摘要:
The present invention is directed towards systems and methods for providing multi-level classification of a network packet. In some embodiments, network performance may be enhanced and optimized by providing QoS and acceleration engines with packet- or data-specific information. In addition to source and destination IP addresses and port numbers, packet- or data-specific information can include direction of traffic (client to host or server; server or host to client; or both), Virtual LAN (VLAN) ID, source or destination application or associated application, service class, ICA priority, type of service, differentiated service code point (DSCP), or other information. Some or all of this information may be used to classify the network packet at a plurality of layers of a network stack, allowing for deep inspection of the packet and multiple levels of granularity of classification.
摘要:
Methods and systems for expedited authentication for mobile applications are described herein. A user of a mobile device may authenticate with an enterprise system, and thereby be granted access to enterprise applications and services on the mobile device. The user may then activate an application in a managed partition of the mobile device. The application may determine that the enterprise system supports expedited authentication. The application may request expedited authentication, and the request may be compared to policies for expedited authentication. If the request is permitted, the application may be granted access to an authorization code for expedited authentication. The application may then perform the expedited authentication, and the user may be granted access to the application when the expedited authentication has completed.
摘要:
Embodiments described include a method for implementing a privacy policy by a device intermediary to a plurality of clients and one or more servers. The method can include identifying, by a device intermediary to a plurality of clients and one or more servers, network traffic of a user that has not selected an option of a plurality of options of a privacy policy managed by the device. The method can include receiving, by the device, an indicator of a selection by the user of the option from the plurality of options of the privacy policy. The method can include handling, by the device, network traffic of the user according to the selected option of the privacy policy.
摘要:
Aspects of the disclosure relate to various systems and techniques that provide methods and systems for identifying log event for computing systems. For example, a computing device may receive a log event of an application, and determine a value representative of an inverse relationship between a frequency of the log event and a criticality of the log event. The computing device may initiate an action to address the event indicated by the log event based on a comparison between the determined value and a threshold.
摘要:
Systems and methods discussed for redirection of launch requests for local applications to corresponding remote applications, such as SaaS or network applications provided by an application server, and access of the corresponding remote application via an embedded browser of a client application. A client application executed by a client device may detect a request of a user to launch a local application of the client device. The client application may determine that the local application corresponds to a network application provided by an application server. The client application may intercept the request to launch the local application, responsive to the determination. An embedded browser of the client application may access the network application from the application server, responsive to interception of the request.
摘要:
Methods and systems for bound based contextual zoom are disclosed. Legacy WINDOWS desktop and web applications were designed for a mouse or other high-precision pointing device, and as such, small controls and closely grouped controls/icons were commonly designed/used on the screen. Interacting with such applications remoted to a touch-based device (e.g., a smartphone or tablet) is difficult. Bound based contextual zoom overcomes at least some of these limitations by permitting a user to zoom in on an area of interest within an application or desktop, and for a period of time long enough to complete the touch interaction. The area zoomed might be a group of controls on a ribbon bar, the minimize/maximize/close buttons in the top-right corner of a window, a group of form input controls, or any other natural cluster of related user interface (UI) elements. The size of the area zoomed and the zoom factor applied are calculated to allow a user to complete their task without overly obscuring the rest of the application/desktop.
摘要:
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to protect against theft of user credentials. The at least one processor is further configured to recognize a uniform resource locator (URL) to which a web browser is navigating, as a URL for which protection is to be provided. The recognition is based on an absence of the URL from a history of visited URLs for which a password has been entered. The at least one processor is further configured to extract a character sequence of selected length that is entered into a field of a website associated with the recognized URL; compare an encryption of the character sequence to entries in a list of encrypted partial passwords of the same selected length; and perform a security action in response to a match resulting from the comparison.
摘要:
A computing device includes an image sensor, an IMU, a display, and a processor coupled to the image sensor, the IMU, and the display. The processor is configured to generate a GUI current screen on the display. The GUI current screen includes a background, and foreground GUI elements overlaying the background. The processor is configured to when the IMU generates motion data indicative of movement, render the background to comprise a video image from the image sensor.
摘要:
Reducing vulnerability to a server is provided. A device intermediary to a client and a server can receive a RPC message from the RPC based client to the RPC based server, the RPC message having a plurality of fields to execute one or more routines on the server. The device can detect that one or more fields of the plurality of fields exploits a vulnerability of the RPC based server. The device can modify the RPC message to remove the one or more fields from the RPC message. The device can forward the modified RPC message to the RPC server.
摘要:
The present disclosure is directed towards systems and methods for configuring the interface of an embedded browser. The client application can dynamically control the interface of the embedded browser based on the sessions established between the client application and one or more network applications. The client application can change the configuration of the embedded browser's interface contextually based on different network applications accessed by the embedded browser.