Method for resumption of an application session with a very dynamic and very large state in a standby intermediary device when the primary device fails

    公开(公告)号:US11388243B2

    公开(公告)日:2022-07-12

    申请号:US16998467

    申请日:2020-08-20

    Inventor: Pravin Singhal

    Abstract: The present disclosure is directed towards systems and methods of maintaining a session via an intermediary device. A first device intermediary to a client and a plurality of servers receives a packet of a session. The packet of the session includes application protocol data and application session metadata used to maintain a state of an application accessed via the session. The first device marks a session state of the session to an update state. The first device determines that a second device intermediary to the client and the plurality of servers is in a ready state and the session state of the session is in the update state. The first device forwards the application protocol data and the application session metadata of the packet to the second device to maintain, on the second device, the same state of the application accessed via the session provided by the first device.

    Robust Suspension and Resumption of Desktop Virtualization

    公开(公告)号:US20220217064A1

    公开(公告)日:2022-07-07

    申请号:US17701895

    申请日:2022-03-23

    Abstract: A method for suspending and resuming a connection for desktop virtualization between two computing devices. In response to a client computing device shutting down, suspending, hibernating, or losing network connectivity during virtualization, the server computing device may itself shut down, suspend, or hibernate, or may pause or suspend the operation of one or more applications currently hosted by the server computing device. The server may detect that connectivity has been restored and resume operation of hosted applications. Alternatively, the client may transmit a command to the server indicating that the client is ready to resume virtualization. The client may also be configured to transmit a command that may cause the server to resume a powered-on state after the server was shut down or in a state of hibernation.

    VALIDATING SHARED FILES
    183.
    发明申请

    公开(公告)号:US20220217001A1

    公开(公告)日:2022-07-07

    申请号:US17141602

    申请日:2021-01-05

    Abstract: A computing device may receive a file previously uploaded by another device, and may validate the received file using data including a first value encrypted based on a document (e.g., a digital certificate or identification certificate) of the uploading device. The computing device may determine the validity of the certificate based on a certificate of a remote computing device to which the file was uploaded, and may decrypt the first value using a key of the certificate of the uploading device. The computing device may determine a second value for the received file and may determine validity of the received file based on a match of the first value and the second value.

    Enhanced file sharing systems and methods

    公开(公告)号:US11381657B2

    公开(公告)日:2022-07-05

    申请号:US16376026

    申请日:2019-04-05

    Abstract: A computer system is provided. The computer system can include a memory, a network interface, and at least one processor coupled to the memory and the network interface. The at least one processor can be configured to identify a file to provide to a computing device; predict a geolocation at which the computing device is to request access to the file; predict a network bandwidth to be available to the computing device at the geolocation; determine, based on the file and the network bandwidth, a first portion of the file to store in a cache of the computing device; and download, via the network interface, the first portion of the file to the cache.

    Systems and methods for establishing a channel between multiple devices

    公开(公告)号:US11381610B2

    公开(公告)日:2022-07-05

    申请号:US16417353

    申请日:2019-05-20

    Abstract: Described embodiments provide systems and method for establishing a collaboration channel between a plurality of devices to provide shared access to at least one memory location for each device of the plurality of devices. A server can detect an event identifying a plurality of participants and generate a template for the event. The server can create, based on the template, a folder to store one or more content items and establish a channel communicatively connecting the plurality of devices with the folder. The channel can provide shared access to the folder for each device of the plurality of devices. The server can receive, via the channel a first content item at the folder responsive to at least one device executing the first action and provide, responsive to receiving the first content item, a second action to the plurality of devices through the channel.

    Peer to Peer Remote Application Discovery

    公开(公告)号:US20220210223A1

    公开(公告)日:2022-06-30

    申请号:US17693591

    申请日:2022-03-14

    Abstract: Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein.

    SYSTEMS AND METHODS FOR PROTECTION AGAINST THEFT OF USER CREDENTIALS BY EMAIL PHISHING ATTACKS

    公开(公告)号:US20220210186A1

    公开(公告)日:2022-06-30

    申请号:US17135456

    申请日:2020-12-28

    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to provide protection against theft of user credentials by email phishing attacks. The at least one processor is further configured to identify a company name included in a received email; identify a link in the received email; extract a domain name from the identified link; search a linkmap for an existing record associated with the identified company name, wherein the linkmap comprises a collection of records, the records relating names of companies to trusted domain names; determine if the extracted domain name matches a trusted domain name of the existing record; and identify the received email as genuine in response to the determination of the match.

    SYSTEMS AND METHODS FOR SECURING USER DEVICES

    公开(公告)号:US20220207162A1

    公开(公告)日:2022-06-30

    申请号:US17136705

    申请日:2020-12-29

    Abstract: In one embodiment, a method includes: receiving an input by an application executable on a computing device, the application being presented in a first window displayable on the computing device and configured to provide access to another application, and the another application being displayable in a second window different than the first window; and providing by the application a message to the another application to modify access to content of the another application via the computing device in response to receipt of the input by the application, so as prevent display of the content within the second window of the computing device.

    SYSTEMS AND METHODS FOR PROTECTION AGAINST THEFT OF USER CREDENTIALS

    公开(公告)号:US20220207121A1

    公开(公告)日:2022-06-30

    申请号:US17340188

    申请日:2021-06-07

    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to receive a sequence of characters within a field of a web browser, the field being associated with a password entry field served to the web browser from a website. The processor is further configured to store the received sequence of characters and send an alternate sequence of characters to the website. The processor is further configured to encrypt the received sequence of characters to generate a received encrypted partial password and compare the received encrypted partial password to one or more entries in a list of encrypted partial passwords. The processor is further configured to, in response to the comparison resulting in a difference, delete the previously sent alternate sequence of characters, and send the stored sequence of characters to the website.

Patent Agency Ranking