Privacy protection for proxy auto-configuration files

    公开(公告)号:US11652873B2

    公开(公告)日:2023-05-16

    申请号:US17229843

    申请日:2021-04-13

    CPC classification number: H04L67/1023 H04L63/0281 H04L67/02 H04L67/1065

    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.

    COMPUTING DEVICE AND RELATED METHODS FOR COMPUTING SESSION PROTECTION

    公开(公告)号:US20230139213A1

    公开(公告)日:2023-05-04

    申请号:US17643253

    申请日:2021-12-08

    Abstract: A computing device may include a memory and a processor coupled to the memory and configured to provide access to a computing session for a user through a user interface, and cooperate with a digital camera to detect activity other than that of the user in a field of view. Responsive to the detection, the processor may further block input of data to the user interface and permit viewing of the user interface. Responsive to an attempt to input data via the user interface, the processor may continue to block input of data and obstruct viewing of the user interface.

    Policy based persistence
    88.
    发明授权

    公开(公告)号:US11636228B2

    公开(公告)日:2023-04-25

    申请号:US17160567

    申请日:2021-01-28

    Abstract: A computing device includes a memory and at least one processor configured to cooperate with the memory. The processor is to boot the computing device, and direct generated data to data storage. The data storage includes at least one persistent layer and a non-persistent layer. The processor determines if the data is to be stored in the at least one persistent layer or the non-persistent layer based on a version of the operating system being used to boot the computing device.

    Distributed file locking for a network file share

    公开(公告)号:US11636068B2

    公开(公告)日:2023-04-25

    申请号:US16678463

    申请日:2019-11-08

    Abstract: Methods and systems for file locking are described herein. An on-premise file share may store files that are accessible to both a local on-premise client and a remote off-premise client. The off-premise file share may request to check-out one of the files. In response, one of multiple nodes may obtain for the file a file handle with exclusive write access. File locking information may be stored at the file share that indicates the node that holds the file handle and that indicates the file is in a locked state whereby other remote off-premise clients or local on-premise clients are prevented from editing the file.

Patent Agency Ranking