In accordance with one disclosed method, a first application (A) determines that a first operating system received a first input indicating that first data of a second application is to be copied to a first clipboard associated with the first operating system, (B) determines that the second application is associated with a second clipboard, (C) instructs the first operating system to refrain from transferring the first data to the first clipboard, (D) receives the first data from the first operating system, and (E) transfers the first data to the second clipboard.
One disclosed method involves detecting a request to download a file, via a network, to a first storage medium associated with a client device, and determining that the file is potentially sensitive. The method further involves initiating a process to download the file to a second storage medium rather than the first storage medium based at least in part on the file being potentially sensitive.
The present solution provides systems and methods for a GSLB service to access a first, plurality of measurements of network latency between a plurality of access-points and the first client device and a second plurality of measurements of network latency between the plurality of access-points and one or more of data centers. The GSLB service can receive, from the one or more data centers, health of an application deployed across the one or more data centers. The GSLB service can determine, according to the first plurality of measurements, the second plurality of measurements and the health of the application, a first data center of the one or more data centers and a first access-point of the plurality of access-points. The GSLB service can send, to the first client device, a domain name system (DNS) response identifying the first access-point and the first data center.
H04L 67/101 - Sélection du serveur pour la répartition de charge basée sur les conditions du réseau
H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p.ex. la mémoire disponible ou la charge de travail
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
In one aspect, an example methodology implementing the disclosed techniques may include, by a first computing device, detecting a text input to a user interface (UI) element of an application executing on the first computing device and, responsive to the detection of the text input, sending a request for text candidates associated with the text input to a second computing device. The method may also include, responsive to sending the request, receiving, by the first computing device from the second computing device, a list of one or more text candidates associated with the text input. The method may further include presenting, by the first computing device, the list of one or more text candidates in a composition window, the composition window being part of an input method editor (IME) executing on the first computing device, the composition window displayed on a screen of the first computing device.
G06F 3/023 - Dispositions pour convertir sous une forme codée des éléments d'information discrets, p.ex. dispositions pour interpréter des codes générés par le clavier comme codes alphanumériques, comme codes d'opérande ou comme codes d'instruction
In one aspect, an example methodology implementing the disclosed techniques may include, by a first computing device hosting an application that is being executed on a second computing device, detecting a start of a password input to the application, wherein the password input occurs during a session for sharing a screen of the second computing device. The method may also include, responsive to the detection, sending, by the first computing device to the second computing device, a notification to suspend the sharing of the screen of the second computing device. The application may be a virtual application. The second computing device may be a mobile device.
Device access control can be implemented on a protected device to determine, based on a user input to the device, that a timeout threshold has been exceeded and to cause, in response to determining that the timeout threshold has been exceeded, an application graphical user interface (GUI) on the device to remove or blank content, such as text, images, or graphics, from the application window. The removal or blanking of the content can be performed on a window-by-window basis; that is, content is removed only from application windows of applications that are protected by an associated application protection policy. In some examples, the application protection policy can be established by an administrator of a digital workspace within which the protected application executes. Such a digital workspace can be implemented via a type of virtual processing environment that can be accessed via client computing devices.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, identifying a task from a plurality of tasks that need to be scheduled and determining other tasks associated with participants associated with the task. The method may also include, by the computing device, determining one or more periods of time when the participants associated with the task are unavailable and determining one or more candidate time slots for the task based on time slots for which the other tasks are scheduled and the one or more periods of time when the participants associated with the task are unavailable. The method may further include, by the computing device, scheduling the task to be performed during one of the determined one or more candidate time slots.
Systems and methods for inactivity logoff adjustment based on scheduled events are provided. A device can include one or more processors, coupled to memory. The device can detect a condition to terminate, at a first timestamp, a computing session established by the one or more processors. The device can identify, responsive to detection of the condition and prior to termination of the computing session, an event for execution in the computing session at a second timestamp subsequent to the first timestamp. The device can provide, based on a difference between the second timestamp and the first timestamp less than or equal to a threshold, a user interface element configured to extend the computing session to at least the second timestamp.
A methodology implementing the disclosed techniques can include, by a computing device, receiving input events from a remote computing device, ones of the input events having an input event position associated with a position on a screen of the computing device being shared during a screen sharing session and, responsive to a determination that a first input event position of a first one of the input events is within a protected region of the shared screen, preventing the first one of the input events from being applied to the shared screen. The method can also include, by the computing device, responsive to a determination that a second input event position of a second one of the input events is not within the protected region of the shared screen, applying the second one of the input events to the shared screen.
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
G06F 3/14 - Sortie numérique vers un dispositif de visualisation
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
10.
SYSTEMS AND METHODS FOR ROUTING REMOTE APPLICATION DATA
Systems and methods for a POP recommendation engine include one or more processors which may identify one or more cloud platforms selected from a plurality of cloud platforms for which to rank one or more points of presence (POP) of a plurality of POPs provided by each of the one or more cloud platforms. The processor(s) may receive metrics on performance of accessing one or more networks by devices via each of the one or more POPs of the plurality of POPs across each of the one or more cloud platforms. The processor(s) may determine a ranking of the plurality of POPs across the one or more cloud platforms based on the metrics. The processor(s) may generate a report identifying the rankings for at least the one or more POPs of the plurality of POPs across the one or more cloud platforms.
In some embodiments, a method can include: receiving, by a computing device, a plurality of messages, where at least a first one of the plurality of messages is associated with a first application and at least a second one of the plurality of messages is associated with a second application different from the first; receiving, by the computing device, information about one or more scheduled meetings; determining, by the computing device, one or more of the plurality of messages that are associated with a first meeting of the one or more scheduled meetings; and sending, by the computing device, information about the associations of the one or more of the plurality of messages and the first meeting to another computing device to enable the another computing device to display a list of the one or more of the plurality of messages in conjunction with the first meeting.
A method includes: receiving, by a computing device, information about a task of application (902), the task associated with a project; receiving, by the computing device, information about other tasks of the application including other tasks that have been completed and other tasks that have not been completed (904); calculating, by the computing device, a start date and an expected effort for the task based on analysis of the information received for the task and the other tasks (906); and causing, by the computing device, an update within the application to apply the calculated start date and expected effort to the task (908).
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A method comprising: determining two or more of tasks associated with a user and determining, a priority of each task of the two or more tasks based on a deadline and an importance of the task. The method can also include, by the first computing device, determining dependencies between different ones of the two or more tasks and sorting the two or more tasks based on the priority of each task of the two or more tasks and the determined dependencies. The method can also include, by the first computing device, causing at least a portion of the sorted two or more tasks to be displayed in a user interface (UI) of an application on a second computing device.
Systems and methods for geographically distributed node replication include a first node which receives a message from a client based on a proximity of the first node to the client, the message transmitted to the first node via anycast routing from the client. The first node may replicate the message to a first subset of the geographically distributed system of nodes based on a geographic proximity of nodes within the first subset. The first node may publish the message to a data feed of a message bus for the system of nodes, to cause at least one node of the system of nodes to receive the message from the first node, the at least one node outside the first subset and subscribing to the data feed of the first node.
Described embodiments provide systems and methods for establishing a session. A client may identify, to access at least one of a plurality of services via a connector, a plurality of metrics on network conditions between the connector and a corresponding service of the plurality of services. The client may use at least one value of the plurality of metrics to scale each metric of the plurality of metrics. The client may determine a score for each service of the plurality of services as a function of each of the plurality of scaled metrics for the corresponding service. The client may select, from the plurality of services, a service based at least on the score. The client may establish a session with the connector to access the selected service.
A technique for applying signatures to documents stores a user signature in a first device and selectively releases the user signature for incorporation into documents only after performing validation. The validation includes the first device scanning a machine-readable code displayed by a second device. The first device and the second device participate in respective sessions with an online system, which stores a document to be signed. The first device extracts information from the machine-readable code and attempts to validate that information with the online system. If the validation is successful, the first device may release the user signature, e.g., by sending the user signature to the online system for incorporation into the document.
A computing device may include a memory and a processor coupled to the memory and configured to run a browser to access a virtual computing session. The browser may have a first language associated therewith, and the virtual computing session may be provided in the first language responsive to the browser. The processor may be further configured to capture text input to the browser for the virtual computing session, determine whether the captured text corresponds to a second language different than the first language, and cause the virtual computing session to be provided in the second language responsive to determining the captured text corresponds to the second language.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, receiving a video stream from a first client device and, responsive to a determination that a second client device activated a downgrade feature and further responsive to a determination that a user of the first client device is not speaking, modifying the video stream to consume less resource. The method can also include, by the computing device, providing the modified video stream to the second client device.
H04N 21/462 - Gestion de contenu ou de données additionnelles, p.ex. création d'un guide de programmes électronique maître à partir de données reçues par Internet et d'une tête de réseau ou contrôle de la complexité d'un flux vidéo en dimensionnant la résolution o
H04N 21/437 - Interfaçage de la voie montante du réseau de transmission, p.ex. pour transmettre des requêtes de client à un serveur VOD
H04N 21/2662 - Contrôle de la complexité du flux vidéo, p.ex. en mettant à l'échelle la résolution ou le débit binaire du flux vidéo en fonction des capacités du client
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
Methods and systems for sending notifications are described herein. A server may determine, a plurality of user devices that are connected with a user account. The server may a plurality of status reports. Each of the plurality of status reports may indicate a currently active level of a respective user device of the plurality of user devices. The server may select, based on analyzing the status reports, one or more user devices that are currently active. The server may cause, on the one or more user devices, display of a notification associated with the user account. In this way, the number of repeated notifications may be reduced.
H04L 51/043 - Messagerie en temps réel ou quasi en temps réel, p.ex. messagerie instantanée [IM] en utilisant ou en gérant les informations de présence
H04L 51/214 - Surveillance ou traitement des messages en utilisant le transfert sélectif
H04L 51/224 - Surveillance ou traitement des messages en fournissant une notification sur les messages entrants, p.ex. des poussées de notifications des messages reçus
20.
SYSTEMS AND METHODS FOR ANNOTATING ONLINE MEETINGS
According to some embodiments of the disclosure, a method includes: receiving, at a computing device, content of an online meeting; analyzing, by the computing device, the content to identify one or more topics communicated by one or more client devices participating in the online meeting; associating, by the computing device, ones of the one or more topics to one or more text segments of the content; and providing, by the computing device, annotations for the online meeting to at least one of the one or more client devices participating in the online meeting, the annotations representative of the one or more topics and the associated text segments.
H04N 21/4788 - Services additionnels, p.ex. affichage de l'identification d'un appelant téléphonique ou application d'achat communication avec d'autres utilisateurs, p.ex. discussion en ligne
One disclosed method involves a computing system determining a keyword of interest for an online meeting being presented via a user interface, determining that content of the online meeting corresponds to the keyword of interest, and causing, in response to the content of the online meeting corresponding to the keyword of interest, the user interface to output an indication that the content of the online meeting being presented is potentially of interest. Another disclosed method involves a computing system determining data indicative of a number of client devices, from a plurality of client devices participating in an online meeting, for which a user interface for the online meeting is presented in an active window, and causing, based at least in part on the data, a first client device, from the plurality of client devices, to output an indication that content of the online meeting being presented is potentially of interest.
A method comprises: determining, by a computing device, a potential for tasks of one or more applications not to be completed at a given time, the one or more applications being hosted on remote computing devices; initiating, by the computing device, a call to one or more application programmable interfaces (APIs) of the remote computing devices to retrieve data about the one or more tasks from the one or more applications, the tasks being generated by the one or more applications and including a time of completion being that of the given time; and initiating, by the computing device, an update to at least one of the one or more applications using the retrieved data, so that at least one of the generated tasks is completed before or at the given time.
A computing system (100) receives a first request to download a first file (104) to a client device (202). The computing system (100) further sends, based at least in part on the first request, a first digest of the first file (104) to the client device (202) to enable the client device (202) to compare the first digest with at least a second digest of a second file stored locally at the client device (202). The computing system (100) further receives, after sending the first digest to the client device (202), a second request to refrain from downloading the first file (104) to the client device (202).
Described embodiments provide systems and methods for performing actions based on data of devices. A controller executing on at least one server may receive a first dataset from a first agent of a first device intermediary between a first plurality of client devices and a first plurality of servers. The first dataset may comprise a subset of data tracked at the first device and available to the first agent. The controller may receive a second dataset from a second agent of a second device intermediary between a second plurality of client devices and a second plurality of servers. The second dataset may comprise a subset of data tracked at the second device and available to the second agent. According to the first dataset and the second dataset, the controller may send an instruction to at least one of the first device, the second device or a third device.
In accordance with one disclosed method, a determination may be made that a user has provided a first input to a client device to begin taking an action with respect to an application presented in a first window of an operating system while the first window is an active window of the operating system. It may then be determined that a second window has become the active window of the operating system, and that the user has not provided a second input to the client device to complete the action with respect to the application. Based at least in part on the second window having become the active window and the user not having provided the second input, the client device may be caused to present a notification indicative of the action being incomplete.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
Methods, systems, and computer-readable media for providing application hotspots on an endpoint device are presented. A computing device may provide an endpoint device with access to a remote application. The remote application may be hosted on the computing device and displayable on the endpoint device in a form of a user interface. The computing device determine an adjustment to the user interface based on coordinates of a feature of user interface and a screen size of the endpoint device. The computing device may provide data to the endpoint device to render the user interface thereon. The user interface may include an element different than the feature and configured to initiate the determined adjustment to the user interface.
A method of pushing a message notification to a message recipient comprises capturing a message that is sent to a message recipient. The method further comprises extracting a first set of one or more message keywords from the message. The method further comprises extracting a second set of one or more recipient keywords from one or more digital resources associated with the message recipient. The method further comprises evaluating a correspondence between the first set and the second set. The method further comprises pushing, to the message recipient, at a notification time, a notification of the message. The notification time depends on the evaluated correspondence.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
28.
SYSTEMS AND METHODS FOR INTELLIGENTLY AUGMENTING NEW TASK
In one aspect, an example methodology implementing the disclosed techniques can include, by a first computing device, receiving information regarding a new task to be performed by a user and extracting one or more keywords from the information regarding the new task. The method can also include, by the first computing device, identifying one or more resources relevant to the new task based on relevancy scores, a relevancy score for a resource indicative of the relevancy of the one or more keywords to the resource. The method can further include, by the first computing device, sending information regarding the one or more resources relevant to the new task to a second computing device, the second computing device configured to augment the new task with the information regarding the one or more resources relevant to the new task.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, responsive to a request for information regarding messages associated with a user and another user, a message associated with the user and the another user, the message sent or received via an application from a plurality of applications. The method can also include, by the computing device, identifying one or more other messages associated with the user and the another user based on metadata of the message, at least one of the one or more other messages sent or received via another application of the plurality of applications, the another application being different than the application. The method can further include, by the computing device, outputting information regarding the one or more other messages.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, receiving a summary of a task and determining, using one or more machine learning models, information relevant to the task based on the summary of the task. The method can also include, by the computing device, responsive to the determination of information relevant to the task, outputting the information relevant to the task for use in assigning the task.
A method and a computing device for accessing resources are provided. The computing device may receive a first request to access a resource, the resource being executable on one or more servers and including data to provision the resource to one or more client devices. The computing device may determine that a relationship between a user of a client device and the resource exists that enables provision of the resource to the client device with use of first credentials defined by an administrative entity of the computing device. Responsive to the determination, the computing device may initiate a second request to provide a user interface through which to access the resource. The computing device may provide the user with access to the user interface responsive to authentication of the user with use of second credentials different from the first credentials.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
32.
TELEPHONE CALL INFORMATION COLLECTION AND RETRIEVAL
Techniques are provided for telephone call information collection and retrieval. A receiver device receives a telephone call from a caller device. The receiver device collects information associated with the telephone call and stores the information in a memory. Subsequently, the receiver device displays, via a graphical user interface, the telephone number of the caller device. The receiver device receives, via the graphical user interface, a user selection of the telephone number of the caller. In response to the user selection, the receiver device displays, via the graphical user interface, the information stored in the memory, including, for example, the start and end times of the telephone call, the location (s) of the receiver device during the telephone call, and text representing the audio of the call (e.g., speech-to-text conversion of at least a portion of the audio).
A computer system configured to generate a user contact profile is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive, from a client device, a search request specifying a user contact; retrieve connection data involving the user contact from one or more collaboration services via one or more application programming interfaces (APIs); summarize the connection data to obtain a connection summary; retrieve, from a data store, usage data of one or more communication applications by the user contact; rank the usage data of the one or more communication applications to obtain a usage ranking; and send the connection summary and the usage ranking to the client device to be rendered.
H04M 1/2745 - Dispositifs dans lesquels plusieurs signaux peuvent être enregistrés simultanément avec possibilité d'emmagasiner plus d'un numéro d'abonné à la fois utilisant des mémoires électroniques statiques, p.ex. des puces électroniques
34.
COMPUTING DEVICE WITH LIVE BACKGROUND AND RELATED METHOD
A computing device includes an image sensor, an IMU, a display, and a processor coupled to the image sensor, the IMU, and the display. The processor is configured to generate a GUI current screen on the display. The GUI current screen includes a background, and foreground GUI elements overlaying the background. The processor is configured to when the IMU generates motion data indicative of movement, render the background to comprise a video image from the image sensor.
G09G 5/02 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation caractérisés par la manière dont la couleur est visualisée
G09G 5/00 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation
A method includes: receiving, by a computing device associated with a user, a video stream captured by a camera; detecting, by the computing device, persons appearing within a field of view of the camera based on analysis of the video stream; and in response to a determination that one or more persons other than the user appear within the field of view of the camera: providing, by the computing device, a modified video stream in which the one or more persons other than the user do not appear during display of the modified video stream.
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
36.
USER STATUS SYNCHRONIZATION AMONG WORKSPACE APPLICATIONS
A computing device configured to determine current user status information is provided. The computing device includes a computer readable memory, a network interface, and at least one processor operably coupled to the memory and the network interface. The at least one processor can be configured to receive, via the network interface from a first end-user application being of a first type, a first message specifying status information of a first user, process the status information of a first user to determine current user status information for the first user, generate a second message specifying the current user status information for the first user, and transmit the second message to a second end-user application being of a second type distinct from the type of the first end-user application such that at least one second user can review the current status information for the first user.
H04L 51/00 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel
37.
SYSTEM AND METHOD FOR DERIVING NETWORK ADDRESS SPACES AFFECTED BY SECURITY THREATS TO APPLY MITIGATIONS
Described embodiments provide systems and methods for generating a network space to perform mitigation actions on a plurality of users. At least one server may determine a plurality of users of one or more levels of riskiness in a network environment, and network locations of the users. Using a plurality of clustering features, the at least one server may generate a network space comprising a cluster of network locations corresponding to a subset of the users of at least a defined level of riskiness. The at least one server may perform a mitigation action on the subset of users corresponding to the generated network space.
According to some embodiments, a method includes: receiving, by a client device, speech of a user during a screen sharing session; transcribing, by the client device, the speech into text; analyzing, by the client device, the text to identify one or more UI elements referenced within the speech, the one or more UI elements visible within the screen sharing session; and highlighting the one or more UI elements visible on the client device.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, determining whether a user interface element having focus is a secure input and, responsive to a determination that the user interface element is a secure input, preventing the focus from changing away from the user interface element. The method also includes, by the computing device, responsive to a determination that the user interface element is a secure input, allowing the focus to change away from the user interface element in response to a determination that an input to the user interface element is complete. The method may further include, by the computing device, responsive to a determination that the user interface element is not a secure input, allowing the focus to be moved to another user interface element.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
40.
COMPUTING DEVICE WITH WINDOW DOCKING AND RELATED SYSTEMS AND METHODS
A computing device may include a display, and a processor coupled to the display and configured to generate a GUI current screen on the display. The GUI current screen may include a first window and a second window docked to the first window, the second window overlapping the first window. The processor may be configured to determine an interaction region in the first window based upon user input in the first window, determine a ratio of overlap between the first window and the second window, and resize the second window based upon the ratio of overlap and so that the second window does not overlap the interaction region.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
41.
CENTRALIZED RESOURCE MANAGEMENT FOR DISPARATE COMMUNICATION PLATFORMS
Methods, apparatuses, and systems for grouping topics for users from different communication platforms are described herein. For example, a computing device may receive, from a user and via a communication platform, a request for sending content associated with the communication platform to the computing device. The computing device may determine, based on the received request, one or more keywords from the content. In addition, the computing device may determine a topic based on the one or more keywords. In addition, the computing device may determine a similarity between the determined topic and one or more stored topics. The one or more stored topics may be associated with one or more additional users. Further, based on a determination that the similarity satisfies a threshold, the computing device may send, to the user, a message identifying the one or more additional users.
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
42.
AUTOMATED TRANSFER OF PERIPHERAL DEVICE OPERATIONS
Systems and techniques for automated transfer of peripheral device operations are described herein. In an example, a system may adapted so that, while a first device of a first type and a second device of the first type are simultaneously connected to a client device, the first device, rather than the second device, is used as an active device of the first type for at least one application, the first and second devices being peripheral devices. The system may be further adapted so that, while both the first and second devices remain connected to the client device, a switch from the first device to the second device by a user is determined, and, based on the switch from the first device to the second device, the second device, rather than the first device, is used as the active device of the first type for the at least one application.
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, splitting a content being displayed on a screen over time into a first plurality of frames and displaying on the screen the first plurality of frames in accordance with a frame rate. Each frame of the first plurality of frames can include a portion of the content such that a composite of the first plurality of frames shows the content. In some cases, the splitting of the content may include applying time decomposition to the content.
G06F 21/84 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs d’affichage, p.ex. écrans ou moniteurs
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04N 21/2347 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant le cryptage de flux vidéo
H04N 21/845 - Structuration du contenu, p.ex. décomposition du contenu en segments temporels
Methods and systems for improved and novel encryption that make it difficult or impossible in any practical way to extract data that has been protected on the computing system. A computing device may receive authentication data from a client device. The computing device may generate an encryption key and a corresponding decryption key. The computing device may receive, from the client device, information associated with a timed access window. The computing device may send, to the client device, the encryption key. The computing device may receive, from the client device, a request for the corresponding decryption key. The computing device may calculate that the request for the corresponding decryption key is during the timed access window and send, to the client device, based on the request and the calculation that the request for the corresponding decryption key is during the timed access window, the corresponding decryption key.
A method includes: receiving, by a first computing device, a request to collect a file from a plurality of users, the request sent by a second computing device; determining, by the first computing device, a plurality of applications from which the requested file can be accessed, each of the plurality of applications used by at least one of the plurality of users; collecting, by the first computing device, files from the plurality of applications; and sending, by the first computing device to the second computing device, a link to enable a user of the second computing device to access the files collected from the plurality of applications.
According to some embodiments, a method can include: collecting, by a first computing device, materials associated with a meeting; generating, by the first computing device, graph data for the meeting based on the collected materials, the graph data including representations of the collected materials and of relationships between the collected materials; and sending, by the first computing device, the graph data for the meeting to a second computing device, the second computing device configured to display a graph of the meeting using the graph data.
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
A computing device configured to provide recommended candidates for completion of an assigned task to a user assigning the task is provided. The computing device includes a memory, a user interface, and at least one processor coupled to the memory and the user interface. The at least one processor is configured to receive input specifying information regarding the task, determine one or more task specifics associated with the task from the task information, identify candidate value information regarding one or more candidates to complete the task, compare the one or more task specifics to the candidate value information regarding the one or more candidates to determine one or more match scores of the one or more candidates, organize a list of recommended candidates based upon the one or more match scores, and display, on the user interface, at least a portion of the list of recommended candidates.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A virtual environment (e.g., a virtual desktop or virtual application) may be configured to provide an option to share data that exists within the virtual environment. Upon selecting the option, a device that implements the virtual environment (e.g., a virtualization server) may send a sharing command to a client device that is accessing the virtual environment. The client device may receive the sharing command and detect one or more sharing mechanisms available via the client device (e.g., installed applications with a functionality for sharing data). The client device may then provide a list of sharing mechanisms to a user and receive a user selection of a sharing mechanism. The client device may then share the data with another device using the sharing mechanism selected by the user.
H04L 67/08 - Protocoles spécialement adaptés à l'émulation du terminal, p.ex. Telnet
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 16/176 - Support d’accès partagé aux fichiers; Support de partage de fichiers
A computing device configured to provide personal contact recommendations to a user of a messaging application is provided. The computing device includes a memory, a user interface, and at least one processor coupled to the memory and the user interface. The at least one processor is configured to monitor interactions between the user and the messaging application during a messaging session, determine one or more additional participants in the messaging session, determine a plurality of closeness values based upon the user and the one or more additional participants in the messaging session, determine one or more recommended contacts for the user based upon the plurality of closeness values, and display, on the user interface, an identifier of at least one of the one or more recommended contacts to the user during the messaging session.
The present disclosure is directed to a scalable, extensible, fault-tolerant system for stateful joining of two or more streams that are not fully synchronized, event ordering is not guaranteed, and certain events arrive a bit late. The system can ensure to combine the events or link the data in near real-time with low latency to mitigate impacts on downstream applications, such as ML models for determining suspicious behavior. Apart from combining events, the system can ensure to propagate the needed entities to other product streams or help in entity resolution. If any of the needed data is yet to arrive, a user can configure a few parameters to achieve desired eventual and attribute consistency. The architecture is designed to be agnostic of stream processing framework and can work well with both streaming and batch paths.
G06F 9/52 - Synchronisation de programmes; Exclusion mutuelle, p.ex. au moyen de sémaphores
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
According to some embodiments, a method can include: detecting, by a first computing device, activation of a text input of an application executing on the first computing device; and responsive to the detection of the activation of the text input, sending one or more attributes of the text input from the first computing device to a second computing device displaying the application, the second computing device configured to present a composition window having the one or more attributes in common with the text input of the application, the composition window being part of an input method editor (IME) executing on the second computing device.
H04L 15/16 - Appareils ou circuits à l'extrémité d'émission avec clavier coopérant avec des disques-code
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
52.
SYSTEMS AND METHODS FOR PROVIDING USER GUIDANCE VIA WORKSPACE SCORE
Described embodiments provide systems, methods, non-transitory computer-readable medium for generating a workspace score. The workspace score may be used to help a user make better use of applications on a remote workspace. The workspace score may be based on factors of user behavior. These factors may include such things as the immersion dimension, mature dimension, vendor preference dimension, discovery dimension, and others. These factors may monitor such things as the amount of features used in the remote workspace compared with the available features, the amount of applications used on a remote desktop workspace when compared with the amount of applications used on the local client device, and the amount of applications used by a preferred vendor, among others.
Systems and methods for establishing a multipath connection include a first processor of a first cluster forwarding a first request from a client to establish a first connection with a server to a second processor of a second cluster. A third processor of the first cluster receives a second request to establish a multipath connection between the client and the server. The third processor forwards the second request to the second processor responsive to determining that the second request is to establish a multipath connection. The second processor establishes the multipath connection that includes the first connection and a second connection used as paths of the multipath connection.
A method may include receiving, by a first computing system, a first message indicative of a rate at which a second computing system is requesting to make application programming interface (API) calls. The method may further include based at least in part on the first message, configuring the first computing system to enable the second computing system to use an access credential to make API calls at the rate. The method may also include sending, from the first computing system to the second computing system, the access credential.
Described embodiments provide systems, methods, non-transitory computer-readable medium for using a single sign-on (SSO) to access an application. A client application on a client device in communication with an identity provider and an application on a remote computing device. The client application can authenticate a user via an identity provider to establish an authentication session. The client application can identify a request to access a uniform resource locator (URL) of the application hosted on the remote computing device. The client application can determine that a configuration of the client application that identifies a remapped URL for the URL is available. The client application can access the remapped URL instead of the URL to cause the user to use the authentication session of the identity provider and be redirected from the identity provider to a link of the application on the remote computing device.
A computing device may include a memory and a processor configured to cooperate with the memory to receive a connection lease and a token from a client device, with the token being generated responsive to the client device completing multi-factor authentication (MFA) with a provider of MFA. The processor may further verify, responsive to unavailability of the provider of MFA, that the client device has previously performed MFA based upon the token, and connect the client device to a computing session with use of the connection lease and responsive to the verification that the client device has performed MFA.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
57.
HISTORY PREVIEW AND SHORTCUT TO RESTORE A WORK SCENE FOR A REMOTE APP
A computing system includes a computing device configured to select a remote app to be launched based on user input, and display a history record of the selected remote app. The history record provides a preview of items previously handled by the user with the remote app. One of the items is selected based on user input. An operation record server is configured to store app history data provided by the remote app corresponding to the items previously handled by the user with the remote app. The remote app is launched with the app history data associated with the selected item so that the remote app is restored back to the item previously handled by the user.
Described embodiments provide systems and methods for priority -based transport connection control. A first packet engine can read connection information of existing connections of a second packet engine written to a shared memory region by the second packet engine. The first packet engine can establish one or more virtual connections according to the connection information of existing connections of the second packet engine. Each of the first packet engine and the second packet engine can receive mirrored traffic data. The first packet engine can receive a first packet and determine that the first packet is associated with a virtual connection corresponding to an existing connection of the second packet engine. The first packet engine can drop the first packet responsive to the determination that the first packet is associated with the virtual connection.
H04L 65/1069 - Gestion de session Établissement ou terminaison d'une session
H04L 47/726 - Réservations de ressources sur plusieurs routes utilisées simultanément
H04L 65/80 - Dispositions, protocoles ou services dans les réseaux de communication de paquets de données pour prendre en charge les applications en temps réel en répondant à la qualité des services [QoS]
59.
CONTEXT-BASED PRESENTATION OF AVAILABLE MICROAPP ACTIONS
One disclosed method involves receiving, by an application associated with a client device and from a computing system, a plurality of indicators of actions that the computing system is configured to take with respect to systems of record in response to user input to the client device; determining first data indicative of a state of the client device; selecting, by the application and based at least in part on the first data, a subset of the plurality of indicators; and causing the client device to present one or more selectable user interface elements corresponding to the selected subset of the plurality of indicators such that selection of the one or more selectable user interface elements enables the client device to cause the computing system to take the indicated actions with respect to the systems of record.
One disclosed method involves accessing, by a computing system and using access credentials associated with a user, data associated with systems of record, generating, by the computing system, a plurality of notifications of events indicated by the data, determining, by the computing system, that the user selected at least one keyword, determining, by the computing system, that a first notification of the plurality of notifications relates to the at least one keyword, and causing, by the computing system and based at least in part on the first notification relating to the at least one keyword, a client device operated by the user to present the first notification.
A technique for distributed electronic signature processing includes displaying a document for signature on a first device along with an optically-readable code. A second device scans the optically-readable code displayed by the first device, initiating a process that transfers signature entry from the first device to the second device, which may receive handwritten signatures input or otherwise provided thereon. The second device then accepts the physical signature, which is used to effectuate a signing of the document.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p.ex. sous forme de gestes ou de texte
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to evaluate a risk associated with an email attachment based on application of security policies to properties of the attachment and to the context associated with receipt of the email. The at least one processor is further configured to detect an attempt by a user to open the email attachment. The at least one processor is further configured to prevent the opening of the attachment based on the evaluated risk. The at least one processor is further configured to redirect the attachment to a secure browser, hosted on a remote server, based on the evaluated risk.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
A method for controlling a virtual meeting includes receiving a meeting template including at least one rule. The rule or rules associated with the meeting template define a first time period relating a first virtual meeting session of a first endpoint computing device and a second time period relating to a second virtual meeting session of a second endpoint computing device. The method further includes causing, responsive to the rule (s), a first audio mute/unmute action to occur in the first virtual meeting session at or prior to an expiration of the first time period. The method further includes causing a second audio mute/unmute action to occur in the second virtual meeting session at or prior to a start of the second time period, where the second time period is different from with the first time period.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G07C 1/10 - Enregistrement ou indication de l'heure d'un événement ou d'un temps écoulé, p.ex. horodateurs pour la main-d'œuvre combinés avec l'enregistrement ou l'indication d'autres données, p.ex. de signes d'identification
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to detect a request for a sign-up form from a client device to a remote server. The at least one processor is further configured to generate a code module based on the detection. The code module is configured to request a credential vulnerability check from an application management server. The at least one processor is further configured to provide the code module to the client device for execution on the client device in response to an attempted submission of the sign-up form. The at least one processor is further configured to receive a result of the credential vulnerability check from the client device and perform a security action in response to the credential vulnerability check indicating vulnerable credentials.
Systems and methods for autonomous program management include a device which receives a request from a client responsive to execution of a script on the client. The request may include a location corresponding to the script and an identifier. The device may determine that activity of the client is activity of an autonomous program based on a comparison of the location to a reference being generated by the device for the client and determined using the identifier from the request. The device may block a subsequent request from the client to a server responsive to the determination.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
H04L 47/10 - Commande de flux; Commande de la congestion
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
A computing device includes a display, and a browser to access applications for display in a browser window. Each application is associated with a respective browser tab within the browser window. A processor is coupled to the display to display content from an application associated with a selected browser tab, and to classify the selected browser tab. The processor enables app protection to selectively block screenshots of the displayed content based on the classification of the selected browser tab.
G06F 21/54 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
67.
SYSTEMS AND METHODS FOR ROUTING REMOTE APPLICATION DATA
Described embodiments provide for routing remote application data. A device can receive a request to access an application. The application can be provided by data centers and accessible via service providers. The device can select a data center from the plurality of data centers and a service provider based at least on a metric indicative of a connection between the data center and the service provider. The device can query a database including one or more connection metrics using the application identified in the request and a location of a router transmitting the request. The device can determine the location of the router based on an internet protocol (IP) address of a client communicably coupled to the router. The device can transmit a response to the request identifying the selected data center and the selected service provider.
H04L 67/52 - Services réseau spécialement adaptés à l'emplacement du terminal utilisateur
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/1025 - Adaptation dynamique des critères sur lesquels repose la sélection du serveur
H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
H04L 67/1029 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués en utilisant des données liées à l'état des serveurs par un répartiteur de charge
Methods and systems for application virtualization are described herein. The system may provide a plurality of endpoint devices with access to an application. The application may be hosted by a computing device and configured to run on a mobile computing device. The computing device may determine instructions to execute the application for different endpoint devices of the plurality based on information about the plurality of endpoint devices. The computing device may modify output from execution of the determined instructions into graphics data and may provide the graphics data to at least one of the plurality of endpoint devices to enable that endpoint device to render a user interface in which to access the application.
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Methods and systems for transparent user-interfaces are described herein. A computing device may generate an overlay that includes content of an application executable on a computing device. The overlay may be operative in a first mode and a second mode. The first mode may be configured to enable input received on the overlay to initiate operations of another application, and the second mode may be configured to initiate operations of the application included within the overlay in response to input received thereon. The computing device may provide the overlay on top of a window of the other application within a user interface of the computing device to display the overlay in a transparent fashion. The computing device may execute the overlay in the first mode so that receipt of input on the overlay causes the other application to perform an operation.
Methods, apparatuses, and systems for secure data input mechanisms are described herein. An example method comprises monitoring a user interface presented on a display of a mobile device, identifying an input field of the application shown within the display, and adjusting operation of the mobile device in response to entry of data within the input field, the adjusting operation occurring via an input method, the input method changing at least one characteristic of the mobile device indicative of entry of data with use of the mobile device, so as to prevent acquisition of the data by a malicious application installed on the mobile device.
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
G06F 21/83 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs de saisie de données, p.ex. claviers, souris ou commandes desdits claviers ou souris
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
71.
ENABLING MICROAPP ACCESS BASED ON DETERMINED APPLICATION STATES AND USER-INITIATED TRIGGERING EVENTS
One disclosed method involves receiving, by a first application managed by an operating system, first data indicating that a second application managed by the operating system is in a first state; receiving, by the first application, second data indicating that a first user input has been provided to a client device; determining, by the first application and based at least in part on the first data and the second data, that the first user input occurred while the second application was in the first state; and causing, by the first application and based at least in part on the first user input having occurred while the second application was in the first state, the client device to present a first user interface for a third application, the first user interface configured to cause the third application to take a first action with respect to a fourth application in response to a second user input to the client device.
Reducing vulnerability to a server is provided. A device intermediary to a client and a server can receive a RPC message from the RPC based client to the RPC based server, the RPC message having a plurality of fields to execute one or more routines on the server. The device can detect that one or more fields of the plurality of fields exploits a vulnerability of the RPC based server. The device can modify the RPC message to remove the one or more fields from the RPC message. The device can forward the modified RPC message to the RPC server.
Methods and systems for enabling interaction with physical display devices in an extended reality (XR) environment are described herein. A computing device may send, to an XR device, XR environment information for display of an XR environment on a display of an XR device. The computing device may receive one or more images originating from one or more cameras of the XR device. For example, the one or more images might be of a physical environment around the XR device. The computing device may detect one or more portions of a display device depicted in the one or more images. The display device may display content from a second computing device. The computing device may detect input, in the XR environment, associated with the content and transmit that input to the second computing device. Such input might comprise, for example, gestures.
G06F 1/16 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES - Détails non couverts par les groupes et - Détails ou dispositions de structure
G06F 3/03 - Dispositions pour convertir sous forme codée la position ou le déplacement d'un élément
G06F 3/0346 - Dispositifs de pointage déplacés ou positionnés par l'utilisateur; Leurs accessoires avec détection de l’orientation ou du mouvement libre du dispositif dans un espace en trois dimensions [3D], p.ex. souris 3D, dispositifs de pointage à six degrés de liberté [6-DOF] utilisant des capteurs gyroscopiques, accéléromètres ou d’inclinaiso
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G08C 17/02 - Dispositions pour transmettre des signaux caractérisées par l'utilisation d'une voie électrique sans fil utilisant une voie radio
In accordance with one disclosed method, a client device may be caused to present a user interface for an application, the user interface enabling selective access to a plurality of resources via the client device. A state of a peripheral device that is connectable to the client device may be determined and, based at least in part on the state of the peripheral device, at least a first resource, from among the plurality of resources, may be identified with which the peripheral device can interact. Based at least in part on the identifying of the first resource, the user interface may be caused to include at least a first selectable user interface element that, when selected, causes the client device to access to the first resource so as to enable the peripheral device to interact with the first resource.
A method of casting a source device display screen to a target device includes, by an application on the source device, storing information about the target device in a shared memory and issuing a request to an operating system to initiate capturing and casting for the source device display screen. The operating system responds to the request by launching a casting extension and supplying a content stream containing content of the source device display screen. Upon being launched, the casting extension (1) obtains the information about the target device from the shared memory and uses the information to establish a display connection with the target device, and (2) forwards the content stream to the target device on the display connection.
A method includes: receiving, by a computing device, data about one or more applications associated with users of a group, the group being one in which to share information amongst the users; identifying, by the computing device, an application common to at least a subset of users of the group based on the received data; and providing, by the computing device, settings to a client device (504) of another user outside the subset of users, the client device (504) to apply the settings to enable the another user to access the application in common with use of the client device (504).
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p.ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
Described embodiments provide systems, methods, non-transitory computer-readable medium for initiating one-factor or multi-factor authentication. A device comprising one or more processors and coupled to memory. The device can receive a request to authenticate a user to enable access to an application by the user. The request can originate from an Internet Protocol (IP) address external to a network hosting the application. The device can determine that a previous request to authenticate the user originated from the IP address and was approved based on successful completion of multi-factor authentication by the user. The device can provide, responsive to the determination, the user with access to the application using one-factor authentication instead of the multi-factor authentication.
Systems and methods of reconstructing execution call flows to detect anomalies is provided. A device can establish call flows using information extracted from a log file to. Each of the call flows can identify information from the log file of a call flowing through a plurality of modules. The device can identify a count of a number of occurrences of one or more keywords in information of each call flow. The device can generate a vector of numbers for each call flow based at least on the count for the one or more keywords for that call flow. The device can classify each call flow into one or more clusters that indicate whether an operation of the call flow is anomalous. The device can classify each call flow using the vector of numbers for each call flow.
H04L 47/2441 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS en s'appuyant sur la classification des flux, p.ex. en utilisant des services intégrés [IntServ]
A method includes, by a computing device, responsive to initiation of an application of the computing device, a display of which including a virtual keyboard, detecting, by the computing device, an input on a shortcut key of the virtual keyboard. The method also includes, by the computing device, translating the shortcut key into one or more keystrokes based on a configuration file for that short key and providing the one or more keystrokes to the application to execute a function of the shortcut key in response to the detected input.
Methods, apparatuses, and systems for intention based search techniques are described herein. An example method comprises receiving data indicative of an intent of a user to perform an action via at least one application, the data comprising a description of the action that is input via a client device application on a client device, identifying, by the computing device, the at least one application based on a comparison of the description of the action and one or more records, the one or more records being indicative of prior intents of one or more users to perform actions and indicative of at least one selection by the one or more users to perform the actions with a selected application, and providing, by the computing device, output to the client device to enable performance of the action via the at least one application.
A computing device may include a memory and a processor configured to cooperate with the memory to run a browser configured to perform a sequence to obtain an asset and display a user interface for launching a virtual session using the asset. The processor may further run code configured to determine a failure of the browser to complete the sequence, and cause the browser to display the user interface for launching the virtual session using a previously cached version of the asset responsive to the failure of the browser to complete the sequence.
Methods and systems for rotating elements displayed by computing devices are described herein. At least one image of a user of a computing device may be captured by a camera of the computing device. An angle of the eyes of the user with respect to the computing device may be determined. Based on that determined angle, at least one element of content displayed by the computing device may be rotated so as to allow for display of that element in an orientation consumable by the user. For example, the element might be rotated at an angle corresponding to the angle of the eyes of the user with respect to the orientation of the computing device.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
83.
SYSTEMS AND METHODS OF PREDICTING MICROAPP USER ENGAGEMENT
A computer system including a memory, a network interface, and a processor is provided. The processor is configured to receive, via the network interface, one or more design attributes of a microapp from a microapp development tool hosted by an endpoint device, the one or more design attributes comprising an identifier of a system of record configured to supply data to the microapp; execute a machine learning process trained, using data regarding microapp usage within an organization, to predict at least one user engagement metric for the microapp based on the one or more design attributes; and transmit, via the network interface, the at least one user engagement metric to the microapp development tool hosted by the endpoint device.
G06F 8/10 - Analyse des exigences; Techniques de spécification
G06Q 90/00 - Systèmes ou méthodes spécialement adaptés à des fins administratives, commerciales, financières, de gestion ou de surveillance, n'impliquant pas de traitement significatif de données
G06F 30/27 - Optimisation, vérification ou simulation de l’objet conçu utilisant l’apprentissage automatique, p.ex. l’intelligence artificielle, les réseaux neuronaux, les machines à support de vecteur [MSV] ou l’apprentissage d’un modèle
84.
SYSTEMS AND METHODS TO IMPLEMENT MICROAPPS IN DIGITAL WORKSPACES
Described embodiments provide systems and methods for enhancing user engagement with micro applications. A computing device can include one or more processors and memory. The computing device can receive an indication of an action to be completed with use of a micro application. The computing device can be in communication with a client device and one or more computing systems of record to execute the micro application. The computing device can values for one or more attributes of the micro application. The computing device can generate, based on the identified values, a score for the micro application. The computing device can provide the score to the client device for display within a user interface. The user interface can be configured to initiate the action with use of the micro application.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A system and method that detects malicious account creation in a web-based platform. A method includes detecting suspicious events associated with an account creation process using a username classifier that evaluates a username used to create a new account, an IP address classifier that evaluates an IP address used to create the new account, and a domain classifier that evaluates a domain from an email address used to create the new account; analyzing each detected suspicious event with a density analysis classifier to determine if each detected suspicious event comprises a malicious event based on a density of detected suspicious events from a collections of account creation processes; and determining an alert condition based on at least one malicious event detection.
G06F 21/50 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
86.
SYSTEM AND METHOD FOR FULLY AUTONOMOUS USER BEHAVIOR BASED SECURITY TESTING
A system and method for identifying vulnerabilities in a security information and event management (SIEM) system. A method includes: initializing a security testing agent with a goal and a reinforcement learning model, wherein the model defines states indicative of progress towards the goal, a set of actions that can be taken by a legitimate user within a target environment, and reward values associated with taking a specified action in a specified state; and learning a policy to achieve the goal within the target environment, wherein learning: selects and takes a target action from the set of actions for a current state; monitors for an alert triggered in response to the target action being taken; receives a reward value associated with the target action and current state; calculates updated reward value in the model; and in response to the process not being terminated, repeats the process for a next state.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A computing appliance may include a memory and a processor configured to cooperate with the memory to establish a first virtual session for an endpoint device over a first network connection. The endpoint device may have an endpoint public/private key pair associated therewith and configured to store a plurality of connection leases generated based upon the endpoint public key, and the first virtual session may be established responsive to a first one of the connection leases and authentication based upon the endpoint private key. The processor may further establish a second virtual session for the endpoint device to access through the first virtual session with another computing appliance over a second network connection responsive to a second one of the connection leases and authentication based upon the endpoint private key.
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to provide phishing attack protection based on identity provider verification. The at least one processor is further configured to capture an image of a browser web page to which the user has navigated and identify the domain name associated with the browser web page. The at least one processor is further configured to determine that the captured image matches an image of a known identity provider web page. The at least one processor is further configured to detect a phishing attempt in response to the determination that the images match and that the domain name associated with the browser web page differs from the domain name associated with the identity provider web page.
A method is provided for converting a single database query into multiple database queries for multiple databases and aggregating the results of each of the queries. The method includes receiving, from a calling device, an input database query including a selection set defining an aggregation key, at least one first field to be queried in a first database, and at least one second field to be queried in a second database, generating a first database query representing a first request to retrieve the at least one first field from the first database, generating a second database query representing a second request to retrieve the at least one second field from the second database, aggregating the first response and a second response to the second database query from the first database to produce an aggregated response, and providing the aggregated response to the calling device.
Managing performance of elements providing a session via a multi-hop network topology is provided. A system receives values for factors associated with elements that form hops in a multi-hop network topology. The system determines a performance metric for each hop using the values for one or more factors selected from the factors. The system identifies a hop of the hops as having a performance issue based on the performance metric for the hop exceeding a threshold. The system selects, responsive to the performance metric of the hop exceeding the threshold, an action to take on at least one element forming the hop.
H04W 40/04 - Sélection d'itinéraire ou de voie de communication, p.ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base des ressources nodales sans fil
H04W 84/18 - Réseaux auto-organisés, p.ex. réseaux ad hoc ou réseaux de détection
91.
SESSIONLESS VALIDATION OF CLIENT CONNECTIONS WHILE MITIGATING COOKIE HIJACK ATTACKS
Described embodiments provide systems and methods for validating connections while mitigating cookie hijack attacks. A device intermediary between a client and a server can receive a request from the client to establish a connection. The device may send a cookie to the client, the cookie generated according to a connection identifier and a shared counter. The device may receive a response from the client that includes a client validation cookie for validating the request. The client validation cookie may be generated according to the cookie. The device may determine a candidate validation cookie according to a value of a counter range of the shared counter, that matches the client validation cookie. The device may validate the request responsive to the determination.
A method can include: receiving, by a first computing device, information about a meeting that a user is scheduled to attend; retrieving, by the first computing device, a plurality of messages sent to the user in one or more applications; analyzing, by the first computing device, the plurality of messages to identify one or more messages relevant to the meeting based on contents of the messages and the information received about the meeting; and sending, by the first computing device, the relevant messages to a second computing device, the second computing device configured to display the relevant messages to the user.
A system to identify automated submissions of web pages, such as those submitted by bots, in real time. The system comprising a processor configured to update an initial version of a requested web page with at least one hidden field, transmit the updated web page to the client, then, upon receipt parse the completed web page, and identify if a data entry is associated with the at least one hidden field. Where a data entry is associated with the at least one hidden field, the system blocks the transmission of the completed web page to the server. Where a data entry is not associated with the at least one hidden field the system removes the at least one hidden field, and transmits the final web page to the server.
System and methods discussed for automatically optimizing application and notification delivery based on user preferences and historical application usage. Applications that a user is likely to want to use at the present time or in the near future are displayed in an organizationally distinct way in an application catalog so they are easy to find and are pre-loaded on an application delivery server so they are available with minimal system lag caused by application loading processes. Application notifications are also optimized such that notifications that are likely to be relevant to users at the current time are identified and presented to them in an organizationally distinct way.
A computing device configure to automatically generate responses to user-submitted requests is provided. The device includes a computer readable medium and a processor. The processor can be configured to perform, for example, a virtual assistant that is configured to monitor virtual assistant communications and receive a user-submitted request for additional information from a client device. In some examples, the request is submitted via a virtual assistant. The virtual assistant can be configured to process the user-submitted request to determine one or more keywords and compare the one or more keywords against at least one data set associated with the knowledge base data structure to determine at least one response to the user-submitted request. Based upon the determination of at least one response to the user-submitted request, the virtual assistant monitor can be further configured to generate a reply to the user-submitted request and transmit the reply to the client device.
A backend computing system may receive first data from a first computing system, where the first data may be an encrypted version of second data that has been generated at the first computing system based on a command at the first computing system. The backend computing system may identify a second computing system different than the first computing system based on a status of the second computing system, and may send the first data to the second computing system to enable the second computing system to decrypt the first data and perform a function with respect to the second data. In some embodiments, the first computing system may generate padded data by adding data to the second data, and send the padded data to the backend computing system. In some embodiments, the first computing system may send random data to the backend computing system.
A computing system may receive at least first data (114) indicative of a first event of a first system of record accessed using first access credentials associated with a user, determine (602), based at least in part on first stored contextual data associated with the user, to create (104) at least a first notification of the first event based at least in part on the first data, and send the first notification to a client device operated by the user.
A computer system is provided. The computer system includes a memory, a network interface, and at least one processor coupled to the memory and the network interface. The at least one processor is configured to receive, via the network interface, a signed response to a challenge, verify the signed response using a public key associated with a mobile computing device, and log a user account associated with the public key into an application in response to verification of the signed response, thereby allowing access to the application.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
99.
COMPUTING DEVICE AND ASSOCIATED METHODS PROVIDING BROWSER LAUNCHING OF VIRTUAL SESSIONS IN AN APPLICATION
A computing device may include a memory and a processor configured to cooperate with the memory to run a browser configured to generate a user interface to display a virtual session from a host computing device, and an application configured to establish a connection with the host computing device. The processor may further run code configured to cause the browser to connect with the host computing device using the connection established by the application to display the virtual session within the user interface.
A system and method for securely encrypting and booting a headless appliance. A computerized method is disclosed that includes: providing the network appliance with content encrypted with a secret key; launching the network appliance in a fallback configuration that provides limited operational capabilities; forwarding a request for the secret key to an online service that independently utilizes an identity provider to establish trust with an appliance administrator; receiving the secret key from the online service upon establishment of trust with the appliance administrator; decrypting the content with the secret key received from the online service; and utilizing the content to launch the network appliance in a full configuration.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès