09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software for creating, editing, transmitting,
exchanging, sharing, uploading, downloading, posting,
storing, organizing, displaying, tagging, managing or
otherwise providing data, files, images, graphics, sound,
text, documents, messages, videos, audio content and other
information via the Internet, intranets, extranets, global
computer networks, mobile telephone networks, or other
communications or information networks, by email, by mobile
telephone, or including wireless, cable, satellite and
cloud; computer software for telecommunication-based
information storage and retrieval; computer software for
electronic database management; electronic databases in the
field of cloud computing, file synchronization and virtual
data recorded on computer media. Providing temporary use of on-line, non-downloadable
software that allows users to create, edit, transmit,
exchange, share, upload, download, post, store, organize,
display, tag, manage or otherwise provide data, files,
images, graphics, sound, text, documents, messages, videos,
audio content and other information over the Internet,
intranets, extranets, global computer networks, mobile
telephone networks or other information networks, by email,
or including wireless, cable, satellite and cloud; hosting
an online web site that allows users to create, edit,
transmit, exchange, share, upload, download, post, store,
organize, display, tag, manage or otherwise provide data,
files, images, graphics, sound, text, documents, messages,
videos, audio content and other information over the
Internet, intranets, extranets, global computer networks,
mobile telephone networks or other information networks, by
email, or by any other electronic means, including wireless,
cable, satellite and cloud; monitoring of computer systems
by remote access to ensure proper functioning; design,
development and installation of computer software; computer
services, namely, remote management of the information
technology (IT) systems of others; electronic data storage;
design of information technology systems; research and
development services in the field of computers, computer
software, computer systems and networks, information
technology, and data management, storage and cataloguing;
technical consultation and advisory services in the field of
computer software and hardware, computer systems; design and
development of computer software; installation, maintenance
and repair of computer software; database design and
development.
09 - Scientific and electric apparatus and instruments
Goods & Services
Software for developing, scheduling, and deploying automation workflows for machinery; operating system software; operating system software for adjusting the usage of available computer processor speed; RTOS software; computer software for hard scheduling of industrial machinery workflows.
3.
SYSTEMS AND METHODS FOR ADAPTIVE ACTION WITH DISTRIBUTED ENFORCEMENT POINTS
Described embodiments provide systems and methods for performing actions based on data of devices. A controller executing on at least one server may receive a first dataset from a first agent of a first device intermediary between a first plurality of client devices and a first plurality of servers. The first dataset may comprise a subset of data tracked at the first device and available to the first agent. The controller may receive a second dataset from a second agent of a second device intermediary between a second plurality of client devices and a second plurality of servers. The second dataset may comprise a subset of data tracked at the second device and available to the second agent. According to the first dataset and the second dataset, the controller may send an instruction to at least one of the first device, the second device or a third device.
09 - Scientific and electric apparatus and instruments
Goods & Services
software for developing, scheduling, and deploying automation workflows for machinery; operating system software; operating system software for adjusting the usage of available computer processor speed; RTOS software; computer software for hard scheduling of industrial machinery workflows
5.
SYSTEMS AND METHODS FOR INTRODUCING DATA QUALITY AWARENESS IN SECURITY ANALYTICS SOLUTIONS
Data quality awareness in security analytics solutions is provided. A system can include one or more processors, coupled to memory. The system can receive a data set comprising one or more events generated for interactions between a plurality of computing devices that execute applications over a network. The system can select a field in the one or more events of the data set that impacts an action performed with the data set based on a model trained via machine learning with a historical data set of events generated for interactions between computing devices. The system can determine a data quality score based on values of the field in the one or more events of the data set. The system can provide an indication of performance of the action with the data set based on a comparison of the data quality score with a threshold.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable computer software for use in configuring,
analyzing, and administering other software, computer
hardware, semiconductors, central processing units,
graphical processing units and computer peripherals.
According to one aspect, a method can include: receiving, by a computing device, historical data for an organization having a plurality of host machines that can be selectively powered on to provide capacity for hosting computing sessions; receiving, by a computing device, a configuration value of the organization indicating a probability that there will be available capacity when new computing sessions are initiated; determining, by the computing device, capacities needed to satisfy the probability at different points in time based on the historical data; and auto-scaling the host machines at one or more times according to the determined capacities.
The present solution provides systems and methods for providing remote access and packet retransmission via third party networks. A device can receive a client request to establish a session with a virtual server. The client and the virtual server can communicate using a presentation services protocol over a lower-level protocol. The device can select a node on a network to use for the session between the client and the virtual server. The device can cause an installation of one or more network stacks on the node, the one or more network stacks configured to communicate with the client and the virtual server using the presentation services protocol over the lower-level protocol and to handle retransmissions of packets between the client, the node, and virtual servers. The device can cause each of the client and the virtual server to establish the session via the node.
Methods and apparatus for managing groups are described herein. A group management service may centrally manage a plurality of applications such that group information in the plurality of applications may stay up to date with changes in the group information. The group management service may monitor/receive different types of messages from different classes of users (e.g., a group member, a group creator/owner, a system administrator, etc. ) and may synchronize, based on the messages, the group information across the plurality of applications. A group member may send, to the group management service and via an application, a message (e.g., quit membership from a group) for changes in the group information. A system administrator may send, to the group management service and via a graphical user interface, a message (e.g., cancel/add a member of a group, create a new group, etc. ) for changes in the group information.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
In some disclosed embodiments, a computing device may determine that a script identifies first pixel data and at least one first action associated with the first pixel data, and determine that first pixels being displayed on a screen of the computing device correspond to the first pixel data identified in the script. Based at least in part on the first pixels corresponding to the first pixel data and the at least one first action being associated with the first pixel data in the script, the computing device may take the at least one first action at first coordinates corresponding to a first location on the screen at which of the first pixels are being displayed.
Methods and systems for implementing on-demand virtual secure session are described herein. A computing device may monitor a virtual desktop accessible from an endpoint device. The computing device may detect a user selection of an application and generate a snapshot image indicating a state of the virtual desktop. The computing device may initiate an on-demand virtual secure session. The computing device may provide the endpoint device with access to a remote application. The computing device may detect a user indication to stop execution of the remote application. Accordingly, the computing device may terminate the on-demand virtual secure session and restore the virtual desktop.
A method of using multiple audio streams to enhance an audio output is provided. A plurality of computing devices can elect one of the plurality of devices as a leader device. A first follower device of the plurality of computing devices can send a first audio stream to the leader device. The leader device can process the first audio stream to obtain an output. The leader device can send the output to a second device. A remote device can play an enhanced audio stream based on the output, wherein the enhanced audio stream comprises an echo enhanced audio stream and/or a positionally enhanced audio stream.
Methods and systems for selective presentation of sensitive information are described herein. A computing system may receive, from a cloud computing platform, a history protection extension. The computing system may install the history protection extension, which may cause the computing system to selectively display sensitive information based on whether or not the computing system is connected to a secure network. The computing system may identify, using the history protection extension, that the computing system is currently operating on the secure network. The computing system may intercept a URL access request. The computing system may compare a domain of the URL access request to a protection domain list. Based on identifying that the domain of the URL is included on the protection domain list, the computing system may launch the URL in a secure browser, and display, within the secure browser and based on a history data list, the sensitive information.
Methods and systems for sharing content is described herein. Based on receiving input associated with sharing portions of content displayed on a presenter screen, shared content data associated with sharing the portions of content may be generated. Based on the shared content data, a shared content indicator may be updated to indicate the portions of content to share. A screen capture based on the presenter screen may be generated. Screen data including the portions of content and a mask that covers regions of the screen capture that are not occupied by the portions of content may be generated. Furthermore, the computing device may send the screen data to remote computing devices that are configured to generate audience screens based on the screen data.
A method of troubleshooting an application includes receiving, from an analytics engine, data representing a performance metric of the application and a tenant identifier associated with the application; sending, to the analytics service, a request to receive at least one user identifier associated with the tenant identifier; receiving, from the analytics service, at least one user identifier; selecting, from a database, a message based at least in part on the performance metric of the application; and sending the message to the application associated with the at least one user identifier.
A client computing device includes a display and a processor coupled to the display. The processor operates a browser to access a store providing resources that are available. The available resources are displayed within a web page on a display. A launch message is generated in response to one of the resources being selected. An extension cooperating with the browser is operated to append a store ID identifying the store to the launch message. An adapter is operated to receive from the extension the launch message with the store ID, and assign a native messaging host process to the store. The native messaging host process is external the extension and supports communications with a native app on the client computing device. The native app is used to initiate launch of the selected resource.
Systems and methods for key performance benchmarking may include receiving for a plurality of client devices of a tenant, a duration for performing a plurality of actions to log into a resource. The systems and methods can include determining metrics for each action of the plurality of actions. The systems and methods can include generating, by the one or more processors, one or more recommendations corresponding to at least one action of the plurality of actions, to reduce the duration to log into the resource.
Described embodiments provide systems and methods for intelligent load balancing of hosted sessions. A processor can determine a plurality of metrics for each of a plurality of machines configured to connect client devices with hosted sessions. The processor can receive, from a client device, a request to establish a connection with one of the plurality of machines to access a hosted session. The processor can determine a score for each of the plurality of machines based at least on the plurality of metrics for each of the plurality of machines. The processor can select a machine from the plurality of machines as a function of the score and a resource cost of the machine. The processor can cause the client device to connect to the selected machine for the hosted session.
H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
H04L 47/125 - Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
H04L 67/1029 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
19.
RECOMMENDING NETWORK SECURITY RULE UPDATES BASED ON CHANGES IN THE NETWORK DATA
The present solution provides systems and methods for recommending updated network security rules based on changes in the network data. The present solution can use a rule identifying an entity, an attribute of the entity and a value of the attribute. The solution can detect, responsive to monitoring the network environment, a change in one of the entity, the attribute or the value. The solution can generate, responsive to the detection, an updated rule. The solution can apply the updated rule to previous network traffic to which the rules was applied. In response to determining that effectiveness of the updated rule is greater than that of the prior rule, the solution can provide a recommendation to use the updated rule.
A computing device may include a memory and a processor cooperating with the memory to run a program, receive a first sequence of inputs from at least one input device for the program, and learn a relationship between an action performed by the program and the first sequence of inputs. The processor may be further configured to access a remote virtual computing session in which the action is performed responsive to a second sequence of inputs different than the first sequence of inputs, and upon receipt of the first sequence of inputs from the at least one input device while accessing the remote virtual computing session, cause the virtual computing device to perform the action based upon the learned relationship.
An example methodology implementing the disclosed techniques can include, by a computing device, collecting information about tasks scheduled for a user in a time period, the time period being later than a current time, and determining a battery-operated device associated with one of the tasks. The method can also include determining a length of time the battery-operated device will be powered on during the time period based on the information collected about the tasks and computing a required battery level for the battery-operated device based on the length of time the battery-operated device will be powered on during the time period and an energy consumption rate of the battery-operated device. The method can also include, responsive to a determination that an actual battery level of the battery-operated device is less than the required battery level, providing a notification of a need to charge the battery-operated device.
The present solution provides systems and methods for generating and serving web pages to a client in response to invalid URL requests. The present solution can include an echo server that receives, from a web server, an indication of an incorrect request from a client device being received by web server. The echo server can establishing a second web page based at least on a web page selected from the web server. The echo server can provide content of the second web page based at least on one or more parameters of the uniform resource location (URL) of the incorrect request. The echo server can provide the second web page to the web server to cause the web server to provide the second web page in response to the incorrect request to the client device instead of an error code.
Methods and apparatus for improving performance in a virtual meeting session in a distributed workspace system. One example includes transmitting media data for the virtual meeting session over an active network connection between first and second computing devices, determining a first quality score for the active network connection based on parameter(s) associated with the active network connection, periodically transmitting test data over a standby network connection between the first and second computing devices, determining a second quality score for the standby network connection based on parameter(s) associated with the standby network connection, based on the second quality score exceeding the first quality score by a first threshold, determining standby network quality based on latency conditions associated with the standby network connection, and if the standby network quality exceeds a second threshold, switching the active and standby network connections and transmitting the media data over the new active network connection.
Methods and systems for presenting content are described herein. A computing device may receive, from a first client device, first data associated with a first webpage being displayed in a first web browser on the first client device. The computing device may generate, based on the first data, a read-only webpage corresponding to the first webpage. The computing device may send second data that is configured to enable rendering, in a second web browser on the second client device, the first read-only webpage, so that content in the first webpage is shared between the first client device and the second device. In this way, the content may be shared dynamically among different users.
One disclosed method involves (A) displaying a first web page retrieved using a first URL, the first web page including at least a first UI element, (B) in response to a user providing a first input corresponding to the first UI element, storing first data representing the first URL and second data identifying the first UI element, (C) in response to the user providing a second input corresponding to the first UI element, retrieving a second web page using a second URL associated with the first UI element, the second web page including at least a second UI element, and (D) generating a sharable record including at least the first data and the second data, the sharable record being configured to be accessed by a browser to identify the first UI element on the first web page.
G06F 9/451 - Execution arrangements for user interfaces
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
26.
GRAPHICAL VISUALIZATION OF TRUST RELATIONSHIPS BETWEEN ACCOUNTS AND SSH PROTOCOL KEYS FOR NETWORK ATTACK PATH DETECTION
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to deploy public key enumeration code and private key enumeration code to a plurality of endpoint devices for execution on the endpoint devices. The at least one processor is further configured to collect public keys and associated public key metadata from the endpoint devices, and to collect private key metadata from the endpoint devices. The public keys and associated public key metadata are generated by the public key enumeration code and the private key metadata is generated by the private key enumeration code. The at least one processor is further configured to generate a graph illustrating trust relationships between user accounts on the endpoint devices. The graph is based on the collected public keys, the collected public key metadata, and the collected private key metadata.
Methods and systems for performing one or more path selection processes that determine connection conditions and send the data via established, multi-path, connections are described herein. The one or more path selection processes may be performed in a remote computing environment where the established, multi-path, connections are between two endpoint devices and are available to communicate data for a remote application and/or a remote desktop. Based on the one or more path selection processes, data for the remote application and/or the remote desktop may be sent via a connection that differs from connection assignments that were configured when the connections were initially established. Additionally, as part of the one or more path selection processes, routing information that indicates a routing path may be inserted into data sent via the connections. An intermediary device may be caused to route the data according to the routing path indicated by the routing information.
Described embodiments provide systems and methods for determining a scale for buffers of a session. A device may identify a round trip time (RTT) of a session with a client for which one or more of a plurality of buffers are provided. The device may detect an indication in advance of an activity on the client to access through the session. The device may determine, responsive to detecting the indication, a scale based at least on a type of the activity. The device may set a number for the plurality of buffers to provide for the session in accordance with the scale and the RTT.
H04L 47/283 - Flow control; Congestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
29.
SYSTEMS AND METHODS FOR MANAGING AUTOSCALED USER SPACE NETWORKING STACK
Managing an autoscaled user space networking stack is provided. A cluster of containers are disposed in a userspace separate from a kernel space of a device. Each container in the cluster of containers can execute a respective one of a plurality of virtual functions, for a network interface card of the device, to cause packets received by the device to bypass the kernel space. The device can forward, via a load balancing technique, a packet received by the device to a container in the cluster of containers. The container can execute a virtual function of the plurality of virtual functions. The device can update a queue for a core managed by the virtual function. The update can cause the core to process the packet in accordance with the queue.
One disclosed method involves storing, in a storage medium, at least a first keyword corresponding to content of a video, after storing the first keyword, receiving, via a video playback application, an indication that playback of the video is initiated, in response to receipt of the indication, retrieving the first keyword from the storage medium, querying at least one data source for information corresponding to the first keyword, and causing a client device to display a representation of the information.
Systems and methods for autonomous program signature generation may include one or more processor(s) that identify a client device executing an autonomous program based at least on traffic from a plurality of client devices. The processor(s) may classify the autonomous program into one or more classifications based on an attribute of the autonomous program. The processor(s) may store an association between the autonomous program and the one or more classifications. In some implementations, the processor(s) may receive a plurality of entries over a time window, corresponding to associations between respective autonomous programs executing on client devices and classification(s) of the autonomous program. The processor(s) may identify one or more features for a respective user agent corresponding to the autonomous program and a corresponding classification of the autonomous program. The processor(s) may train a machine learning model using the one or more features for each entry and the corresponding classification.
A computing system includes a client computing device and a cloud management platform. The client computing device includes a plurality of screens, with each screen having at least one session displayed therein. Each session has a boundary area associated therewith. A cursor monitor agent within the client computing device monitors movement of the cursor in the boundary area of the session having the cursor therein. The cloud management platform includes a cursor analysis service to analyze movement of the cursor within the boundary area to determine if a movement parameter is met indicating that a user intends to switch to a different session. The cursor monitor agent displays an options menu within the session having the cursor therein in response to the movement parameter having been met. The options menu provides options for the user to switch to the different session.
A computing device may include a memory and a processor cooperating with the memory to provide at least one client device with access to a virtual computing session having a session volume level associated therewith, and receive audio playback data from the at least one client device including an audio device type and a background noise level associated with the at least one client device. The processor may further change the session volume level responsive to the received audio playback data and historical session volume levels for corresponding background noise levels and audio device types associated with the at least one client device.
Systems and methods for identifying scripts by coding style. A system (240) can include one or more processors, coupled to memory. The system (240) can identify a script (1205) for execution by a computing device (230) of an entity. The system (240) can determine, via a model trained with machine learning based on a plurality of scripts established by a plurality of entities, a classification of the script prior to execution of the script by the computing device (230). The system (240) can control execution (1215) of the script responsive to the classification of the script.
A system and method for estimating text intelligibility for content provided by a computing resource. A method includes obtaining a text object from a computing resource, the object being configurable for display on at least one client device. Analyzing the text object for intelligibility, including: applying a weight to each character in the text object based on modeled Unicode weights, the modeled Unicode weights being determined from an analysis of a set of domain resources; determining a total weight for the text object based on the weight applied to each character; determining a viability rate for words in the text object; and generating an intelligibility analysis for the text object based on the total weight and viability rate; and effectuating an operational change at the computing resource based on the intelligibility analysis.
Described herein are systems and methods for determining an upgrade to an application as a cause of a failure in a session. A device may detect a failure in a session via which a client is accessing a first version of an application. The device may identify, in response to detecting the failure, first performance metrics for the first version of the application and second performance metrics for a second version of the application. The device may determine, based at least on the failure, the first performance metrics, and the second performance metrics, that an upgrade to the application to the first version from the second version is a cause of the failure in the session. The device may store an association between the first version of the application and the determination that the upgrade is the cause of the failure in the session.
A computing system is disclosed in which messages sent via one or more collaboration applications can be directed to an account of a web portal, rather than to another collaboration application, and an individual can be supplied with one or more access credentials to enable that individual to access such messages, and possibly also respond to received messages and/or initiate messages to one or more users of the one or more collaboration application, via the web portal.
Described embodiments provide systems and methods for automatic cluster scaling. A processor can receive a metric of a first metric type for a cluster of computing devices and an identification of a version of an application and. The processor can aggregate a metric of the first metric type for the version of the application and the metric for the cluster of computing devices to establish an third metric. The processor can determine the third metric exceeds a threshold for the first metric type for the cluster of computing devices, the threshold proportional to a capacity of the cluster of computing devices for the first metric type. The processor can increase a size of the cluster of computing devices.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, determining a topic of an electronic messaging session and determining whether a message including an image is being sent within the messaging session. The method can also include, responsive to a determination of a sending of a message including an image within the messaging session, by the computing device, determining contents of the image associated with the topic of the messaging session, generating a thumbnail image to include the contents of the image associated with the topic of the messaging session, and sending the generated thumbnail image with the message to another computing device. The another computing device can be a client associated with a recipient of the message.
In accordance with one disclosed method, a first application (A) determines that a first operating system received a first input indicating that first data of a second application is to be copied to a first clipboard associated with the first operating system, (B) determines that the second application is associated with a second clipboard, (C) instructs the first operating system to refrain from transferring the first data to the first clipboard, (D) receives the first data from the first operating system, and (E) transfers the first data to the second clipboard.
Methods and systems for establishing trust in certificates based on remote user sessions are described herein. A computing device may establish, via a gateway, one or more remote user sessions of virtualized application, cloud-based applications, and/or remote desktops. The computing device may initiate an establishment process for a secure connection with a secure server. The computing device may, as part of the establishment process, may receive a certificate for the secure server. The computing device may locally determine whether the certificate is trusted. If the certificate is not trusted, the computing device may select a remote user session to perform a remote attempt for determining trust in the certificate. The computing device may send the certificate to the selected remote user session and may receive data indicating a result of the remote attempt. The computing device may determine whether the certificate is trusted by the remote attempt.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Downloadable computer software for use in configuring, analyzing, and administering other software, computer hardware, semiconductors, central processing units, graphical processing units and computer peripherals.
43.
SOLUTION TO AVOID DUPLICATED APP NOTIFICATION SOUNDS
A computing system includes a virtual server to provide a remote desktop session that includes at least one remote app configured to generate notification sounds, and a client computing device to provide a local desktop session that includes at least one local app configured to generate notification sounds. The client computing device accesses the remote desktop session and launches one of the remote apps, and launches one of the local apps. The launched local app is the same as the launched remote app. The local and remote desktop sessions include respective local and remote sound controllers to intercept notification sounds generated by the local and remote apps. The local and remote sound controllers operate based on predetermined muting criteria so that one of the notification sounds is muted to avoid duplicated app notification sounds.
According to one aspect of the disclosure, a method comprises: receiving, by a first computing device, information about one or more applications running on a second computing device, the second computing device being one of a plurality of computing devices managed by the first computing device; determining, by the first computing device, whether to power down the second computing device based at least on an analysis of the information about the one or more applications; and responsive to a determination to shutdown the second computing device, sending, by the first computing device, a command to shutdown the second computing device, wherein the second computing device is configured to save state of the one or more applications to a storage device accessible to the plurality of computing devices.
One disclosed method involves detecting a request to download a file, via a network, to a first storage medium associated with a client device, and determining that the file is potentially sensitive. The method further involves initiating a process to download the file to a second storage medium rather than the first storage medium based at least in part on the file being potentially sensitive.
In one disclosed embodiment, a computing system may receive, at a first application programming interface (API) endpoint, a first request for a first operation. The computing system may send, to a second API endpoint, a first API call requesting the first operation. In response to sending the first API call, the computing system may receive a first response to the first API call. The computing system may determine that at least one characteristic of the first request or the first response satisfies a criterion. The computing system may detect a first event based on the first request or the first response satisfying the criterion. The computing system may generate a first indication of the first event.
Methods, systems, and computer readable media for deploying an implementing scan functionality for virtual sessions are described herein. A user device may include a user device display and may be configured to access a virtual session. The user device may further be configured to present an identity code that includes identity information that is associated with a scan session and virtual session. A mobile device may include a camera, and may be configured to detect a user selection of a scan option within a client agent. The mobile device may further be configured to capture the identity code presented by the user device. The mobile device may capture with the camera one or more images as scan items. The mobile device may send, to a server associated with the virtual session, the scan items, and the identity information. The server may place the scan items in the virtual session.
One disclosed method involves detecting a request to download a file, via a network, to a first storage medium associated with a client device, and determining that the file is potentially sensitive. The method further involves initiating a process to download the file to a second storage medium rather than the first storage medium based at least in part on the file being potentially sensitive.
A system and method for initializing a virtual machine (VM) image is provided. The method includes steps of retrieving identity data from a metadata service implemented by a cloud environment; obtaining, from the cloud environment, a virtual identity disk assigned to a VM; and writing the identity data to the virtual identity disk assigned to the VM. The method may further comprise encrypting the identity data with a data encryption key (DEK) or a public key of a virtual trusted platform module (vTPM) responsive to the vTPM being available.
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
50.
User Interface Activation in a Secure Network System
A process and system for improving a user experience when using remote browser applications is provided. While a remote browser application is being activated, including establishing an appropriate communication channel and launching the application, pre-cached content may be provided to the client device and user for immediate display and user interaction. User interaction with the pre-cached content may be recorded and stored and transferred to the remote browser application and live content upon completion of the remote browser application and session activation. In some examples, pre-caching the content may include retrieving the content from the content source and removing and/or adding code and data to one or more content files. The cached content may be updated based on various criteria.
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
51.
EVALUATING THE QUALITY OF INTEGRATIONS FOR EXECUTING SEARCHES USING APPLICATION PROGRAMMING INTERFACES
In one disclosed embodiment, a computing system may receive a request to test accuracy of a search integration component for a system of record. The computing system may determine that a test corpus of files has been stored by the system of record. In response to the request, the computing system may send, to an API endpoint, an API call corresponding to a search query identified in a judgment list, the judgment list including data indicating a relevancy of files of the test corpus to the search query. The computing system may receive, from the search integration component, an API response to the API call, the API response identifying files stored by the system of record. The computing system may determine an accuracy score for the search integration component based on the judgement list and the files identified in the API response.
A computing system includes first and second client computing devices accessing a communications network to establish a communications session. The first client computing device operates an audio analysis agent to determine network latency within the communications session based on communications with an audio analysis agent in the second client computing device. In response to the network latency exceeding a latency threshold, audio input from a user of the first client computing device is analyzed to determine a speaking status of the user. The audio analysis agent generates an indicator command message for the second client computing device based on the determined speaking status of the user. The second client computing device displays an indicator based on the indicator command message indicating when a user of the second client computing device can speak to avoid speech confliction with the user of said first client computing device.
G08B 5/36 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission using visible light sources
G10L 25/87 - Detection of discrete points within a voice signal
53.
LOCATION-BASED PROXY FOR VIRTUAL MEETING OPTIMIZATION
Methods and apparatus for improving performance in a virtual meeting session in a distributed workspace system. One example of such a method includes acts of launching the virtual meeting session on a computing device of a first meeting participant, establishing a first connection between the computing device and a virtual meeting server, monitoring network latency conditions in the first network connection, upon determining that the network latency conditions exceed a predetermined threshold, selecting a proxy agent and establishing a second network connection between the computing device and the proxy agent, and establishing a third network connection between the virtual meeting server and the proxy agent to connect the computing device to the virtual meeting server through the proxy agent.
In some implementations, there may be provided a computer-implemented method that includes detecting, using at least one processor, a first action being executed on a data in a source computing application; determining, using the at least one processor, a source color theme associated with at least one of the source computing application and the data; determining, using the at least one processor, a destination color theme associated with a destination computing application, the destination computing application being communicatively coupled to the source application; comparing, using the at least one processor, the source color theme and the destination color theme; and executing, using the at least one processor, a second action on the data in the destination computing application based on the comparison of the source color theme and the destination color theme. Related systems, methods, and articles of manufacture are also disclosed.
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to detect triggering of one or more threat detectors and activate a subset of nodes associated with the triggered threat detectors from a plurality of nodes in a Bayesian network in response to the detection. The at least one processor is further configured to determine that feedback associated with the triggered threat detectors is available and, if so, accumulate the feedback to a feedback node of the network, the feedback node associated with the triggered threat detectors. The at least one processor is further configured to calculate a probability of malicious action using the network to combine probabilities associated with the activated subset of nodes and the feedback node, determine that the probability exceeds a threshold value, and perform a security action in response to the determination.
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to detect triggering of one or more threat detectors. The at least one processor is further configured to activate a subset of nodes from a plurality of nodes in a Bayesian network in response to the detection, the activated subset of nodes associated with the triggered threat detectors. The at least one processor is further configured to calculate a probability of malicious action using the Bayesian network to combine probabilities associated with the activated subset of nodes. The at least one processor is further configured to determine that the probability exceeds a threshold value. The at least one processor is further configured to perform a security action in response to the determination.
Methods and systems for managing virtual machines are described herein. A virtualization computing platform may host a plurality of virtual machines comprising. The platform may detect that the first user device is disconnected from the first virtual machine and determine, using a machine learning model, that the first virtual machine, during a time period while the user device is disconnected, is in an idle state. The platform may obtain, based on the determination that the first virtual machine is in the idle state, a snapshot of the first virtual machine and cease hosting the first virtual machine. If the platform receives a request from a second user device associated with the same user account to continuing using the virtual application executed previously by the first virtual machine, the platform may establish a second virtual machine and load, to memory of the second virtual machine, information associated with the snapshot.
The present solution provides systems and methods for a GSLB service to access a first, plurality of measurements of network latency between a plurality of access-points and the first client device and a second plurality of measurements of network latency between the plurality of access-points and one or more of data centers. The GSLB service can receive, from the one or more data centers, health of an application deployed across the one or more data centers. The GSLB service can determine, according to the first plurality of measurements, the second plurality of measurements and the health of the application, a first data center of the one or more data centers and a first access-point of the plurality of access-points. The GSLB service can send, to the first client device, a domain name system (DNS) response identifying the first access-point and the first data center.
The present solution provides systems and methods for establishing and implementing a hostname-based split tunneling of client-side network traffic. A driver on a client can receive a first packet of an application that includes a hostname of a destination. The driver can receive from an agent of the client a real IP address and a spoofed IP address corresponding to the hostname, when the hostname matches one of a plurality of hostnames to exclude packet traffic from a VPN tunnel of the agent. The driver can receive from the agent a domain name service (DNS) response that includes the spoofed IP address and send the DNS response to cause the application to include the spoofed IP address in a second packet for the destination.
The present solution provides systems and methods for a GSLB service to access a first plurality of measurements of network latency between a plurality of access-points and the first client device and a second plurality of measurements of network latency between the plurality of access-points and one or more of data centers. The GSLB service can receive, from the one or more data centers, health of an application deployed across the one or more data centers. The GSLB service can determine, according to the first plurality of measurements, the second plurality of measurements and the health of the application, a first data center of the one or more data centers and a first access-point of the plurality of access-points. The GSLB service can send, to the first client device, a domain name system (DNS) response identifying the first access-point and the first data center.
In one aspect, an example methodology implementing the disclosed techniques may include, by a first computing device, detecting a text input to a user interface (UI) element of an application executing on the first computing device and, responsive to the detection of the text input, sending a request for text candidates associated with the text input to a second computing device. The method may also include, responsive to sending the request, receiving, by the first computing device from the second computing device, a list of one or more text candidates associated with the text input. The method may further include presenting, by the first computing device, the list of one or more text candidates in a composition window, the composition window being part of an input method editor (IME) executing on the first computing device, the composition window displayed on a screen of the first computing device.
G06F 3/023 - Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
Methods and systems for enhanced QR code security are described herein. A computing platform may generate a QR code that includes an information code and a server code. The computing platform may split the QR code into first and second portions, where the first portion includes at least the server code. The computing platform may send, to a QR display device, the first portion for display. The computing platform may receive, from a user device, authentication credentials and a request for the second portion, sent to the computing platform based on identification of the computing platform through scanning, by the user device, the server code at the QR display device. The computing platform may send, based on validating the authentication credentials and to the user device, the second portion, where the user device is configured to re-assemble the QR code based on the first and second portions.
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
In one aspect, an example methodology implementing the disclosed techniques may include, by a first computing device hosting an application that is being executed on a second computing device, detecting a start of a password input to the application, wherein the password input occurs during a session for sharing a screen of the second computing device. The method may also include, responsive to the detection, sending, by the first computing device to the second computing device, a notification to suspend the sharing of the screen of the second computing device. The application may be a virtual application. The second computing device may be a mobile device.
A privilege management method includes receiving, from a first user via a privileges plugin, a request to recommend a candidate to perform a task on behalf of the first user; calculating, responsive to the request to recommend the candidate, a recommendation score for each of a plurality of second users based on a position level score, a capability level score, a task similarity score, and a familiarity score; and sending a list of recommended candidates to the first user via the privileges plugin, where the list of recommended candidates includes at least one of the second users for which the recommendation score is greater than a threshold score.
In one aspect, an example methodology implementing the disclosed techniques may include, by a first computing device, detecting a text input to a user interface (UI) element of an application executing on the first computing device and, responsive to the detection of the text input, sending a request for text candidates associated with the text input to a second computing device. The method may also include, responsive to sending the request, receiving, by the first computing device from the second computing device, a list of one or more text candidates associated with the text input. The method may further include presenting, by the first computing device, the list of one or more text candidates in a composition window, the composition window being part of an input method editor (IME) executing on the first computing device, the composition window displayed on a screen of the first computing device.
Device access control can be implemented on a protected device to determine, based on a user input to the device, that a timeout threshold has been exceeded and to cause, in response to determining that the timeout threshold has been exceeded, an application graphical user interface (GUI) on the device to remove or blank content, such as text, images, or graphics, from the application window. The removal or blanking of the content can be performed on a window-by-window basis; that is, content is removed only from application windows of applications that are protected by an associated application protection policy. In some examples, the application protection policy can be established by an administrator of a digital workspace within which the protected application executes. Such a digital workspace can be implemented via a type of virtual processing environment that can be accessed via client computing devices.
A system and method for dynamically transforming email signatures. A method includes: receiving an email from an email client prior to delivery to an intended recipient, the email including an original signature; analyzing the email to obtain information associated with the intended recipient of the email; predicting a preferred language of the intended recipient based on the information; converting the original signature to a revised signature, wherein the revised signature utilizes the preferred language; and forwarding the email with the revised signature to the intended recipient.
H04L 51/07 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
A computing system includes a virtual server providing first and second virtual desktops. A first client computing device accesses the first virtual desktop via a communications network, and shares content of the first virtual desktop as a screen sharer in a collaboration session. A second client computing device accesses the second virtual desktop via the communications network, and displays content of the second virtual desktop in a virtual desktop window. The second client computing device participates in the collaboration session as a screen viewer, and receives the shared screen content of the first virtual desktop. The shared screen content is displayed by the second client computing device in a shared screen window, with the shared screen window being separate from the virtual desktop window.
G06F 9/451 - Execution arrangements for user interfaces
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
Methods and systems for handling of invalid state parameters during authentication are described herein. A computing device may receive, from a web browser executing on a user device, first data. That data may comprise an indication of authentication of authentication credentials and a first state parameter. Based on that first state parameter being invalid, the computing device may generate a new state parameter and redirect the web browser to a web page associated with an identity provider application. The computing device may then receive, from the web browser, an indication of authentication of a cookie and the new state parameter. The computing device may provide, to the user device, access to one or more services.
Device access control can be implemented on a protected device to determine, based on a user input to the device, that a timeout threshold has been exceeded and to cause, in response to determining that the timeout threshold has been exceeded, an application graphical user interface (GUI) on the device to remove or blank content, such as text, images, or graphics, from the application window. The removal or blanking of the content can be performed on a window-by-window basis; that is, content is removed only from application windows of applications that are protected by an associated application protection policy. In some examples, the application protection policy can be established by an administrator of a digital workspace within which the protected application executes. Such a digital workspace can be implemented via a type of virtual processing environment that can be accessed via client computing devices.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
71.
Centralization of Authentication Servers for Different Resource Servers
Methods and systems for centralizing disparate authentication servers using scopes are described herein. A computing device may receive, from a client device, a first access request comprising authentication credentials and first scope data. The computing device may then send, to at least one first authentication server associated with the at least one first resource server, a first token request. The computing device may then receive a first token and provide that token to the client device. The computing device may then receive, from the client device, a second access request comprising second scope data. The computing device may send, to at least one second authentication server associated with the at least one second resource server, a second token request. The computing device may then receive a second token and provide that token to the client device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
72.
SYSTEMS AND METHODS FOR SCHEDULING MULTIPLE PARTICIPANT TASKS
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, identifying a task from a plurality of tasks that need to be scheduled and determining other tasks associated with participants associated with the task. The method may also include, by the computing device, determining one or more periods of time when the participants associated with the task are unavailable and determining one or more candidate time slots for the task based on time slots for which the other tasks are scheduled and the one or more periods of time when the participants associated with the task are unavailable. The method may further include, by the computing device, scheduling the task to be performed during one of the determined one or more candidate time slots.
A task management process includes receiving, by a processor and from a task management service, one or more tasks to be performed by a user; computing, by the processor, a task score for each of the one or more tasks to be performed by the user; determining, by the processor, a mood status associated with the user; comparing, by the processor, the mood status to the task score for each of the one or more tasks to be performed by the user; determining, by the processor and based on the comparison, a recommended task from among each of the one or more tasks to be performed by the user; and sending, by the processor, the recommended task to the task management service for display to the user.
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
G16H 20/70 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to mental therapies, e.g. psychological therapy or autogenous training
A61B 5/16 - Devices for psychotechnics; Testing reaction times
A61B 5/00 - Measuring for diagnostic purposes ; Identification of persons
74.
INACTIVITY LOGOFF ADJUSTMENT BASED ON SCHEDULED EVENTS
Systems and methods for inactivity logoff adjustment based on scheduled events are provided. A device can include one or more processors, coupled to memory. The device can detect a condition to terminate, at a first timestamp, a computing session established by the one or more processors. The device can identify, responsive to detection of the condition and prior to termination of the computing session, an event for execution in the computing session at a second timestamp subsequent to the first timestamp. The device can provide, based on a difference between the second timestamp and the first timestamp less than or equal to a threshold, a user interface element configured to extend the computing session to at least the second timestamp.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, identifying a task from a plurality of tasks that need to be scheduled and determining other tasks associated with participants associated with the task. The method may also include, by the computing device, determining one or more periods of time when the participants associated with the task are unavailable and determining one or more candidate time slots for the task based on time slots for which the other tasks are scheduled and the one or more periods of time when the participants associated with the task are unavailable. The method may further include, by the computing device, scheduling the task to be performed during one of the determined one or more candidate time slots.
Systems and methods for inactivity logoff adjustment based on scheduled events are provided. A device can include one or more processors, coupled to memory. The device can detect a condition to terminate, at a first timestamp, a computing session established by the one or more processors. The device can identify, responsive to detection of the condition and prior to termination of the computing session, an event for execution in the computing session at a second timestamp subsequent to the first timestamp. The device can provide, based on a difference between the second timestamp and the first timestamp less than or equal to a threshold, a user interface element configured to extend the computing session to at least the second timestamp.
In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, receiving input via an application of the computing device, the input to initiate navigation to an electronic resource, and determining that navigation to the electronic resource via the application is insecure. The method also includes, by the computing device, responsive to the determination that the navigation is insecure, modifying the navigation to the electronic resource so as to prevent navigation to the electronic resource via the application.
A method, a system, and a computer program product for managing multimedia streams of user devices. A reproduction of one or more multimedia streams on a first computing device is determined. A location of a second computing device being positioned in an area enclosed by one or more boundaries in a plurality of boundaries is detected. Each boundary in the plurality of boundaries is associated with a predetermined type of a multimedia stream in one or more multimedia streams. At least one of a pausing and an unpausing of the reproduction of one or more multimedia streams on the first computing device based on the detected location of the second computing device is executed.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 65/61 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
H04N 21/218 - Source of audio or video content, e.g. local disk arrays
A methodology implementing the disclosed techniques can include, by a computing device, receiving input events from a remote computing device, ones of the input events having an input event position associated with a position on a screen of the computing device being shared during a screen sharing session and, responsive to a determination that a first input event position of a first one of the input events is within a protected region of the shared screen, preventing the first one of the input events from being applied to the shared screen. The method can also include, by the computing device, responsive to a determination that a second input event position of a second one of the input events is not within the protected region of the shared screen, applying the second one of the input events to the shared screen.
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
Virtual application and desktop delivery may be optimized by supplying application metadata and user intent to the device between a client and a server hosting resources for the delivery. The data packets used to deliver the virtual application or desktop may be also tagged with references to the application. By supplying the metadata and tagging packets with the metadata, an intermediary network device may provide streams of data packets at the target QoS. In addition, the device may apply network resource allocation rules (e.g., firewalls and QoS configuration) for redirected content retrieved by the client out of band relative to a virtual channel such as the Internet. The network resource allocation rules may differ for different types of resources accessed. The device may also control a delivery agent on the server to modify communication sessions established through the virtual channels based on network conditions.
H04L 47/2441 - Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
H04L 47/80 - Actions related to the user profile or the type of traffic
H04L 47/2475 - Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications
H04L 47/74 - Admission control; Resource allocation measures in reaction to resource unavailability
H04L 47/76 - Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
In one disclosed embodiment, a computing system may instruct a first content repository to store a first part of a file but not a second part of the file, the first content repository being associated with a first internet protocol (IP) address, and may instruct a second content repository to store the second part of the file but not the first part of the file, the second content repository being associated with a second IP address that is different than the first IP address. In response to the computing system receiving a request for the file from a client device, the computing system may instruct the client device to retrieve the second part of the file, but not the first part of the file, from the second content repository using the second IP address.
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
H04L 67/52 - Network services specially adapted for the location of the user terminal
H04L 67/63 - Routing a service request depending on the request content or context
82.
COMPUTING SYSTEM AND METHODS FOR PRELAUNCHING APPS IN VIRTUAL COMPUTING SESSIONS
A computing system includes a client computing device to display items in an application window, with at least one of the items having a file attachment that has not been opened by a user of the client computing device. A session broker in communications with the client computing device transmits a prelaunch application message to initiate prelaunch of an application that can be used to open the file attachment. A virtual server in communications with the session broker and the client computing device prelaunches in a virtual session the application that can be used to open the file attachment in response to receiving the prelaunch application message, and hides display of the prelaunched application until the user opens the file attachment.
A computer system configured to determine safety of a suspected website is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive a request to visit the suspected website; send an incorrect password to the suspected website; receive a reply from the suspected website; and determine, based on the reply to the incorrect password, whether to execute a precautionary operation. The system may proceed with the request responsive to the reply including an error notification, as identified based on one or more of: a Document Object Model (DOM) tag; a re-appearance of a sign-in control; or an Application Programming Interface (API) call. Alternatively, the system may abandon the request responsive to the reply being affirmative, for example including a prompt or input field for a one-time password.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
One disclosed method involves receiving, by a browser and from a first origin, preauthorization data identifying a plurality of other origins that are permitted to send instructions to the browser that cause the browser to access one or more resources at the first origin, determining, by the browser, that data received from a second origin includes a first instruction to access a first resource at the first origin, determining, by the browser, that the second origin is included among the plurality of other origins identified by the preauthorization data, and accessing, by the browser and based at least in part on the second origin being included among the plurality of other origins, the first resource at the first origin based on the first instruction.
According to some embodiments, a method includes: receiving, by a computing device, information about a task of application, the task associated with a project; receiving, by the computing device, information about other tasks of the application including other tasks that have been completed and other tasks that have not been completed; calculating, by the computing device, a start date and an expected effort for the task based on analysis of the information received for the task and the other tasks; and causing, by the computing device, an update within the application to apply the calculated start date and expected effort to the task.
Systems and methods for a POP recommendation engine include one or more processors which may identify one or more cloud platforms selected from a plurality of cloud platforms for which to rank one or more points of presence (POP) of a plurality of POPs provided by each of the one or more cloud platforms. The processor(s) may receive metrics on performance of accessing one or more networks by devices via each of the one or more POPs of the plurality of POPs across each of the one or more cloud platforms. The processor(s) may determine a ranking of the plurality of POPs across the one or more cloud platforms based on the metrics. The processor(s) may generate a report identifying the rankings for at least the one or more POPs of the plurality of POPs across the one or more cloud platforms.
Described embodiments provide systems and methods of providing accessing to a file. A client device may store a copy of a file. The copy may be generated during active use of the file in which content of the file is accessible by the client device via an application hosted on a remote computing device. Responsive to a loss in connectivity that disrupts the active use of the file, the client device may identify a local application on the client device based at least on a type of the file. The client device may use the identified local application to access the copy of the file stored on the client device and continue the active use of content of the file. Subsequent to restoring the connectivity, the client device may provide the file to the remote computing device for synchronization of the file.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Systems and methods for preventing phishing attacks are provided. For example, the computer system includes at least one processor that is configured to recognize a uniform resource locator (URL) to which a web browser is navigating as a URL associated with a website for which phishing protection is to be provided, the recognition based on an absence of the URL from a history of visited URLs for which a user has previously visited, monitor user input into one or more data fields associated with the website, determine whether the user input into the one or more data fields includes automatically generated one-time password (OTP) information by comparing the user input against one or more OTP information characteristics, and perform a security action in response to determining user entry of OTP information.
In some embodiments, a method can include: receiving, by a computing device, a plurality of messages, where at least a first one of the plurality of messages is associated with a first application and at least a second one of the plurality of messages is associated with a second application different from the first; receiving, by the computing device, information about one or more scheduled meetings; determining, by the computing device, one or more of the plurality of messages that are associated with a first meeting of the one or more scheduled meetings; and sending, by the computing device, information about the associations of the one or more of the plurality of messages and the first meeting to another computing device to enable the another computing device to display a list of the one or more of the plurality of messages in conjunction with the first meeting.
A method includes: receiving, by a computing device, information about a task of application (902), the task associated with a project; receiving, by the computing device, information about other tasks of the application including other tasks that have been completed and other tasks that have not been completed (904); calculating, by the computing device, a start date and an expected effort for the task based on analysis of the information received for the task and the other tasks (906); and causing, by the computing device, an update within the application to apply the calculated start date and expected effort to the task (908).
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
Systems and methods for a POP recommendation engine include one or more processors which may identify one or more cloud platforms selected from a plurality of cloud platforms for which to rank one or more points of presence (POP) of a plurality of POPs provided by each of the one or more cloud platforms. The processor(s) may receive metrics on performance of accessing one or more networks by devices via each of the one or more POPs of the plurality of POPs across each of the one or more cloud platforms. The processor(s) may determine a ranking of the plurality of POPs across the one or more cloud platforms based on the metrics. The processor(s) may generate a report identifying the rankings for at least the one or more POPs of the plurality of POPs across the one or more cloud platforms.
Systems and methods for indexing to an end-point instance and selecting an owner point of presence (POP) are provided. A system can include one or more processors coupled to memory. The system can receive a request to process a ticket used to authenticate a connection to a session between a client device and one or more servers. The system can locate a plurality of access points across a plurality of groups of access points that each maintain the ticket in storage on the plurality of access points based on a function applied to an identifier of the ticket. The system can provide the request to at least one access point of the plurality of access points located based on the function to perform the process on the ticket.
Methods and systems for selectively capturing screen content are described herein. The projector associated with a plurality of layers may be initiated. The plurality of layers may comprise a surface layer that is a highest layer, a canvas layer that is the lowest layer and backdrop layer that is second lowest layer. Input associated with the positioning of the projector may be received. The portions of content may be determined to be between the surface layer and the backdrop layer and captured.
A contextual authentication method includes receiving a request to launch a web service and causing the web service to be launched on a remote browser. When a security event is detected, a security key obtained, based on a context of a client computing system, from a near-field communication (NFC) device connected to a mobile device. The security key is requested and received from the NFC device via the mobile device. The security key is delivered to the web service via the remote browser.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 12/0431 - Key distribution or pre-distribution; Key agreement
In some embodiments, a method can include: receiving, by a computing device, a plurality of messages, where at least a first one of the plurality of messages is associated with a first application and at least a second one of the plurality of messages is associated with a second application different from the first; receiving, by the computing device, information about one or more scheduled meetings; determining, by the computing device, one or more of the plurality of messages that are associated with a first meeting of the one or more scheduled meetings; and sending, by the computing device, information about the associations of the one or more of the plurality of messages and the first meeting to another computing device to enable the another computing device to display a list of the one or more of the plurality of messages in conjunction with the first meeting.
The present solution provides systems and methods for supporting network communication, including UDP network communication, between clients and servers at data centers, over a cloud VPN. An agent can receive a user datagram protocol (UDP) packet. The agent can generate a header for the UDP packet identifying a destination server at a data center of a plurality of data centers. The agent can establish a channel to a virtual private network (VPN) server of a cloud-based VPN as a service. The agent can encapsulate the UDP packet using the header and transmit, via the channel, the encapsulated UDP packet to the VPN server, the encapsulated UDP packet configured to identify the data center according to a table of the VPN server and content of the header.
A method may for audio quality verification may include generating a first transcript of a first audio data captured at a first client device engaged in a web conference session with a second client device. A second transcript of a second audio data received and/or output at the second client device may be generated and analyzed relative to the first transcript. In the event an above-threshold difference is detected between the first transcript and the second transcript, a notification may be generated for display at the first client device. The notification may indicate that the audio quality at the second client device fails to satisfy a quality threshold. Moreover, in some cases, the notification may identify portions of the first audio data that was not output at the second client device with sufficient audio quality, thereby enabling a repeat of those portions of the first audio data.
G10L 25/60 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for measuring the quality of voice signals
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
G10L 15/30 - Distributed recognition, e.g. in client-server systems, for mobile phones or network applications
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, responsive to a user requesting authorization to access an application, segmenting a string of content into a plurality of substrings of different lengths, the string of content being an input to access the application. The method also includes, responsive to a determination that data in a first data structure represents a first substring of the plurality, identifying a length of another substring and at least one type of character present within that substring based on the data in the first data structure, determining a risk of unauthorized use of the string of content based on the identified length and the at least one type of character present within that substring, and allowing access to the application using the string of content based on the determined risk.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
In one aspect, an example methodology implementing the disclosed techniques can include, by a first computing device, determining a reference image showing (e.g., encoding) an orientation of a user participating in an online meeting and receiving a video stream captured by a camera, the video stream associated with the online meeting. The method can also include, by the computing device, responsive to a determination of a change in the orientation of the user appearing within the video stream, providing modified video stream in which the orientation of the user is adjusted based on the reference image.
Embodiments described include systems and methods for securely managing browser plugins via embedded browser. The solution enables a client application or embedded browser to dynamically load the browser components into the embedded browser based on a risk or security profile and one or more policies. The policies can be centrally managed to enable only allowed browser components to be loaded within the embedded browser for a given risk profile. Based on the risk profile, a session established by the embedded browser can be transferred from the client application to a hosted browser at a secure server. When the session is transferred to the hosted browser, the present system can also redirect the browser component configurations to the hosted browser such that the same browser components are enabled, disabled, or modified at the hosted browser.