Intermediated retrieval of networked content

    公开(公告)号:US11223698B2

    公开(公告)日:2022-01-11

    申请号:US17021266

    申请日:2020-09-15

    Abstract: Methods, systems, computer-readable media, and apparatuses may provide for the intermediated retrieval of applications on a network. A computing device may be configured to receive an application from an application server on a network. Based on, for example, the network conditions between the computing device and the application server, the computing device may query a plurality of intermediary servers. Based on a decision that, for example, the network conditions between the computing device, application server, and a selected intermediary server are better than the network conditions between the computing device and the application server, the computing device may cause the application to be retrieved by a host application of the selected intermediary server. The host application may process and transmit the application to the computing device. The computing device may display the processed application and transmit user input corresponding to the processed application to the intermediary server.

    Dynamic region based application operations

    公开(公告)号:US11216715B2

    公开(公告)日:2022-01-04

    申请号:US16887152

    申请日:2020-05-29

    Abstract: Techniques are disclosed for a hybrid undo/redo for text editing, where non-linear undo and redo operations are performed across dynamic regions in a document and linear undo and redo operations are performed within the dynamic regions in the document. In an example, the hybrid undo/redo may be achieved by maintaining respective region offset values for the dynamic regions created in a document by the edits made to the document. In operation, the respective region offset values associated with the dynamic regions can be used to negate or otherwise counteract the effect of edits made in the dynamic regions.

    FILE SOURCE TRACKING
    244.
    发明申请

    公开(公告)号:US20210406225A1

    公开(公告)日:2021-12-30

    申请号:US16987696

    申请日:2020-08-07

    Abstract: A computing system may determine different patterns of modifications that are to be made to data of a file to generate respective modified versions of the file, the different patterns of modifications enabling identification of other files derived from the respective modified versions of the file, the different patterns of modifications including a first pattern of modifications. The computing system may generate a first modified version of the file at least in part by modifying the data based on the first pattern of modifications, may send the first modified version of the file to a client device, and may store signature data indicative the first pattern of modifications so as to enable identification of other files derived from the first modified version of the file.

    PROVISIONING VIRTUAL MACHINES WITH A SINGLE IDENTITY AND CACHE VIRTUAL DISK

    公开(公告)号:US20210406186A1

    公开(公告)日:2021-12-30

    申请号:US17470631

    申请日:2021-09-09

    Abstract: A virtual disk is provided to a computing environment. The virtual disk includes identity information to enable identification of a virtual machine within the computing environment. A size of the virtual disk is increased within the computing environment to enable the virtual disk to act as a storage for the identity information and as a cache of other system data to operate the virtual machine. The virtual machine is booted within the computing environment. The virtual machine is configured to at least access the virtual disk that includes both identity information and caches other system data to operate the virtual machine. Related apparatus, systems, techniques and articles are also described.

    Determination of Cloud Resource Utilization

    公开(公告)号:US20210406089A1

    公开(公告)日:2021-12-30

    申请号:US16915178

    申请日:2020-06-29

    Abstract: Data characterizing a log of requests by a plurality of software services executing based on a virtual resource that is within a remote computing environment is received. The executing includes transmitting the requests for utilization of the virtual resource. A metric of utilization of the virtual resource by a first software service of the plurality of software services is determined based on the log. The metric of utilization characterizes a portion of total usage of the virtual resource that is attributable to the first software service. The metric of utilization is provided. Related apparatus, systems, techniques and articles are also described.

    Systems and methods providing connection lease anti-theft features for virtual computing sessions

    公开(公告)号:US11212113B2

    公开(公告)日:2021-12-28

    申请号:US16416452

    申请日:2019-05-20

    Abstract: A computing device may include a memory and a processor cooperating with the memory and configured to receive a connection request from a client device having a public/private encryption key pair associated therewith. The connection request may be based upon a connection lease and the public key for the client device, and the connection lease may be generated based upon an authenticated version of the public key for the client device. The processor may also be configured to verify that the authenticated version of the public key upon which the connection lease was generated matches the public key for the client device and authorize a connection with the client device and provide the client device with access to a virtual computing session via the connection.

    Instant virtual application launch
    248.
    发明授权

    公开(公告)号:US11210113B2

    公开(公告)日:2021-12-28

    申请号:US16790980

    申请日:2020-02-14

    Abstract: Methods and systems for persisting a protocol state from a first instance of a virtual desktop application to a second instance of the virtual desktop application are described herein. In some embodiments, a computing platform may establish, by a first virtual desktop instance, a secure session with a virtual delivery agent (VDA), resulting in a protocol state of the first virtual desktop instance. Further, the computing platform may persist, using the first virtual desktop instance, the protocol state. Next, the computing platform may transmit, from the first virtual desktop instance to a second virtual desktop instance, the protocol state. Additionally, the computing platform may authenticate, using authentication tokens comprising the protocol state, a connection between the second virtual desktop instance and a gateway device. Subsequently, the computing platform may re-establish, after the authenticating, the secure session, wherein the secure session comprises a connection between the VDA and the second virtual desktop instance.

    DETERMINING RISK METRICS FOR ACCESS REQUESTS IN NETWORK ENVIRONMENTS USING MULTIVARIATE MODELING

    公开(公告)号:US20210400075A1

    公开(公告)日:2021-12-23

    申请号:US17016985

    申请日:2020-09-10

    Abstract: Described embodiments provide systems, methods, computer readable media for determining risk metrics. A device may provide a risk model for a network environment. The risk model may include an input level and an output level. The input level may process first datasets each corresponding to a feature and a time window. The first datasets may include factors on access requests. The output level may generate a first aggregate risk metric of a first access request according to the datasets processed by the input level. The device may identify a second dataset corresponding to a second access request over the features and time windows. The device may determine a second aggregate risk metric by applying the second dataset to the risk model. The device may generate a response to the second access request according to an access control policy and the second aggregate risk metric.

    Domain pass-through authentication in a hybrid cloud environment

    公开(公告)号:US11206253B2

    公开(公告)日:2021-12-21

    申请号:US16857390

    申请日:2020-04-24

    Inventor: Feng Huang

    Abstract: Aspects of the disclosure relate to processing systems using improved domain pass-through authentication techniques. A computing platform may send, to an external cloud computing platform, one or more registration requests that each may cause an RLS endpoint corresponding to each of a plurality of resource location connectors to be stored at the external cloud computing host platform. The computing platform may receive one or more requests for a resource location identifier. The computing platform may determine an accessible resource location connector and may send, to the user device, a corresponding resource location identifier. After receiving a pass-through authentication request, the computing platform may receive, from the ticketing service stored on the external cloud computing platform, a one-time ticket. The computing platform may send, to the user device, the one-time ticket, which may allow the user device to perform pass-through authentication with the external cloud computing platform.

Patent Agency Ranking