Confidential presentations in virtual world infrastructure
First Claim
1. A method for forming a confidential presentation, the method comprising the steps of:
- securely storing textures and correspondence indicators in a memory of a confidential asset server outside a computing environment associated with a virtual application, wherein the confidential asset server is not accessible by a computing resource maintained by a service provider of the virtual application;
obtaining, by an authorized entity, a correspondence indicator from the confidential asset server, wherein the correspondence indicator indicates a first texture that corresponds to a first object, wherein the first object is within the computing environment associated with the virtual application, wherein the first texture comprises confidential content that is securely stored by the confidential asset server outside the computing environment associated with the virtual application;
obtaining the first texture from the confidential asset server, wherein the confidential presentation comprises the first texture; and
overlaying the first texture onto the first object.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
-
Citations
22 Claims
-
1. A method for forming a confidential presentation, the method comprising the steps of:
-
securely storing textures and correspondence indicators in a memory of a confidential asset server outside a computing environment associated with a virtual application, wherein the confidential asset server is not accessible by a computing resource maintained by a service provider of the virtual application; obtaining, by an authorized entity, a correspondence indicator from the confidential asset server, wherein the correspondence indicator indicates a first texture that corresponds to a first object, wherein the first object is within the computing environment associated with the virtual application, wherein the first texture comprises confidential content that is securely stored by the confidential asset server outside the computing environment associated with the virtual application; obtaining the first texture from the confidential asset server, wherein the confidential presentation comprises the first texture; and overlaying the first texture onto the first object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A network, comprising:
-
a confidential asset server to securely store textures and correspondence indicators outside a computing environment associated with a virtual application, wherein the confidential asset server is not accessible by a computing resource maintained by a service provider of the virtual application; and a proxy authorized to access the confidential asset server and configured to form a confidential presentation by performing the steps of; obtaining a correspondence indicator from the confidential asset server, wherein the correspondence indicator indicates a first texture that corresponds to a first object, wherein the first object is within the computing environment associated with the virtual application, wherein the first texture comprises confidential content that is securely stored by the confidential asset server outside the computing environment associated with the virtual application; obtaining the first texture from the confidential asset server, wherein the confidential presentation comprises the first texture; and overlaying the first texture onto the first object, wherein the first texture is overlaid by the proxy. - View Dependent Claims (17, 18)
-
-
19. Apparatus for forming a confidential presentation, the apparatus comprising:
-
a memory; and a processor coupled to the memory and configured to; obtain a correspondence indicator from a confidential asset server, wherein the confidential asset server securely stores textures and correspondence indicators outside a computing environment associated with a virtual application, wherein the confidential asset server is not accessible by a computing resource maintained by a service provider of the virtual application, wherein the correspondence indicator indicates a first texture that corresponds to a first object, wherein the first object is within the computing environment associated with the virtual application, wherein the first texture comprises confidential content that is securely stored by the confidential asset server outside the computing environment associated with the virtual application; obtain the first texture from the confidential asset server, wherein the confidential presentation comprises the first texture; and overlay the first texture onto the first object.
-
-
20. An article of manufacture for forming a confidential presentation, the article comprising a computer readable storage medium having one or more programs embodied therewith, wherein the one or more programs, when executed by a computer, perform steps of:
-
securely storing textures and correspondence indicators in a memory of a confidential asset server outside a computing environment associated with a virtual application, wherein the confidential asset server is not accessible by a computing resource maintained by a service provider of the virtual application; obtaining, by an authorized entity, a correspondence indicator from the confidential asset server, wherein the correspondence indicator indicates a first texture that corresponds to a first object, wherein the first object is within the computing environment associated with the virtual application, wherein the first texture comprises confidential content that is securely stored by the confidential asset server outside the computing environment associated with the virtual application; obtaining the first texture from the confidential asset server, wherein the confidential presentation comprises the first texture; and overlaying the first texture onto the first object.
-
-
21. A confidential asset server for forming a confidential presentation, the confidential asset server configured to:
-
securely store textures and correspondence indicators outside a computing environment associated with a virtual application, wherein the confidential asset server is not accessible by a computing resource maintained by a service provider of the virtual application; provide a correspondence indicator, wherein the correspondence indicator indicates a first texture that corresponds to a first object, wherein the first object is within the computing environment associated with the virtual application, wherein the first texture comprises confidential content that is securely stored by the confidential asset server outside the computing environment associated with the virtual application; and provide the first texture, wherein the confidential presentation comprises the first texture. - View Dependent Claims (22)
-
Specification