Extended Reality Authentication
    11.
    发明申请

    公开(公告)号:US20220271934A1

    公开(公告)日:2022-08-25

    申请号:US17662711

    申请日:2022-05-10

    Abstract: Methods and systems for secure authentication in an extended reality (XR) environment are described herein. An XR environment may be output by a computing device and for display on a device configured to be worn by a user. A first plurality of images may be determined via the XR environment. The first plurality of images may be determined based on a user looking at a plurality of objects, real or virtual, in the XR environment. The first plurality of images may be sent to a server, and the server may return a second plurality of images. A public key and private key may be determined based on different portions of each of the second plurality of images. The public key may be sent to the server to register and/or authenticate subsequent communications between the computing device and the server.

    VALIDATING SHARED FILES
    12.
    发明申请

    公开(公告)号:US20220217001A1

    公开(公告)日:2022-07-07

    申请号:US17141602

    申请日:2021-01-05

    Abstract: A computing device may receive a file previously uploaded by another device, and may validate the received file using data including a first value encrypted based on a document (e.g., a digital certificate or identification certificate) of the uploading device. The computing device may determine the validity of the certificate based on a certificate of a remote computing device to which the file was uploaded, and may decrypt the first value using a key of the certificate of the uploading device. The computing device may determine a second value for the received file and may determine validity of the received file based on a match of the first value and the second value.

    Enhanced file sharing systems and methods

    公开(公告)号:US11381657B2

    公开(公告)日:2022-07-05

    申请号:US16376026

    申请日:2019-04-05

    Abstract: A computer system is provided. The computer system can include a memory, a network interface, and at least one processor coupled to the memory and the network interface. The at least one processor can be configured to identify a file to provide to a computing device; predict a geolocation at which the computing device is to request access to the file; predict a network bandwidth to be available to the computing device at the geolocation; determine, based on the file and the network bandwidth, a first portion of the file to store in a cache of the computing device; and download, via the network interface, the first portion of the file to the cache.

    Extended reality authentication
    14.
    发明授权

    公开(公告)号:US11362825B2

    公开(公告)日:2022-06-14

    申请号:US16887853

    申请日:2020-05-29

    Abstract: Methods and systems for secure authentication in an extended reality (XR) environment are described herein. An XR environment may be output by a computing device and for display on a device configured to be worn by a user. A first plurality of images may be determined via the XR environment. The first plurality of images may be determined based on a user looking at a plurality of objects, real or virtual, in the XR environment. The first plurality of images may be sent to a server, and the server may return a second plurality of images. A public key and private key may be determined based on different portions of each of the second plurality of images. The public key may be sent to the server to register and/or authenticate subsequent communications between the computing device and the server.

    Systems and methods for using unencrypted communication tunnels

    公开(公告)号:US11356418B2

    公开(公告)日:2022-06-07

    申请号:US16898822

    申请日:2020-06-11

    Abstract: Described embodiments provide systems and methods for using unencrypted communication tunnels. A first device intermediary between a client and a server may maintain an encrypted tunnel and an unencrypted tunnel with a second device intermediary between the client and the server. The first device may communicate, with the second device, at least one network address translation (NAT) rule via the encrypted tunnel. The first device may translate address information of a first packet, using the at least one NAT rule. The first device may send the first packet with the translated address information via the unencrypted tunnel, to the second device to reverse the translation of the address information using the at least one NAT rule.

    UNIFIED FILE STORAGE SYSTEM
    17.
    发明申请

    公开(公告)号:US20210318990A1

    公开(公告)日:2021-10-14

    申请号:US16892539

    申请日:2020-06-04

    Abstract: A computing system may store a first file in a system repository that is to be synchronized with at least a first repository associated with a first client device and a second repository associated with a second client device. The computing system may determine that the first repository is to receive a downloaded copy of at least a portion of the first file, and may cause a copy of the at least a portion of the first file to be downloaded from the system repository to the first repository. Based at least in part on the computing system determining that the first repository is to receive the downloaded copy, an identifier of the at least a portion of first file may be stored in the second repository without storing a copy of the at least a portion of the first file in the second repository.

    SERVER FOR DETECTING A PROXY DEVICE IN A COMMUNICATIONS PATH AND RELATED METHODS

    公开(公告)号:US20210234838A1

    公开(公告)日:2021-07-29

    申请号:US17230442

    申请日:2021-04-14

    Abstract: A computing device may include a processor and a memory. The processor may be configured to provide an encrypted second portion of a key to a client device in response to a match between data decrypted from an encrypted first portion of the key and a first portion of the key, the match being indicative of an absence of a proxy device. The processor may be configured to detect a loss in connectivity between the computing device and the client device based upon a mismatch between a decrypted second portion of the key and a second portion of the key, the mismatch being indicative of the proxy device.

    Method to determine optimal number of HTTP2.0 streams and connections for better QoE

    公开(公告)号:US11025699B2

    公开(公告)日:2021-06-01

    申请号:US16747690

    申请日:2020-01-21

    Abstract: Described embodiments provide for dynamically optimizing the number of application layer streams that may be multiplexed into a single transport layer connection, providing the advantages of application layer multiplexing without incurring unnecessary congestion-based network delays. A device may monitor net bandwidth and packet loss rates for a connection, and may dynamically increase and decrease a number of concurrent application layer streams to balance throughput and congestion avoidance. As congestion increases, the device may reduce concurrent stream limits in order to spawn additional transport layer connections, allowing faster congestion recovery and reduced performance impairment.

    METHOD FOR OPTIMAL PATH SELECTION FOR DATA TRAFFIC UNDERGOING HIGH PROCESSING OR QUEUING DELAY

    公开(公告)号:US20200374213A1

    公开(公告)日:2020-11-26

    申请号:US16990508

    申请日:2020-08-11

    Abstract: Described embodiments provide systems and methods for path selection proportional to a penalty delay in processing packets. A server-side intermediary may identify a delay penalty for processing packets of a server destined for a client. The server-side intermediary may be in communication via links of different latencies with a client-side intermediary. The server-side intermediary may select a second link with a latency that deviates from the lowest latency of a first link by the delay penalty. The server-side intermediary may transmit, to the client-side intermediary, duplicates of the packets via the selected second link with information indicating to hold the duplicates at the client-side intermediary. The server-side intermediary may receive an indication to drop or send the duplicates to the client. The server-side intermediary may transmit the indication to the client-side intermediary to drop or send the duplicates according to the indication.

Patent Agency Ranking