摘要:
Exemplary techniques for enabling single sign-on to an operating system configured to conduct a remote presentation session are disclosed. In an exemplary embodiment, a user credential can be encrypted using an encryption key generated by a remote presentation session server and sent to a client. The client can send the encrypted user credential to the remote presentation session server. The remote presentation session server can decrypt the user credential and use it to log a user into an operating system running on the remote presentation session server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.
摘要:
Web access over a public network for applications that operate on virtual desktops on a plurality of servers is facilitated. Through the web access the user is provided with the information necessary to establish a connection with an application by way of the virtual desktop. Applications that the user is authorized to access are determined and those applications that the user is not authorized to access are filtered out. The applications associated access control list is used for determining the user's access to discover an application.
摘要:
A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity (e.g., a TS server) via a gateway using a remote-operating protocol (e.g., RDP). The strategy involves establishing a first secure channel between the gateway and the TS server and transmitting policy information from the gateway to the TS server. The strategy then involves deactivating the first secure channel and setting up a second secure channel between the TS client and the TS server. The strategy uses the second secure channel to transmit RDP data from the TS client to the TS server. The TS server uses the previously-transmitted policy information to determine whether to enable or disable a feature that affects the TS client, such as device redirection.
摘要:
Techniques for XML (Extensible Markup Language) web feeds for web access of remote resources are described. In one embodiment, a method includes obtaining information regarding one or more available resources from one or more resource hosts, rendering the information regarding one or more available resources into an Extensible Markup Language (XML) document, and providing the XML document to a user device.
摘要:
The present invention is directed to appropriately rendering terminal server graphical data at multiple client side monitors. In some embodiments, a client sends client side monitor configuration for a plurality of monitors to a server. The server simulates a virtual desktop for the plurality of monitors based on the client side monitor configuration. Graphical data generated for the simulated virtual desktop is converted to drawing commands and returned to the client for rendering. In other embodiments, a separate terminal server session is established for each of a plurality client side monitors. Drawing commands for a specified client side monitor is sent from the terminal server to the client over the corresponding session for the client side monitor.
摘要:
In order to minimize the delay of the video images viewed by a network conference attendee, an intelligent buffering process (IB process) selectively discards video frames from at least one point, and in an embodiment, many network points, such as at “in” and/or “out” buffers of clients, servers, routers, etc. Packets of video frame data arrive at a buffer, which can fill to a predetermined limit if the packets cannot be forwarded due to delays or slow connections. To forward the most current video images, old frames in the buffer are discarded rather than forwarded. In a particular embodiment, when the buffer is full, the next arriving delta frame packet is discarded. To avoid distortion, each subsequent delta frame is discarded until a new key frame eventually arrives. If the buffer is still full when the key frame arrives, the buffer is purged and the new key frame is added.
摘要:
An improved application sharing system and method allow sharing of documents on a per document basis rather than on a per application basis, in order to simplify the user experience and to provide a more secure sharing environment. A window marking method is used to construct a window list describing the shared and unshared status of various windows. In an embodiment of the invention, a viewer machine displays only a most recently active shared document window even when other windows are also marked as shared. In this way, a viewer's attention can be automatically focused on a current document of interest.
摘要:
In a recorded network conference, a post-conference process is implemented to transcribe stored raw conference data into a viewable, standard format recording. The post-conference process postpones transcribing tasks until after the conference has ended. During the conference, raw conference data streams are stored directly in a compressed format used for network transmission. The post-conference process can be initiated based on one or more parameters to optimize use of resources. Possible parameters include conference schedules, CPU usage and availability for transcribing, and remaining storage capacity. In an embodiment, a recording unit joins the conference over the network in the manner of an attendee. The recording unit “listens” and blindly records the data, and later performs the post-conference process. In an embodiment, the transcribed recording is burned onto a CD-ROM and delivered to the conference attendees.
摘要:
Techniques for enabling two-factor authentication for terminal services are described. A client receives an authentication token from an authentication server. The authentication token is used as a factor for authenticating the client to a terminal services device. Native authentication of the client is also performed.
摘要:
Techniques for centralized publishing of network resources within computer networks are described. Publication of and access to the network resources are controlled from a single, centralized location, advantageously improving the uniformity of network administration responsibilities, and overall robustness of the network.