Abstract:
Embodiments are described for placing a watermark over application windows in a desktop. For each application window that is opened in the desktop, the system can determine whether the application requires a watermark, for example, based on a predefined list that specifies which applications require watermarks. For each application window that requires a watermark, a uncovered watermark region can be calculated where the watermark will appear. An overlay can be placed over the application windows, for example in a top-level window that does not receive mouse and keyboard inputs, and the watermark can be drawn in the overlay over the location of the uncovered watermark region of each application. As a result, watermarks can be placed over a plurality of specified application windows in an efficient and convenient manner.
Abstract:
Authentication to a remote-server from a computing device having stored credentials for the remote server is described. In one example, a method of authenticating a user to a remote server through a client application executing on a computing device includes: receiving, by the client application, a request to authenticate the user to the remote server using credentials stored on the computing device; prompting, by the client application, the user for gesture-based password; authenticating, by the client application, the gesture-based password; and sending, by the client application, the stored credentials to the remote server for authentication in response to successful authentication of the gesture-based password.
Abstract:
Embodiments are described for placing a watermark over application windows in a desktop. For each application window that is opened in the desktop, the system can determine whether the application requires a watermark, for example, based on a predefined list that specifies which applications require watermarks. For each application window that requires a watermark, a uncovered watermark region can be calculated where the watermark will appear. An overlay can be placed over the application windows, for example in a top-level window that does not receive mouse and keyboard inputs, and the watermark can be drawn in the overlay over the location of the uncovered watermark region of each application. As a result, watermarks can be placed over a plurality of specified application windows in an efficient and convenient manner.
Abstract:
Techniques are described for enabling a client device having an established virtual desktop session to seamlessly handoff the virtual desktop session to other nearby client devices without the need for the user to manually disconnect the client and re-enter authentication information. The session transfer may be performed using a short-range wireless connectivity protocol, such as BTLE, where the client device having an established virtual desktop session operates in sender mode and broadcasts session handoff messages to nearby receiver devices within a valid range. Another client device operating in receiver mode may accept the session handoff message including session information associated with the virtual desktop session and initiate the transfer of the virtual desktop session without the need for the user to re-authenticate to the server.
Abstract:
Techniques are described for enabling a client device having an established virtual desktop session to seamlessly handoff the virtual desktop session to other nearby client devices without the need for the user to manually disconnect the client and re-enter authentication information. The session transfer may be performed using a short-range wireless connectivity protocol, such as BTLE, where the client device having an established virtual desktop session operates in sender mode and broadcasts session handoff messages to nearby receiver devices within a valid range. Another client device operating in receiver mode may accept the session handoff message including session information associated with the virtual desktop session and initiate the transfer of the virtual desktop session without the need for the user to re-authenticate to the server.