摘要:
Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An application may prompt a user to provide user entropy such as a passcode (e.g. a password and/or PIN). The application may use the user entropy to decrypt a user-entropy-encrypted vault key. Once the vault key is decrypted, the application may decrypt a vault database of the shared vault. The shared vault may store shared secrets, such as server credentials, and an unlock key. The application may store the unlock key, generate an unlock-key-encrypted vault key, and cause the shared vault to store the unlock-keyencrypted vault key, thereby unlocking the vault. The application may then use the unlock key to decrypt the vault database without prompting the user to provide user entropy again.
摘要:
The embodiments are directed to methods and systems for determining whether a server should be placed in maintenance mode. The methods and systems can create a user group comprising one or more client devices connected to one or more permanently installed applications or one or more virtual desktops hosted on the server. The methods and systems can create a temporary directory containing duplicates of the one or more applications or one or more virtual desktops that the one or more client devices are connected to. The methods and systems can disconnect the one or more client devices from the one or more permanent applications or virtual desktops, and connect the one or more user devices to the one or more duplicate applications or virtual desktops.
摘要:
The methods and systems described herein provide for securing sensitive information using a hypervisor-trusted client, in a computing device executing a hypervisor hosting a control virtual machine and a non-trusted virtual machine. A user of a non-trusted virtual machine executed by a processor of a computing device requests to establish a connection to a remote computing device. A control virtual machine executed by the processor of the computing device launches a client agent, responsive to the request. A graphics manager executed by the processor of the computing device assigns a secure section of a memory of a graphics processing unit of the computing device to the client agent. The graphics manager renders graphical data generated by the client agent to the secure section of the graphics processing unit memory.
摘要:
The present disclosure is directed to systems and methods for performing single sign on by an intermediary device for a remote desktop session of a client. A first device intermediary to a plurality of clients and a plurality of servers authenticates a user and establishes a connection to the user's client device. The device provides a homepage including links to one or more remote desktop hosts associated with the user. The device receives a request to launch an RDP session with a remote desktop host via the homepage and generates RDP content, including a security token, for the user. The device receives a second request that includes the security token to launch the RDP session. The device validates the user using the security token and establishes a connection to the remote desktop host. The device signs into the desktop host using session credentials.
摘要:
A system and method is provided for discovering application compatibility status, the method being performed by one or more processors, the method comprising receiving a request for determining compatibility of a first application with a platform and organizing a plurality of data points associated with the first application into a plurality of elements. The method also comprises comparing the plurality of elements with a plurality of elements associated with one or more analyzed applications, wherein the one or more analyzed applications have been previously analyzed for compatibility with the platform. The method further comprises identifying a compatibility status of the first application with the platform based on the comparison; and providing, for display, the compatibility status of the first application.
摘要:
The methods and systems described herein provide for securing sensitive information using a hypervisor-trusted client, in a computing device executing a hypervisor hosting a control virtual machine and a non-trusted virtual machine. A user of a non-trusted virtual machine executed by a processor of a computing device requests to establish a connection to a remote computing device. A control virtual machine executed by the processor of the computing device launches a client agent, responsive to the request. A graphics manager executed by the processor of the computing device assigns a secure section of a memory of a graphics processing unit of the computing device to the client agent. The graphics manager renders graphical data generated by the client agent to the secure section of the graphics processing unit memory.
摘要:
A technique for recording dictation, meetings, lectures, and other events includes automatically segmenting an audio recording into portions by detecting speech transitions within the recording and selectively identifying certain portions of the recording as noteworthy. Noteworthy audio portions are displayed to a user for selective playback. The user can navigate to different noteworthy audio portions while ignoring other portions. Each noteworthy audio portion starts and ends with a speech transition. Thus, the improved technique typically captures noteworthy topics from beginning to end, thereby reducing or avoiding the need for users to have to search for the beginnings and ends of relevant topics manually.
摘要:
Methods and systems for preventing unsecured mobile applications from accessing encrypted resources are presented. In some embodiments, a mobile device may determine that a background process associated with a mobile application is requesting to access an encrypted resource. The mobile device may further determine whether the mobile application has been secured with authentication information. In response to determining that the mobile application has not been secured, the mobile device may suspend the background process until the mobile application has been secured and transmit a request to a mobile application management agent to secure the mobile application using authentication information.