SYSTEMS AND METHODS FOR MULTI-LEVEL QUALITY OF SERVICE CLASSIFICATION IN AN INTERMEDIARY DEVICE
    1.
    发明申请
    SYSTEMS AND METHODS FOR MULTI-LEVEL QUALITY OF SERVICE CLASSIFICATION IN AN INTERMEDIARY DEVICE 有权
    用于多级服务质量的系统和方法在中间设备中进行分类

    公开(公告)号:US20140241360A1

    公开(公告)日:2014-08-28

    申请号:US14192556

    申请日:2014-02-27

    摘要: The present invention is directed towards systems and methods for providing multi-level classification of a network packet. In some embodiments, network performance may be enhanced and optimized by providing QoS and acceleration engines with packet- or data-specific information. In addition to source and destination IP addresses and port numbers, packet- or data-specific information can include direction of traffic (client to host or server; server or host to client; or both), Virtual LAN (VLAN) ID, source or destination application or associated application, service class, ICA priority, type of service, differentiated service code point (DSCP), or other information. Some or all of this information may be used to classify the network packet at a plurality of layers of a network stack, allowing for deep inspection of the packet and multiple levels of granularity of classification.

    摘要翻译: 本发明涉及用于提供网络分组的多级分类的系统和方法。 在一些实施例中,可以通过向QoS和加速引擎提供分组或数据特定信息来增强和优化网络性能。 除了源和目标IP地址和端口号之外,数据包或数据特定信息可以包括流量方向(客户端到主机或服务器;服务器或主机到客户端;或两者),虚拟LAN(VLAN)ID,源或 目标应用程序或相关应用程序,服务类别,ICA优先级,服务类型,差异化服务代码点(DSCP)或其他信息。 这些信息中的一些或全部可以用于在网络堆栈的多个层对网络分组进行分类,允许对分组的深度检查和分级的多个级别的级别。

    Policy Based Authentication
    2.
    发明申请

    公开(公告)号:US20190068373A1

    公开(公告)日:2019-02-28

    申请号:US15689568

    申请日:2017-08-29

    摘要: Methods and systems for expedited authentication for mobile applications are described herein. A user of a mobile device may authenticate with an enterprise system, and thereby be granted access to enterprise applications and services on the mobile device. The user may then activate an application in a managed partition of the mobile device. The application may determine that the enterprise system supports expedited authentication. The application may request expedited authentication, and the request may be compared to policies for expedited authentication. If the request is permitted, the application may be granted access to an authorization code for expedited authentication. The application may then perform the expedited authentication, and the user may be granted access to the application when the expedited authentication has completed.

    COMPUTING DEVICE AND RELATED METHODS FOR COMPUTING SESSION PROTECTION

    公开(公告)号:US20230139213A1

    公开(公告)日:2023-05-04

    申请号:US17643253

    申请日:2021-12-08

    摘要: A computing device may include a memory and a processor coupled to the memory and configured to provide access to a computing session for a user through a user interface, and cooperate with a digital camera to detect activity other than that of the user in a field of view. Responsive to the detection, the processor may further block input of data to the user interface and permit viewing of the user interface. Responsive to an attempt to input data via the user interface, the processor may continue to block input of data and obstruct viewing of the user interface.

    Policy based persistence
    4.
    发明授权

    公开(公告)号:US11636228B2

    公开(公告)日:2023-04-25

    申请号:US17160567

    申请日:2021-01-28

    摘要: A computing device includes a memory and at least one processor configured to cooperate with the memory. The processor is to boot the computing device, and direct generated data to data storage. The data storage includes at least one persistent layer and a non-persistent layer. The processor determines if the data is to be stored in the at least one persistent layer or the non-persistent layer based on a version of the operating system being used to boot the computing device.

    Distributed file locking for a network file share

    公开(公告)号:US11636068B2

    公开(公告)日:2023-04-25

    申请号:US16678463

    申请日:2019-11-08

    摘要: Methods and systems for file locking are described herein. An on-premise file share may store files that are accessible to both a local on-premise client and a remote off-premise client. The off-premise file share may request to check-out one of the files. In response, one of multiple nodes may obtain for the file a file handle with exclusive write access. File locking information may be stored at the file share that indicates the node that holds the file handle and that indicates the file is in a locked state whereby other remote off-premise clients or local on-premise clients are prevented from editing the file.

    SYSTEMS AND METHODS TO SECURE AUTHENTICATION DATA FOR ACCESSING RESOURCES IN A DISTRIBUTED MANNER

    公开(公告)号:US20230122215A1

    公开(公告)日:2023-04-20

    申请号:US17501500

    申请日:2021-10-14

    摘要: Described embodiments provide systems and methods for securely storing private information of a user on a device of the user. A server may register a mobile device to store credentials of a user thereon, based on authentication of the user of the mobile device. The server may encrypt credentials of the user using a key of the server. The server may send the encrypted credentials to the registered mobile device for storage thereon without the key. The server may send a code to an endpoint device to initiate authentication of the user with use of the mobile device. The server may receive the encrypted credentials from the mobile device in response to the authentication. The server may decrypt the encrypted credentials using an encryption key of the server. The server may send the decrypted credentials to the endpoint device to authenticate the user at the endpoint device.

    PREVENTING PHISHING ATTEMPTS OF ONE-TIME PASSWORDS

    公开(公告)号:US20230121470A1

    公开(公告)日:2023-04-20

    申请号:US17714261

    申请日:2022-04-06

    IPC分类号: H04L9/40

    摘要: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to identify a first domain name associated with a website that served a login form to a web browser. The at least one processor is further configured to identify a one-time password (OTP) entry request served from the website in response to transmitting user credentials to the website. The at least one processor is further configured to identify a second domain name associated with an OTP server that provided an OTP. The at least one processor is further configured to perform a security action in response to determining that the first domain name differs from the second domain name. The security action may include blocking a response to the OTP request from the website, providing a warning, and/or obtaining confirmation for the response to the OTP entry request.

    PREVENTION OF INADVERTENT PASSWORD DISCLOSURE

    公开(公告)号:US20230116273A1

    公开(公告)日:2023-04-13

    申请号:US17529369

    申请日:2021-11-18

    IPC分类号: G06F21/62 G06F3/0481

    摘要: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, determining whether a user interface element having focus is a secure input and, responsive to a determination that the user interface element is a secure input, preventing the focus from changing away from the user interface element. The method also includes, by the computing device, responsive to a determination that the user interface element is a secure input, allowing the focus to change away from the user interface element in response to a determination that an input to the user interface element is complete. The method may further include, by the computing device, responsive to a determination that the user interface element is not a secure input, allowing the focus to be moved to another user interface element.

    AUTOMATED TRANSFER OF PERIPHERAL DEVICE OPERATIONS

    公开(公告)号:US20230116178A1

    公开(公告)日:2023-04-13

    申请号:US17505921

    申请日:2021-10-20

    摘要: Systems and techniques for automated transfer of peripheral device operations are described herein. In an example, a system may adapted so that, while a first device of a first type and a second device of the first type are simultaneously connected to a client device, the first device, rather than the second device, is used as an active device of the first type for at least one application, the first and second devices being peripheral devices. The system may be further adapted so that, while both the first and second devices remain connected to the client device, a switch from the first device to the second device by a user is determined, and, based on the switch from the first device to the second device, the second device, rather than the first device, is used as the active device of the first type for the at least one application.