CONNECTION-BASED RESOURCE MANAGEMENT FOR VIRTUAL DESKTOP INSTANCES

    公开(公告)号:US20250004801A1

    公开(公告)日:2025-01-02

    申请号:US18766405

    申请日:2024-07-08

    Abstract: A computing system that provides virtual computing services may generate and manage remote computing sessions between client computing devices and virtual desktop instances hosted on the service provider's network. A computing resource instance manager may monitor connections to and disconnections from a virtual desktop instance during particular time periods, and may apply a resource management policy to determine whether and when to shut down an underlying virtualized computing resource instance following a disconnection (e.g., immediately, after some period of time, or only between certain hours). A storage volume for the virtual desktop instance may be detached during a shutdown. In response to a reconnection request, the virtualized computing resource instance (or another such instance) may be restarted and the storage volume may be reattached. The computing resource instance manager may develop a model for predicting when to shut down or restart an instance based on historical data or machine learning.

    Virtual machine logon federation
    13.
    发明授权

    公开(公告)号:US10205717B1

    公开(公告)日:2019-02-12

    申请号:US13854697

    申请日:2013-04-01

    Abstract: Systems and methods are described for providing federated access to end-users of virtual machines. The method includes receiving a request from a user to access a resource outside of the user's original security domain. The user's existing security credentials are forwarded to an authentication entity, which determines if the user's credentials are authentic. If it is determined that the user's credentials are authentic, the user's target identity provider generates a security token that provides the virtual machine user with access to the resource, the resource residing in an external security domain. The user may log on to the virtual machine with access to the desired resource, subject to the privileges identified in the security token.

Patent Agency Ranking