Network traffic steering with programmatically generated proxy auto-configuration files

    公开(公告)号:US11343185B2

    公开(公告)日:2022-05-24

    申请号:US16877971

    申请日:2020-05-19

    Abstract: Described embodiments provide systems and methods for steering network traffic using dynamically generated configuration scripts. A first device may generate a configuration script for an application on the client for connecting with a server. The configuration script may specify the application to establish a direct connection or an indirect connection with the server. The first device may provide the configuration script to be invoked by the application to identify a first address to access the server based on a determination to establish the direct connection or the indirect connection. The first device may receive, from the client, an initiation request to connect with the server including the first address. The first device may determine second address by applying a routing policy to the first address. The first device may establish one of the direct connection or the indirect connection using the second address.

    UNIFIED INTELLIGENT EDITOR TO CONSOLIDATE ACTIONS IN A WORKSPACE

    公开(公告)号:US20220137990A1

    公开(公告)日:2022-05-05

    申请号:US17304563

    申请日:2021-06-23

    Abstract: A computing device includes a display, and a processor coupled to the display. The processor is configured to monitor user input for a template keyword that matches with one or more templates, and display on the display one or more application service options in response to the template keyword matching the one or more of the templates. Each application service option corresponds to an action that can be performed. The processor provides template content data to a server, with the template content data defining the action corresponding to the template associated with the application service option selected by a user of the computing device.

    Protecting sensitive data using conversational history

    公开(公告)号:US11323400B1

    公开(公告)日:2022-05-03

    申请号:US17179570

    申请日:2021-02-19

    Abstract: Methods and systems for protecting sensitive data using conversational history are described herein. An enterprise data validation server may receive conversation snippets and create a topic model. The enterprise data validation server may detect a message is being sent from a first user to a second user, determine a topic distribution between the first user and the second user, and a topic distribution of the message. The enterprise data validation server may determine a bias value associated with the message by comparing the topic distribution of the message and the topic distribution between the first user and the second user. Accordingly, based on a determination that the bias value exceeds a threshold, the enterprise data validation server send an alert containing a warning message.

    SYSTEMS AND METHODS FOR TRAFFIC INSPECTION VIA AN EMBEDDED BROWSER

    公开(公告)号:US20220131886A1

    公开(公告)日:2022-04-28

    申请号:US17572048

    申请日:2022-01-10

    Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.

    SYSTEMS AND METHODS FOR WATERMARKING AUDIO OF SAAS APPLICATIONS

    公开(公告)号:US20220130401A1

    公开(公告)日:2022-04-28

    申请号:US17572834

    申请日:2022-01-11

    Inventor: Abhishek Chauhan

    Abstract: Embodiments described include systems and methods for incorporating a watermark in an audio output. An embedded browser, which is executable on one or more processors of a client device, may detect an audio data stream from a network application accessed via the embedded browser. A watermarking engine of the embedded browser intercepts the audio data stream responsive to detecting the audio data stream. The watermarking engine incorporates a digital signal corresponding to a watermark into the audio data stream, prior to being produced as an audio output by an audio speaker. The watermarking engine causes the watermark to be present in the audio output produced by the audio speaker, the watermark configured to be inaudible by a human and recordable by an audio recording device.

    Consolidated identity
    208.
    发明授权

    公开(公告)号:US11316860B2

    公开(公告)日:2022-04-26

    申请号:US16221376

    申请日:2018-12-14

    Abstract: According to various embodiments, a consolidated identity system and method are implemented to provide improved identity management and resource access management, particularly in the context of an enterprise system that requires a tight trust model. In at least one embodiment, the described system and method provide mechanisms for mapping identities among resources. The system and method are able to extract information relevant to a particular entity, such as an employee or user, and to consolidate and/or personalize such information as needed.

    Robust suspension and resumption of desktop virtualization

    公开(公告)号:US11316766B2

    公开(公告)日:2022-04-26

    申请号:US16992660

    申请日:2020-08-13

    Abstract: A method for suspending and resuming a connection for desktop virtualization between two computing devices. In response to a client computing device shutting down, suspending, hibernating, or losing network connectivity during virtualization, the server computing device may itself shut down, suspend, or hibernate, or may pause or suspend the operation of one or more applications currently hosted by the server computing device. The server may detect that connectivity has been restored and resume operation of hosted applications. Alternatively, the client may transmit a command to the server indicating that the client is ready to resume virtualization. The client may also be configured to transmit a command that may cause the server to resume a powered-on state after the server was shut down or in a state of hibernation.

Patent Agency Ranking