摘要:
A method and system for capturing user actions in the real world and mapping the users, their actions, and their avatars into a three dimensional virtual environment. Data representing real world users are captured, collected and sent to a virtual proxy bridge, which transforms the data into control signal for avatars, which are then mapped to the virtual environment. The real world avatars move around in parallel with the users in the real world via the use of data capture devices such as radio frequency identification (“RFID”) readers, triangulation or global positioning satellite (“GPS”) systems, and cameras. Real world users can therefore be represented as virtual users, thus removing the distinction between real world users and virtual environment users.
摘要:
A participant in a three dimensional computer-generated virtual environment is able to control a dispersion pattern of his Avatar's voice such that the Avatar's voice may be directionally enhanced using simple controls. The audio dispersion envelope is designed to extend further in front of the Avatar and less to the sides and rear of the Avatar. The audio dispersion envelope may be static or controllable by the participant to enable the distance that the Avatar's voice travels within the virtual environment to be adjusted. This enables the Avatar to whisper or “shout” in the virtual environment such that other Avatars normally outside of hearing range of the Avatar may selectively receive audio generated by the user. Separate audio streams are mixed for each user from audio generated by users with Avatars within their Avatar's dispersion envelope. The volume of audio from a user in the mixed audio stream depends on the separation of the Avatars within the virtual environment.
摘要:
System and method for transparent single sign-on authentication on computers in a networked environment. A preferred embodiment comprises receiving an authentication request from an operating system of a first computer, requesting credentials of an application making the authentication request, authenticating the credentials, storing the credentials if the authentication is successful, and transmitting the credentials to a second computer. On subsequent access requests made by the user on the second computer, the credentials can be retrieved from the secure store, eliminating the need to prompt the user to re-enter authentication information.
摘要:
Users create profiles containing their interests, professional qualifications, and/or personal information. When users encounter each other in the virtual environment, the information contained in the personal profiles is used to provide visual indications of the profile information so that other users know some modicum of information about the user associated with the Avatar. The user associated with the personal profile may control what information is provided publicly and what information is provided privately. Information in other users' profiles may be filtered to enable relevant information to be presented to the user. Filtering may be explicit and based on user-defined criteria. Filtering may be inherent as well and implemented to select visual indications based on similarities between the user's profile information and the other users' profile information. Inherent matching of attributes may be exact, based on pre-defined similarities or groups, or based on learned similarities between types of attributes, or based on previous interactions of the user with other users in the virtual environment.
摘要:
Information URLs may be associated with three dimensional objects in a three dimensional virtual environment. When a URL is selected, an overlay web rendering engine renders a web page associated with the URL over the object in the three dimensional virtual environment. The web page may include rich content, interactive content, or any other type of web content supported by the user's local browser and browser plugging. The user may interact with the content in the overlay web rendering engine to obtain successive layers of content or to affect the object in the virtual environment. The web page is rendered with a transparent background so that the three dimensional content of the virtual environment continues to be visible through the web page and provides context for the overlayed content. Information URLs may be used to provide information about objects, Avatars, or the virtual environment itself.
摘要:
Interaction with web content in a web browser can control actions in an embedded virtual environment, and events in the virtual environment can be used to update content and applications running in the web browser. In one embodiment, particular events in the virtual environment are passed to a mapping component that listens for triggers and issues commands in the web browser. A JavaScript mapping component may be used to listen for the triggers, capture parameters associated with the trigger, lookup the trigger type in a mapping table, and call a mapped JavaScript function with the trigger parameters. In the reverse direction, if a JavaScript function call is entered in the web browser, the JavaScript function invokes a function exposed by a virtual environment plugin. The plug-in invokes an event within the virtual environment so that interaction with the web content can control actions in the virtual environment.
摘要:
A method and system for creating a topic-based 3D virtual environment. The inventive method and system provides a 3D virtual environment that includes images, scenery, and content that relate to the topic of discussion in the virtual environment. If the virtual “meeting” should be adjourned or ended, the system saves the data, discussions that occurred during the meeting, and all the scenery and content related to the virtual meeting so that the meeting can be continued with all of the content and imagery in place. A virtual environment template containing this information is loaded and used for subsequent virtual meetings discussing the same topic.
摘要:
A separate peer-to-peer multi-directional audio channel is established between a subset of the participants to an existing multi-party communication session on the same channel as the original multi-party communication session. Since the secure channel is established on the existing call, the same NAT/firewall traversal mechanisms may be used, and even the same socket may be used. Participants on the secure side conversation can hear both the secure side conversation and the main multi-party communication session. Participants that are not on the secure side conversation may receive packets from the secure side conversation, but are not part of the security association for the secure side conversation and, hence, cannot hear the audio from the secure side conversation.
摘要:
A method and apparatus for managing communication between participants in a virtual environment enables the participants to elect to automatically connect with each other via a preferred communication mechanism, manually connect with each other, or choose not to connect with each other. The connection may be point-to-point between two participants or may include multiple participants. Establishment of a connection, or the ability to establish a connection, may be based on the proximity of the participants, or the Avatars representing the participants, in the virtual environment. Once the connection is established, the connection may be managed so that the connection is maintained while the Avatars remain proximate each other and is automatically severed once the Avatars move away from each other. Environmental noise and other audio aspects may be included in the connection to simulate a real-world conversation.
摘要:
A method and apparatus for managing communication between participants in a virtual environment enables the participants to elect to automatically connect with each other via a preferred communication mechanism, manually connect with each other, or choose not to connect with each other. The connection may be point-to-point between two participants or may include multiple participants. Establishment of a connection, or the ability to establish a connection, may be based on the proximity of the participants, or the Avatars representing the participants, in the virtual environment. Once the connection is established, the connection may be managed so that the connection is maintained while the Avatars remain proximate each other and is automatically severed once the Avatars move away from each other. Environmental noise and other audio aspects may be included in the connection to simulate a real-world conversation.