical flows of blocks, each block of which canrepresent one or more operations that can be implemented in hardware,software, or a combination thereof. In the context of software, theoperations represent computer-executable instructions stored on one ormore computer-readable media that, when executed by one or moreprocessors, enable the one or more processors to perform the recitedoperations. Generally, computer-executable instructions includeroutines, programs, objects, modules, components, data structures, andthe like that perform particular functions or implement particularabstract data types. The order in which the operations are described isnot intended to be construed as a limitation, and any number of thedescribed operations can be executed in any order, combined in anyorder, subdivided into multiple sub-operations, and/or executed inparallel to implement the described processes. The described processescan be performed by resources associated with one or more device(s) suchas one or more internal or external CPUs or GPUs, and/or one or morepieces of hardware logic such as FPGAs, DSPs, or other types ofaccelerators.

All of the methods and processes described above may be embodied in, andfully automated via, software code modules executed by one or moregeneral purpose computers or processors. The code modules may be storedin any type of computer-readable storage medium or other computerstorage device. Some or all of the methods may alternatively be embodiedin specialized computer hardware.

Conditional language such as, among others, “can,” “could,” “might” or“may,” unless specifically stated otherwise, are understood within thecontext to present that certain examples include, while other examplesdo not include, certain features, elements and/or steps. Thus, suchconditional language is not generally intended to imply that certainfeatures, elements and/or steps are in any way required for one or moreexamples or that one or more examples necessarily include logic fordeciding, with or without user input or prompting, whether certainfeatures, elements and/or steps are included or are to be performed inany particular example. Conjunctive language such as the phrase “atleast one of X, Y or Z,” unless specifically stated otherwise, is to beunderstood to present that an item, term, etc. may be either X, Y, or Z,or a combination thereof

Any routine descriptions, elements or blocks in the flow diagramsdescribed herein and/or depicted in the attached figures should beunderstood as potentially representing modules, segments, or portions ofcode that include one or more executable instructions for implementingspecific logical functions or elements in the routine. Alternateimplementations are included within the scope of the examples describedherein in which elements or functions may be deleted, or executed out oforder from that shown or discussed, including substantiallysynchronously or in reverse order, depending on the functionalityinvolved as would be understood by those skilled in the art. It shouldbe emphasized that many variations and modifications may be made to theabove-described examples, the elements of which are to be understood asbeing among other acceptable examples. All such modifications andvariations are intended to be included herein within the scope of thisdisclosure and protected by the following claims.

1-8. (canceled)
 9. A head-mounted display device comprising: a display;at least one processor; and memory storing instructions that, whenexecuted by the at least one processor, causes the head-mounted displaydevice to perform operations comprising: receiving instructions todisplay a three-dimensional scene, wherein the three-dimensional sceneincludes an object configured to be populated with first tailoredcontent for a first user identification and second tailored content fora second user identification; using the first user identification toaccess the first tailored content useable to populate the object; anddisplaying the three-dimensional scene on the display of thehead-mounted display device, wherein the three-dimensional sceneincludes the object populated with the first tailored content.
 10. Thehead-mounted display device of claim 9, wherein the first tailoredcontent is accessed using a widget associated with the object, thewidget comprising information that identifies a network location fromwhich the first tailored content can be retrieved based on the firstuser identification.
 11. The head-mounted display device of claim 9,wherein the operations further comprise associating the first useridentification with a category of users, wherein the first tailoredcontent is accessed using a widget associated with the object, thewidget comprising information that identifies a network location fromwhich the first tailored content can be retrieved based on the categoryof users.
 12. The head-mounted display device of claim 10, wherein thewidget comprises a uniform resource locator.
 13. The head-mounteddisplay device of claim 9, wherein the first tailored content isaccessed via an application programming interface call to an owner ofthe object, the application programming interface call including thefirst user identification.
 14. The head-mounted display device of claim9, wherein the first tailored content comprises at least one disclosedelement and at least one undisclosed element.
 15. The head-mounteddisplay device of claim 9, wherein the object is populated differentlybased on different user identifications.
 16. A head-mounted displaydevice comprising: a display; at least one processor; and memory storinginstructions that, when executed by the at least one processor, causesthe head-mounted display device to perform operations comprising:accessing data associated with a single experience which includes aplurality of three-dimensional scenes configured to display relatedvirtual content for a particular purpose, wherein the single experienceenables a first user and a second user to navigate through a differentsequence of three-dimensional scenes; displaying a firstthree-dimensional scene of the plurality of three-dimensional scenes onthe display of the head-mounted display device, the firstthree-dimensional scene configured with a control to navigate to asecond three-dimensional scene; receiving, from the first user, userinput that activates the control; accessing, based at least in part onthe user input and a user identification associated with the first user,information that identifies the second three-dimensional scene from aplurality of available next three-dimensional scenes; and displaying thesecond three-dimensional scene on the display of the head-mounteddisplay device.
 17. (canceled)
 18. The head-mounted display device ofclaim 16, wherein the control comprises an object displayed in the firstthree-dimensional scene and the information that identifies the secondthree-dimensional scene is accessed using a widget associated with theobject.
 19. The head-mounted display device of claim 18, wherein thewidget identifies a network provider that hosts the single experience.20. The head-mounted display device of claim 16, wherein the operationsfurther comprise associating the user identification with a category ofusers, wherein the second three-dimensional scene is identified for thecategory of users.
 21. A method comprising: receiving instructions todisplay a three-dimensional scene, wherein the three-dimensional sceneincludes an object configured to be populated with first tailoredcontent for a first user identification and second tailored content fora second user identification; using the first user identification toaccess the first tailored content useable to populate the object; anddisplaying the three-dimensional scene on a display of a head-mounteddisplay device, wherein the three-dimensional scene includes the objectpopulated with the first tailored content.
 22. The method of claim 21,wherein the first tailored content is accessed using a widget associatedwith the object, the widget comprising information that identifies anetwork location from which the first tailored content can be retrievedbased on the first user identification.
 23. The method of claim 22,wherein the widget comprises a uniform resource locator.
 24. The methodof claim 21, further comprising associating the first useridentification with a category of users, wherein the first tailoredcontent is accessed using a widget associated with the object, thewidget comprising information that identifies a network location fromwhich the first tailored content can be retrieved based on the categoryof users.
 25. The method of claim 21, wherein the first tailored contentis accessed via an application programming interface call to an owner ofthe object, the application programming interface call including thefirst user identification.
 26. The method of claim 21,wherein the firsttailored content comprises at least one disclosed element and at leastone undisclosed element.
 27. The method of claim 21,wherein the objectis populated differently based on different user identifications.