Methods and apparatus for managing groups are described herein. A group management service may centrally manage a plurality of applications such that group information in the plurality of applications may stay up to date with changes in the group information. The group management service may monitor/receive different types of messages from different classes of users (e.g., a group member, a group creator/owner, a system administrator, etc. ) and may synchronize, based on the messages, the group information across the plurality of applications. A group member may send, to the group management service and via an application, a message (e.g., quit membership from a group) for changes in the group information. A system administrator may send, to the group management service and via a graphical user interface, a message (e.g., cancel/add a member of a group, create a new group, etc. ) for changes in the group information.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
In some disclosed embodiments, a computing device may determine that a script identifies first pixel data and at least one first action associated with the first pixel data, and determine that first pixels being displayed on a screen of the computing device correspond to the first pixel data identified in the script. Based at least in part on the first pixels corresponding to the first pixel data and the at least one first action being associated with the first pixel data in the script, the computing device may take the at least one first action at first coordinates corresponding to a first location on the screen at which of the first pixels are being displayed.
Methods and systems for implementing on-demand virtual secure session are described herein. A computing device may monitor a virtual desktop accessible from an endpoint device. The computing device may detect a user selection of an application and generate a snapshot image indicating a state of the virtual desktop. The computing device may initiate an on-demand virtual secure session. The computing device may provide the endpoint device with access to a remote application. The computing device may detect a user indication to stop execution of the remote application. Accordingly, the computing device may terminate the on-demand virtual secure session and restore the virtual desktop.
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A method of using multiple audio streams to enhance an audio output is provided. A plurality of computing devices can elect one of the plurality of devices as a leader device. A first follower device of the plurality of computing devices can send a first audio stream to the leader device. The leader device can process the first audio stream to obtain an output. The leader device can send the output to a second device. A remote device can play an enhanced audio stream based on the output, wherein the enhanced audio stream comprises an echo enhanced audio stream and/or a positionally enhanced audio stream.
Methods and systems for selective presentation of sensitive information are described herein. A computing system may receive, from a cloud computing platform, a history protection extension. The computing system may install the history protection extension, which may cause the computing system to selectively display sensitive information based on whether or not the computing system is connected to a secure network. The computing system may identify, using the history protection extension, that the computing system is currently operating on the secure network. The computing system may intercept a URL access request. The computing system may compare a domain of the URL access request to a protection domain list. Based on identifying that the domain of the URL is included on the protection domain list, the computing system may launch the URL in a secure browser, and display, within the secure browser and based on a history data list, the sensitive information.
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
Methods and systems for sharing content is described herein. Based on receiving input associated with sharing portions of content displayed on a presenter screen, shared content data associated with sharing the portions of content may be generated. Based on the shared content data, a shared content indicator may be updated to indicate the portions of content to share. A screen capture based on the presenter screen may be generated. Screen data including the portions of content and a mask that covers regions of the screen capture that are not occupied by the portions of content may be generated. Furthermore, the computing device may send the screen data to remote computing devices that are configured to generate audience screens based on the screen data.
A computing device may include a memory and a processor cooperating with the memory to run a program, receive a first sequence of inputs from at least one input device for the program, and learn a relationship between an action performed by the program and the first sequence of inputs. The processor may be further configured to access a remote virtual computing session in which the action is performed responsive to a second sequence of inputs different than the first sequence of inputs, and upon receipt of the first sequence of inputs from the at least one input device while accessing the remote virtual computing session, cause the virtual computing device to perform the action based upon the learned relationship.
An example methodology implementing the disclosed techniques can include, by a computing device, collecting information about tasks scheduled for a user in a time period, the time period being later than a current time, and determining a battery-operated device associated with one of the tasks. The method can also include determining a length of time the battery-operated device will be powered on during the time period based on the information collected about the tasks and computing a required battery level for the battery-operated device based on the length of time the battery-operated device will be powered on during the time period and an energy consumption rate of the battery-operated device. The method can also include, responsive to a determination that an actual battery level of the battery-operated device is less than the required battery level, providing a notification of a need to charge the battery-operated device.
The present solution provides systems and methods for generating and serving web pages to a client in response to invalid URL requests. The present solution can include an echo server that receives, from a web server, an indication of an incorrect request from a client device being received by web server. The echo server can establishing a second web page based at least on a web page selected from the web server. The echo server can provide content of the second web page based at least on one or more parameters of the uniform resource location (URL) of the incorrect request. The echo server can provide the second web page to the web server to cause the web server to provide the second web page in response to the incorrect request to the client device instead of an error code.
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p.ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
G06F 11/00 - Détection d'erreurs; Correction d'erreurs; Contrôle de fonctionnement
10.
ADAPTIVE NETWORK PATH SELECTION FOR VIRTUAL MEETING OPTIMIZATION
Methods and apparatus for improving performance in a virtual meeting session in a distributed workspace system. One example includes transmitting media data for the virtual meeting session over an active network connection between first and second computing devices, determining a first quality score for the active network connection based on parameter(s) associated with the active network connection, periodically transmitting test data over a standby network connection between the first and second computing devices, determining a second quality score for the standby network connection based on parameter(s) associated with the standby network connection, based on the second quality score exceeding the first quality score by a first threshold, determining standby network quality based on latency conditions associated with the standby network connection, and if the standby network quality exceeds a second threshold, switching the active and standby network connections and transmitting the media data over the new active network connection.
Methods and systems for presenting content are described herein. A computing device may receive, from a first client device, first data associated with a first webpage being displayed in a first web browser on the first client device. The computing device may generate, based on the first data, a read-only webpage corresponding to the first webpage. The computing device may send second data that is configured to enable rendering, in a second web browser on the second client device, the first read-only webpage, so that content in the first webpage is shared between the first client device and the second device. In this way, the content may be shared dynamically among different users.
One disclosed method involves (A) displaying a first web page retrieved using a first URL, the first web page including at least a first UI element, (B) in response to a user providing a first input corresponding to the first UI element, storing first data representing the first URL and second data identifying the first UI element, (C) in response to the user providing a second input corresponding to the first UI element, retrieving a second web page using a second URL associated with the first UI element, the second web page including at least a second UI element, and (D) generating a sharable record including at least the first data and the second data, the sharable record being configured to be accessed by a browser to identify the first UI element on the first web page.
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
13.
SWITCH BETWEEN MULTIPLE SCREENS BY DETECTING CURSOR MOVEMENT
A computing system includes a client computing device and a cloud management platform. The client computing device includes a plurality of screens, with each screen having at least one session displayed therein. Each session has a boundary area associated therewith. A cursor monitor agent within the client computing device monitors movement of the cursor in the boundary area of the session having the cursor therein. The cloud management platform includes a cursor analysis service to analyze movement of the cursor within the boundary area to determine if a movement parameter is met indicating that a user intends to switch to a different session. The cursor monitor agent displays an options menu within the session having the cursor therein in response to the movement parameter having been met. The options menu provides options for the user to switch to the different session.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
14.
COMPUTING DEVICE AND METHODS PROVIDING VIRTUAL COMPUTING SESSION VOLUME ADJUSTMENT FEATURES
A computing device may include a memory and a processor cooperating with the memory to provide at least one client device with access to a virtual computing session having a session volume level associated therewith, and receive audio playback data from the at least one client device including an audio device type and a background noise level associated with the at least one client device. The processor may further change the session volume level responsive to the received audio playback data and historical session volume levels for corresponding background noise levels and audio device types associated with the at least one client device.
Systems and methods for identifying scripts by coding style. A system (240) can include one or more processors, coupled to memory. The system (240) can identify a script (1205) for execution by a computing device (230) of an entity. The system (240) can determine, via a model trained with machine learning based on a plurality of scripts established by a plurality of entities, a classification of the script prior to execution of the script by the computing device (230). The system (240) can control execution (1215) of the script responsive to the classification of the script.
In accordance with one disclosed method, a first application (A) determines that a first operating system received a first input indicating that first data of a second application is to be copied to a first clipboard associated with the first operating system, (B) determines that the second application is associated with a second clipboard, (C) instructs the first operating system to refrain from transferring the first data to the first clipboard, (D) receives the first data from the first operating system, and (E) transfers the first data to the second clipboard.
One disclosed method involves detecting a request to download a file, via a network, to a first storage medium associated with a client device, and determining that the file is potentially sensitive. The method further involves initiating a process to download the file to a second storage medium rather than the first storage medium based at least in part on the file being potentially sensitive.
The present solution provides systems and methods for a GSLB service to access a first, plurality of measurements of network latency between a plurality of access-points and the first client device and a second plurality of measurements of network latency between the plurality of access-points and one or more of data centers. The GSLB service can receive, from the one or more data centers, health of an application deployed across the one or more data centers. The GSLB service can determine, according to the first plurality of measurements, the second plurality of measurements and the health of the application, a first data center of the one or more data centers and a first access-point of the plurality of access-points. The GSLB service can send, to the first client device, a domain name system (DNS) response identifying the first access-point and the first data center.
H04L 67/101 - Sélection du serveur pour la répartition de charge basée sur les conditions du réseau
H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p.ex. la mémoire disponible ou la charge de travail
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
In one aspect, an example methodology implementing the disclosed techniques may include, by a first computing device, detecting a text input to a user interface (UI) element of an application executing on the first computing device and, responsive to the detection of the text input, sending a request for text candidates associated with the text input to a second computing device. The method may also include, responsive to sending the request, receiving, by the first computing device from the second computing device, a list of one or more text candidates associated with the text input. The method may further include presenting, by the first computing device, the list of one or more text candidates in a composition window, the composition window being part of an input method editor (IME) executing on the first computing device, the composition window displayed on a screen of the first computing device.
G06F 3/023 - Dispositions pour convertir sous une forme codée des éléments d'information discrets, p.ex. dispositions pour interpréter des codes générés par le clavier comme codes alphanumériques, comme codes d'opérande ou comme codes d'instruction
In one aspect, an example methodology implementing the disclosed techniques may include, by a first computing device hosting an application that is being executed on a second computing device, detecting a start of a password input to the application, wherein the password input occurs during a session for sharing a screen of the second computing device. The method may also include, responsive to the detection, sending, by the first computing device to the second computing device, a notification to suspend the sharing of the screen of the second computing device. The application may be a virtual application. The second computing device may be a mobile device.
Device access control can be implemented on a protected device to determine, based on a user input to the device, that a timeout threshold has been exceeded and to cause, in response to determining that the timeout threshold has been exceeded, an application graphical user interface (GUI) on the device to remove or blank content, such as text, images, or graphics, from the application window. The removal or blanking of the content can be performed on a window-by-window basis; that is, content is removed only from application windows of applications that are protected by an associated application protection policy. In some examples, the application protection policy can be established by an administrator of a digital workspace within which the protected application executes. Such a digital workspace can be implemented via a type of virtual processing environment that can be accessed via client computing devices.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, identifying a task from a plurality of tasks that need to be scheduled and determining other tasks associated with participants associated with the task. The method may also include, by the computing device, determining one or more periods of time when the participants associated with the task are unavailable and determining one or more candidate time slots for the task based on time slots for which the other tasks are scheduled and the one or more periods of time when the participants associated with the task are unavailable. The method may further include, by the computing device, scheduling the task to be performed during one of the determined one or more candidate time slots.
Systems and methods for inactivity logoff adjustment based on scheduled events are provided. A device can include one or more processors, coupled to memory. The device can detect a condition to terminate, at a first timestamp, a computing session established by the one or more processors. The device can identify, responsive to detection of the condition and prior to termination of the computing session, an event for execution in the computing session at a second timestamp subsequent to the first timestamp. The device can provide, based on a difference between the second timestamp and the first timestamp less than or equal to a threshold, a user interface element configured to extend the computing session to at least the second timestamp.
A methodology implementing the disclosed techniques can include, by a computing device, receiving input events from a remote computing device, ones of the input events having an input event position associated with a position on a screen of the computing device being shared during a screen sharing session and, responsive to a determination that a first input event position of a first one of the input events is within a protected region of the shared screen, preventing the first one of the input events from being applied to the shared screen. The method can also include, by the computing device, responsive to a determination that a second input event position of a second one of the input events is not within the protected region of the shared screen, applying the second one of the input events to the shared screen.
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
G06F 3/14 - Sortie numérique vers un dispositif de visualisation
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
In some embodiments, a method can include: receiving, by a computing device, a plurality of messages, where at least a first one of the plurality of messages is associated with a first application and at least a second one of the plurality of messages is associated with a second application different from the first; receiving, by the computing device, information about one or more scheduled meetings; determining, by the computing device, one or more of the plurality of messages that are associated with a first meeting of the one or more scheduled meetings; and sending, by the computing device, information about the associations of the one or more of the plurality of messages and the first meeting to another computing device to enable the another computing device to display a list of the one or more of the plurality of messages in conjunction with the first meeting.
A method includes: receiving, by a computing device, information about a task of application (902), the task associated with a project; receiving, by the computing device, information about other tasks of the application including other tasks that have been completed and other tasks that have not been completed (904); calculating, by the computing device, a start date and an expected effort for the task based on analysis of the information received for the task and the other tasks (906); and causing, by the computing device, an update within the application to apply the calculated start date and expected effort to the task (908).
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
Systems and methods for a POP recommendation engine include one or more processors which may identify one or more cloud platforms selected from a plurality of cloud platforms for which to rank one or more points of presence (POP) of a plurality of POPs provided by each of the one or more cloud platforms. The processor(s) may receive metrics on performance of accessing one or more networks by devices via each of the one or more POPs of the plurality of POPs across each of the one or more cloud platforms. The processor(s) may determine a ranking of the plurality of POPs across the one or more cloud platforms based on the metrics. The processor(s) may generate a report identifying the rankings for at least the one or more POPs of the plurality of POPs across the one or more cloud platforms.
A method comprising: determining two or more of tasks associated with a user and determining, a priority of each task of the two or more tasks based on a deadline and an importance of the task. The method can also include, by the first computing device, determining dependencies between different ones of the two or more tasks and sorting the two or more tasks based on the priority of each task of the two or more tasks and the determined dependencies. The method can also include, by the first computing device, causing at least a portion of the sorted two or more tasks to be displayed in a user interface (UI) of an application on a second computing device.
Described embodiments provide systems and methods for establishing a session. A client may identify, to access at least one of a plurality of services via a connector, a plurality of metrics on network conditions between the connector and a corresponding service of the plurality of services. The client may use at least one value of the plurality of metrics to scale each metric of the plurality of metrics. The client may determine a score for each service of the plurality of services as a function of each of the plurality of scaled metrics for the corresponding service. The client may select, from the plurality of services, a service based at least on the score. The client may establish a session with the connector to access the selected service.
Systems and methods for geographically distributed node replication include a first node which receives a message from a client based on a proximity of the first node to the client, the message transmitted to the first node via anycast routing from the client. The first node may replicate the message to a first subset of the geographically distributed system of nodes based on a geographic proximity of nodes within the first subset. The first node may publish the message to a data feed of a message bus for the system of nodes, to cause at least one node of the system of nodes to receive the message from the first node, the at least one node outside the first subset and subscribing to the data feed of the first node.
A computing device may include a memory and a processor coupled to the memory and configured to run a browser to access a virtual computing session. The browser may have a first language associated therewith, and the virtual computing session may be provided in the first language responsive to the browser. The processor may be further configured to capture text input to the browser for the virtual computing session, determine whether the captured text corresponds to a second language different than the first language, and cause the virtual computing session to be provided in the second language responsive to determining the captured text corresponds to the second language.
A technique for applying signatures to documents stores a user signature in a first device and selectively releases the user signature for incorporation into documents only after performing validation. The validation includes the first device scanning a machine-readable code displayed by a second device. The first device and the second device participate in respective sessions with an online system, which stores a document to be signed. The first device extracts information from the machine-readable code and attempts to validate that information with the online system. If the validation is successful, the first device may release the user signature, e.g., by sending the user signature to the online system for incorporation into the document.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, receiving a video stream from a first client device and, responsive to a determination that a second client device activated a downgrade feature and further responsive to a determination that a user of the first client device is not speaking, modifying the video stream to consume less resource. The method can also include, by the computing device, providing the modified video stream to the second client device.
H04N 21/462 - Gestion de contenu ou de données additionnelles, p.ex. création d'un guide de programmes électronique maître à partir de données reçues par Internet et d'une tête de réseau ou contrôle de la complexité d'un flux vidéo en dimensionnant la résolution o
H04N 21/437 - Interfaçage de la voie montante du réseau de transmission, p.ex. pour transmettre des requêtes de client à un serveur VOD
H04N 21/2662 - Contrôle de la complexité du flux vidéo, p.ex. en mettant à l'échelle la résolution ou le débit binaire du flux vidéo en fonction des capacités du client
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
Methods and systems for sending notifications are described herein. A server may determine, a plurality of user devices that are connected with a user account. The server may a plurality of status reports. Each of the plurality of status reports may indicate a currently active level of a respective user device of the plurality of user devices. The server may select, based on analyzing the status reports, one or more user devices that are currently active. The server may cause, on the one or more user devices, display of a notification associated with the user account. In this way, the number of repeated notifications may be reduced.
H04L 51/043 - Messagerie en temps réel ou quasi en temps réel, p.ex. messagerie instantanée [IM] en utilisant ou en gérant les informations de présence
H04L 51/214 - Surveillance ou traitement des messages en utilisant le transfert sélectif
H04L 51/224 - Surveillance ou traitement des messages en fournissant une notification sur les messages entrants, p.ex. des poussées de notifications des messages reçus
35.
SYSTEMS AND METHODS FOR ANNOTATING ONLINE MEETINGS
According to some embodiments of the disclosure, a method includes: receiving, at a computing device, content of an online meeting; analyzing, by the computing device, the content to identify one or more topics communicated by one or more client devices participating in the online meeting; associating, by the computing device, ones of the one or more topics to one or more text segments of the content; and providing, by the computing device, annotations for the online meeting to at least one of the one or more client devices participating in the online meeting, the annotations representative of the one or more topics and the associated text segments.
H04N 21/4788 - Services additionnels, p.ex. affichage de l'identification d'un appelant téléphonique ou application d'achat communication avec d'autres utilisateurs, p.ex. discussion en ligne
One disclosed method involves a computing system determining a keyword of interest for an online meeting being presented via a user interface, determining that content of the online meeting corresponds to the keyword of interest, and causing, in response to the content of the online meeting corresponding to the keyword of interest, the user interface to output an indication that the content of the online meeting being presented is potentially of interest. Another disclosed method involves a computing system determining data indicative of a number of client devices, from a plurality of client devices participating in an online meeting, for which a user interface for the online meeting is presented in an active window, and causing, based at least in part on the data, a first client device, from the plurality of client devices, to output an indication that content of the online meeting being presented is potentially of interest.
A method comprises: determining, by a computing device, a potential for tasks of one or more applications not to be completed at a given time, the one or more applications being hosted on remote computing devices; initiating, by the computing device, a call to one or more application programmable interfaces (APIs) of the remote computing devices to retrieve data about the one or more tasks from the one or more applications, the tasks being generated by the one or more applications and including a time of completion being that of the given time; and initiating, by the computing device, an update to at least one of the one or more applications using the retrieved data, so that at least one of the generated tasks is completed before or at the given time.
A computing system (100) receives a first request to download a first file (104) to a client device (202). The computing system (100) further sends, based at least in part on the first request, a first digest of the first file (104) to the client device (202) to enable the client device (202) to compare the first digest with at least a second digest of a second file stored locally at the client device (202). The computing system (100) further receives, after sending the first digest to the client device (202), a second request to refrain from downloading the first file (104) to the client device (202).
In accordance with one disclosed method, a determination may be made that a user has provided a first input to a client device to begin taking an action with respect to an application presented in a first window of an operating system while the first window is an active window of the operating system. It may then be determined that a second window has become the active window of the operating system, and that the user has not provided a second input to the client device to complete the action with respect to the application. Based at least in part on the second window having become the active window and the user not having provided the second input, the client device may be caused to present a notification indicative of the action being incomplete.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
40.
SYSTEMS AND METHODS FOR ADAPTIVE ACTION WITH DISTRIBUTED ENFORCEMENT POINTS
Described embodiments provide systems and methods for performing actions based on data of devices. A controller executing on at least one server may receive a first dataset from a first agent of a first device intermediary between a first plurality of client devices and a first plurality of servers. The first dataset may comprise a subset of data tracked at the first device and available to the first agent. The controller may receive a second dataset from a second agent of a second device intermediary between a second plurality of client devices and a second plurality of servers. The second dataset may comprise a subset of data tracked at the second device and available to the second agent. According to the first dataset and the second dataset, the controller may send an instruction to at least one of the first device, the second device or a third device.
Methods, systems, and computer-readable media for providing application hotspots on an endpoint device are presented. A computing device may provide an endpoint device with access to a remote application. The remote application may be hosted on the computing device and displayable on the endpoint device in a form of a user interface. The computing device determine an adjustment to the user interface based on coordinates of a feature of user interface and a screen size of the endpoint device. The computing device may provide data to the endpoint device to render the user interface thereon. The user interface may include an element different than the feature and configured to initiate the determined adjustment to the user interface.
A method of pushing a message notification to a message recipient comprises capturing a message that is sent to a message recipient. The method further comprises extracting a first set of one or more message keywords from the message. The method further comprises extracting a second set of one or more recipient keywords from one or more digital resources associated with the message recipient. The method further comprises evaluating a correspondence between the first set and the second set. The method further comprises pushing, to the message recipient, at a notification time, a notification of the message. The notification time depends on the evaluated correspondence.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
43.
SYSTEMS AND METHODS FOR INTELLIGENTLY AUGMENTING NEW TASK
In one aspect, an example methodology implementing the disclosed techniques can include, by a first computing device, receiving information regarding a new task to be performed by a user and extracting one or more keywords from the information regarding the new task. The method can also include, by the first computing device, identifying one or more resources relevant to the new task based on relevancy scores, a relevancy score for a resource indicative of the relevancy of the one or more keywords to the resource. The method can further include, by the first computing device, sending information regarding the one or more resources relevant to the new task to a second computing device, the second computing device configured to augment the new task with the information regarding the one or more resources relevant to the new task.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, responsive to a request for information regarding messages associated with a user and another user, a message associated with the user and the another user, the message sent or received via an application from a plurality of applications. The method can also include, by the computing device, identifying one or more other messages associated with the user and the another user based on metadata of the message, at least one of the one or more other messages sent or received via another application of the plurality of applications, the another application being different than the application. The method can further include, by the computing device, outputting information regarding the one or more other messages.
In one aspect, an example methodology implementing the disclosed techniques can include, by a computing device, receiving a summary of a task and determining, using one or more machine learning models, information relevant to the task based on the summary of the task. The method can also include, by the computing device, responsive to the determination of information relevant to the task, outputting the information relevant to the task for use in assigning the task.
A method and a computing device for accessing resources are provided. The computing device may receive a first request to access a resource, the resource being executable on one or more servers and including data to provision the resource to one or more client devices. The computing device may determine that a relationship between a user of a client device and the resource exists that enables provision of the resource to the client device with use of first credentials defined by an administrative entity of the computing device. Responsive to the determination, the computing device may initiate a second request to provide a user interface through which to access the resource. The computing device may provide the user with access to the user interface responsive to authentication of the user with use of second credentials different from the first credentials.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
47.
TELEPHONE CALL INFORMATION COLLECTION AND RETRIEVAL
Techniques are provided for telephone call information collection and retrieval. A receiver device receives a telephone call from a caller device. The receiver device collects information associated with the telephone call and stores the information in a memory. Subsequently, the receiver device displays, via a graphical user interface, the telephone number of the caller device. The receiver device receives, via the graphical user interface, a user selection of the telephone number of the caller. In response to the user selection, the receiver device displays, via the graphical user interface, the information stored in the memory, including, for example, the start and end times of the telephone call, the location (s) of the receiver device during the telephone call, and text representing the audio of the call (e.g., speech-to-text conversion of at least a portion of the audio).
A computer system configured to generate a user contact profile is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive, from a client device, a search request specifying a user contact; retrieve connection data involving the user contact from one or more collaboration services via one or more application programming interfaces (APIs); summarize the connection data to obtain a connection summary; retrieve, from a data store, usage data of one or more communication applications by the user contact; rank the usage data of the one or more communication applications to obtain a usage ranking; and send the connection summary and the usage ranking to the client device to be rendered.
H04M 1/2745 - Dispositifs dans lesquels plusieurs signaux peuvent être enregistrés simultanément avec possibilité d'emmagasiner plus d'un numéro d'abonné à la fois utilisant des mémoires électroniques statiques, p.ex. des puces électroniques
49.
COMPUTING DEVICE WITH LIVE BACKGROUND AND RELATED METHOD
A computing device includes an image sensor, an IMU, a display, and a processor coupled to the image sensor, the IMU, and the display. The processor is configured to generate a GUI current screen on the display. The GUI current screen includes a background, and foreground GUI elements overlaying the background. The processor is configured to when the IMU generates motion data indicative of movement, render the background to comprise a video image from the image sensor.
G09G 5/02 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation caractérisés par la manière dont la couleur est visualisée
G09G 5/00 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation
A method includes: receiving, by a computing device associated with a user, a video stream captured by a camera; detecting, by the computing device, persons appearing within a field of view of the camera based on analysis of the video stream; and in response to a determination that one or more persons other than the user appear within the field of view of the camera: providing, by the computing device, a modified video stream in which the one or more persons other than the user do not appear during display of the modified video stream.
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
51.
USER STATUS SYNCHRONIZATION AMONG WORKSPACE APPLICATIONS
A computing device configured to determine current user status information is provided. The computing device includes a computer readable memory, a network interface, and at least one processor operably coupled to the memory and the network interface. The at least one processor can be configured to receive, via the network interface from a first end-user application being of a first type, a first message specifying status information of a first user, process the status information of a first user to determine current user status information for the first user, generate a second message specifying the current user status information for the first user, and transmit the second message to a second end-user application being of a second type distinct from the type of the first end-user application such that at least one second user can review the current status information for the first user.
H04L 51/00 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel
52.
SYSTEM AND METHOD FOR DERIVING NETWORK ADDRESS SPACES AFFECTED BY SECURITY THREATS TO APPLY MITIGATIONS
Described embodiments provide systems and methods for generating a network space to perform mitigation actions on a plurality of users. At least one server may determine a plurality of users of one or more levels of riskiness in a network environment, and network locations of the users. Using a plurality of clustering features, the at least one server may generate a network space comprising a cluster of network locations corresponding to a subset of the users of at least a defined level of riskiness. The at least one server may perform a mitigation action on the subset of users corresponding to the generated network space.
According to some embodiments, a method includes: receiving, by a client device, speech of a user during a screen sharing session; transcribing, by the client device, the speech into text; analyzing, by the client device, the text to identify one or more UI elements referenced within the speech, the one or more UI elements visible within the screen sharing session; and highlighting the one or more UI elements visible on the client device.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, determining whether a user interface element having focus is a secure input and, responsive to a determination that the user interface element is a secure input, preventing the focus from changing away from the user interface element. The method also includes, by the computing device, responsive to a determination that the user interface element is a secure input, allowing the focus to change away from the user interface element in response to a determination that an input to the user interface element is complete. The method may further include, by the computing device, responsive to a determination that the user interface element is not a secure input, allowing the focus to be moved to another user interface element.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
55.
COMPUTING DEVICE WITH WINDOW DOCKING AND RELATED SYSTEMS AND METHODS
A computing device may include a display, and a processor coupled to the display and configured to generate a GUI current screen on the display. The GUI current screen may include a first window and a second window docked to the first window, the second window overlapping the first window. The processor may be configured to determine an interaction region in the first window based upon user input in the first window, determine a ratio of overlap between the first window and the second window, and resize the second window based upon the ratio of overlap and so that the second window does not overlap the interaction region.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
56.
CENTRALIZED RESOURCE MANAGEMENT FOR DISPARATE COMMUNICATION PLATFORMS
Methods, apparatuses, and systems for grouping topics for users from different communication platforms are described herein. For example, a computing device may receive, from a user and via a communication platform, a request for sending content associated with the communication platform to the computing device. The computing device may determine, based on the received request, one or more keywords from the content. In addition, the computing device may determine a topic based on the one or more keywords. In addition, the computing device may determine a similarity between the determined topic and one or more stored topics. The one or more stored topics may be associated with one or more additional users. Further, based on a determination that the similarity satisfies a threshold, the computing device may send, to the user, a message identifying the one or more additional users.
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
57.
AUTOMATED TRANSFER OF PERIPHERAL DEVICE OPERATIONS
Systems and techniques for automated transfer of peripheral device operations are described herein. In an example, a system may adapted so that, while a first device of a first type and a second device of the first type are simultaneously connected to a client device, the first device, rather than the second device, is used as an active device of the first type for at least one application, the first and second devices being peripheral devices. The system may be further adapted so that, while both the first and second devices remain connected to the client device, a switch from the first device to the second device by a user is determined, and, based on the switch from the first device to the second device, the second device, rather than the first device, is used as the active device of the first type for the at least one application.
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, splitting a content being displayed on a screen over time into a first plurality of frames and displaying on the screen the first plurality of frames in accordance with a frame rate. Each frame of the first plurality of frames can include a portion of the content such that a composite of the first plurality of frames shows the content. In some cases, the splitting of the content may include applying time decomposition to the content.
G06F 21/84 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs d’affichage, p.ex. écrans ou moniteurs
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04N 21/2347 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant le cryptage de flux vidéo
H04N 21/845 - Structuration du contenu, p.ex. décomposition du contenu en segments temporels
Methods and systems for improved and novel encryption that make it difficult or impossible in any practical way to extract data that has been protected on the computing system. A computing device may receive authentication data from a client device. The computing device may generate an encryption key and a corresponding decryption key. The computing device may receive, from the client device, information associated with a timed access window. The computing device may send, to the client device, the encryption key. The computing device may receive, from the client device, a request for the corresponding decryption key. The computing device may calculate that the request for the corresponding decryption key is during the timed access window and send, to the client device, based on the request and the calculation that the request for the corresponding decryption key is during the timed access window, the corresponding decryption key.
A method includes: receiving, by a first computing device, a request to collect a file from a plurality of users, the request sent by a second computing device; determining, by the first computing device, a plurality of applications from which the requested file can be accessed, each of the plurality of applications used by at least one of the plurality of users; collecting, by the first computing device, files from the plurality of applications; and sending, by the first computing device to the second computing device, a link to enable a user of the second computing device to access the files collected from the plurality of applications.
According to some embodiments, a method can include: collecting, by a first computing device, materials associated with a meeting; generating, by the first computing device, graph data for the meeting based on the collected materials, the graph data including representations of the collected materials and of relationships between the collected materials; and sending, by the first computing device, the graph data for the meeting to a second computing device, the second computing device configured to display a graph of the meeting using the graph data.
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
A computing device configured to provide recommended candidates for completion of an assigned task to a user assigning the task is provided. The computing device includes a memory, a user interface, and at least one processor coupled to the memory and the user interface. The at least one processor is configured to receive input specifying information regarding the task, determine one or more task specifics associated with the task from the task information, identify candidate value information regarding one or more candidates to complete the task, compare the one or more task specifics to the candidate value information regarding the one or more candidates to determine one or more match scores of the one or more candidates, organize a list of recommended candidates based upon the one or more match scores, and display, on the user interface, at least a portion of the list of recommended candidates.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A virtual environment (e.g., a virtual desktop or virtual application) may be configured to provide an option to share data that exists within the virtual environment. Upon selecting the option, a device that implements the virtual environment (e.g., a virtualization server) may send a sharing command to a client device that is accessing the virtual environment. The client device may receive the sharing command and detect one or more sharing mechanisms available via the client device (e.g., installed applications with a functionality for sharing data). The client device may then provide a list of sharing mechanisms to a user and receive a user selection of a sharing mechanism. The client device may then share the data with another device using the sharing mechanism selected by the user.
H04L 67/08 - Protocoles spécialement adaptés à l'émulation du terminal, p.ex. Telnet
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 16/176 - Support d’accès partagé aux fichiers; Support de partage de fichiers
A computing device configured to provide personal contact recommendations to a user of a messaging application is provided. The computing device includes a memory, a user interface, and at least one processor coupled to the memory and the user interface. The at least one processor is configured to monitor interactions between the user and the messaging application during a messaging session, determine one or more additional participants in the messaging session, determine a plurality of closeness values based upon the user and the one or more additional participants in the messaging session, determine one or more recommended contacts for the user based upon the plurality of closeness values, and display, on the user interface, an identifier of at least one of the one or more recommended contacts to the user during the messaging session.
According to some embodiments, a method can include: detecting, by a first computing device, activation of a text input of an application executing on the first computing device; and responsive to the detection of the activation of the text input, sending one or more attributes of the text input from the first computing device to a second computing device displaying the application, the second computing device configured to present a composition window having the one or more attributes in common with the text input of the application, the composition window being part of an input method editor (IME) executing on the second computing device.
H04L 15/16 - Appareils ou circuits à l'extrémité d'émission avec clavier coopérant avec des disques-code
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
66.
SYSTEMS AND METHODS FOR DATA LINKAGE AND ENTITY RESOLUTION OF CONTINUOUS AND UN-SYNCHRONIZED DATA STREAMS
The present disclosure is directed to a scalable, extensible, fault-tolerant system for stateful joining of two or more streams that are not fully synchronized, event ordering is not guaranteed, and certain events arrive a bit late. The system can ensure to combine the events or link the data in near real-time with low latency to mitigate impacts on downstream applications, such as ML models for determining suspicious behavior. Apart from combining events, the system can ensure to propagate the needed entities to other product streams or help in entity resolution. If any of the needed data is yet to arrive, a user can configure a few parameters to achieve desired eventual and attribute consistency. The architecture is designed to be agnostic of stream processing framework and can work well with both streaming and batch paths.
G06F 9/52 - Synchronisation de programmes; Exclusion mutuelle, p.ex. au moyen de sémaphores
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
67.
SYSTEMS AND METHODS FOR PROVIDING USER GUIDANCE VIA WORKSPACE SCORE
Described embodiments provide systems, methods, non-transitory computer-readable medium for generating a workspace score. The workspace score may be used to help a user make better use of applications on a remote workspace. The workspace score may be based on factors of user behavior. These factors may include such things as the immersion dimension, mature dimension, vendor preference dimension, discovery dimension, and others. These factors may monitor such things as the amount of features used in the remote workspace compared with the available features, the amount of applications used on a remote desktop workspace when compared with the amount of applications used on the local client device, and the amount of applications used by a preferred vendor, among others.
Systems and methods for establishing a multipath connection include a first processor of a first cluster forwarding a first request from a client to establish a first connection with a server to a second processor of a second cluster. A third processor of the first cluster receives a second request to establish a multipath connection between the client and the server. The third processor forwards the second request to the second processor responsive to determining that the second request is to establish a multipath connection. The second processor establishes the multipath connection that includes the first connection and a second connection used as paths of the multipath connection.
A method may include receiving, by a first computing system, a first message indicative of a rate at which a second computing system is requesting to make application programming interface (API) calls. The method may further include based at least in part on the first message, configuring the first computing system to enable the second computing system to use an access credential to make API calls at the rate. The method may also include sending, from the first computing system to the second computing system, the access credential.
Described embodiments provide systems, methods, non-transitory computer-readable medium for using a single sign-on (SSO) to access an application. A client application on a client device in communication with an identity provider and an application on a remote computing device. The client application can authenticate a user via an identity provider to establish an authentication session. The client application can identify a request to access a uniform resource locator (URL) of the application hosted on the remote computing device. The client application can determine that a configuration of the client application that identifies a remapped URL for the URL is available. The client application can access the remapped URL instead of the URL to cause the user to use the authentication session of the identity provider and be redirected from the identity provider to a link of the application on the remote computing device.
A computing device may include a memory and a processor configured to cooperate with the memory to receive a connection lease and a token from a client device, with the token being generated responsive to the client device completing multi-factor authentication (MFA) with a provider of MFA. The processor may further verify, responsive to unavailability of the provider of MFA, that the client device has previously performed MFA based upon the token, and connect the client device to a computing session with use of the connection lease and responsive to the verification that the client device has performed MFA.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
72.
HISTORY PREVIEW AND SHORTCUT TO RESTORE A WORK SCENE FOR A REMOTE APP
A computing system includes a computing device configured to select a remote app to be launched based on user input, and display a history record of the selected remote app. The history record provides a preview of items previously handled by the user with the remote app. One of the items is selected based on user input. An operation record server is configured to store app history data provided by the remote app corresponding to the items previously handled by the user with the remote app. The remote app is launched with the app history data associated with the selected item so that the remote app is restored back to the item previously handled by the user.
Described embodiments provide systems and methods for priority -based transport connection control. A first packet engine can read connection information of existing connections of a second packet engine written to a shared memory region by the second packet engine. The first packet engine can establish one or more virtual connections according to the connection information of existing connections of the second packet engine. Each of the first packet engine and the second packet engine can receive mirrored traffic data. The first packet engine can receive a first packet and determine that the first packet is associated with a virtual connection corresponding to an existing connection of the second packet engine. The first packet engine can drop the first packet responsive to the determination that the first packet is associated with the virtual connection.
H04L 65/1069 - Gestion de session Établissement ou terminaison d'une session
H04L 47/726 - Réservations de ressources sur plusieurs routes utilisées simultanément
H04L 65/80 - Dispositions, protocoles ou services dans les réseaux de communication de paquets de données pour prendre en charge les applications en temps réel en répondant à la qualité des services [QoS]
74.
CONTEXT-BASED PRESENTATION OF AVAILABLE MICROAPP ACTIONS
One disclosed method involves receiving, by an application associated with a client device and from a computing system, a plurality of indicators of actions that the computing system is configured to take with respect to systems of record in response to user input to the client device; determining first data indicative of a state of the client device; selecting, by the application and based at least in part on the first data, a subset of the plurality of indicators; and causing the client device to present one or more selectable user interface elements corresponding to the selected subset of the plurality of indicators such that selection of the one or more selectable user interface elements enables the client device to cause the computing system to take the indicated actions with respect to the systems of record.
One disclosed method involves accessing, by a computing system and using access credentials associated with a user, data associated with systems of record, generating, by the computing system, a plurality of notifications of events indicated by the data, determining, by the computing system, that the user selected at least one keyword, determining, by the computing system, that a first notification of the plurality of notifications relates to the at least one keyword, and causing, by the computing system and based at least in part on the first notification relating to the at least one keyword, a client device operated by the user to present the first notification.
A technique for distributed electronic signature processing includes displaying a document for signature on a first device along with an optically-readable code. A second device scans the optically-readable code displayed by the first device, initiating a process that transfers signature entry from the first device to the second device, which may receive handwritten signatures input or otherwise provided thereon. The second device then accepts the physical signature, which is used to effectuate a signing of the document.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p.ex. sous forme de gestes ou de texte
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to evaluate a risk associated with an email attachment based on application of security policies to properties of the attachment and to the context associated with receipt of the email. The at least one processor is further configured to detect an attempt by a user to open the email attachment. The at least one processor is further configured to prevent the opening of the attachment based on the evaluated risk. The at least one processor is further configured to redirect the attachment to a secure browser, hosted on a remote server, based on the evaluated risk.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
A method for controlling a virtual meeting includes receiving a meeting template including at least one rule. The rule or rules associated with the meeting template define a first time period relating a first virtual meeting session of a first endpoint computing device and a second time period relating to a second virtual meeting session of a second endpoint computing device. The method further includes causing, responsive to the rule (s), a first audio mute/unmute action to occur in the first virtual meeting session at or prior to an expiration of the first time period. The method further includes causing a second audio mute/unmute action to occur in the second virtual meeting session at or prior to a start of the second time period, where the second time period is different from with the first time period.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G07C 1/10 - Enregistrement ou indication de l'heure d'un événement ou d'un temps écoulé, p.ex. horodateurs pour la main-d'œuvre combinés avec l'enregistrement ou l'indication d'autres données, p.ex. de signes d'identification
A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to detect a request for a sign-up form from a client device to a remote server. The at least one processor is further configured to generate a code module based on the detection. The code module is configured to request a credential vulnerability check from an application management server. The at least one processor is further configured to provide the code module to the client device for execution on the client device in response to an attempted submission of the sign-up form. The at least one processor is further configured to receive a result of the credential vulnerability check from the client device and perform a security action in response to the credential vulnerability check indicating vulnerable credentials.
Systems and methods for autonomous program management include a device which receives a request from a client responsive to execution of a script on the client. The request may include a location corresponding to the script and an identifier. The device may determine that activity of the client is activity of an autonomous program based on a comparison of the location to a reference being generated by the device for the client and determined using the identifier from the request. The device may block a subsequent request from the client to a server responsive to the determination.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
H04L 47/10 - Commande de flux; Commande de la congestion
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
A computing device includes a display, and a browser to access applications for display in a browser window. Each application is associated with a respective browser tab within the browser window. A processor is coupled to the display to display content from an application associated with a selected browser tab, and to classify the selected browser tab. The processor enables app protection to selectively block screenshots of the displayed content based on the classification of the selected browser tab.
G06F 21/54 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
Methods and systems for application virtualization are described herein. The system may provide a plurality of endpoint devices with access to an application. The application may be hosted by a computing device and configured to run on a mobile computing device. The computing device may determine instructions to execute the application for different endpoint devices of the plurality based on information about the plurality of endpoint devices. The computing device may modify output from execution of the determined instructions into graphics data and may provide the graphics data to at least one of the plurality of endpoint devices to enable that endpoint device to render a user interface in which to access the application.
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
83.
SYSTEMS AND METHODS FOR ROUTING REMOTE APPLICATION DATA
Described embodiments provide for routing remote application data. A device can receive a request to access an application. The application can be provided by data centers and accessible via service providers. The device can select a data center from the plurality of data centers and a service provider based at least on a metric indicative of a connection between the data center and the service provider. The device can query a database including one or more connection metrics using the application identified in the request and a location of a router transmitting the request. The device can determine the location of the router based on an internet protocol (IP) address of a client communicably coupled to the router. The device can transmit a response to the request identifying the selected data center and the selected service provider.
H04L 67/52 - Services réseau spécialement adaptés à l'emplacement du terminal utilisateur
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/1025 - Adaptation dynamique des critères sur lesquels repose la sélection du serveur
H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
H04L 67/1029 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués en utilisant des données liées à l'état des serveurs par un répartiteur de charge
Methods and systems for transparent user-interfaces are described herein. A computing device may generate an overlay that includes content of an application executable on a computing device. The overlay may be operative in a first mode and a second mode. The first mode may be configured to enable input received on the overlay to initiate operations of another application, and the second mode may be configured to initiate operations of the application included within the overlay in response to input received thereon. The computing device may provide the overlay on top of a window of the other application within a user interface of the computing device to display the overlay in a transparent fashion. The computing device may execute the overlay in the first mode so that receipt of input on the overlay causes the other application to perform an operation.
Methods, apparatuses, and systems for secure data input mechanisms are described herein. An example method comprises monitoring a user interface presented on a display of a mobile device, identifying an input field of the application shown within the display, and adjusting operation of the mobile device in response to entry of data within the input field, the adjusting operation occurring via an input method, the input method changing at least one characteristic of the mobile device indicative of entry of data with use of the mobile device, so as to prevent acquisition of the data by a malicious application installed on the mobile device.
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
G06F 21/83 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs de saisie de données, p.ex. claviers, souris ou commandes desdits claviers ou souris
G06F 21/56 - Détection ou gestion de programmes malveillants, p.ex. dispositions anti-virus
86.
ENABLING MICROAPP ACCESS BASED ON DETERMINED APPLICATION STATES AND USER-INITIATED TRIGGERING EVENTS
One disclosed method involves receiving, by a first application managed by an operating system, first data indicating that a second application managed by the operating system is in a first state; receiving, by the first application, second data indicating that a first user input has been provided to a client device; determining, by the first application and based at least in part on the first data and the second data, that the first user input occurred while the second application was in the first state; and causing, by the first application and based at least in part on the first user input having occurred while the second application was in the first state, the client device to present a first user interface for a third application, the first user interface configured to cause the third application to take a first action with respect to a fourth application in response to a second user input to the client device.
Reducing vulnerability to a server is provided. A device intermediary to a client and a server can receive a RPC message from the RPC based client to the RPC based server, the RPC message having a plurality of fields to execute one or more routines on the server. The device can detect that one or more fields of the plurality of fields exploits a vulnerability of the RPC based server. The device can modify the RPC message to remove the one or more fields from the RPC message. The device can forward the modified RPC message to the RPC server.
Methods and systems for enabling interaction with physical display devices in an extended reality (XR) environment are described herein. A computing device may send, to an XR device, XR environment information for display of an XR environment on a display of an XR device. The computing device may receive one or more images originating from one or more cameras of the XR device. For example, the one or more images might be of a physical environment around the XR device. The computing device may detect one or more portions of a display device depicted in the one or more images. The display device may display content from a second computing device. The computing device may detect input, in the XR environment, associated with the content and transmit that input to the second computing device. Such input might comprise, for example, gestures.
G06F 1/16 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES - Détails non couverts par les groupes et - Détails ou dispositions de structure
G06F 3/03 - Dispositions pour convertir sous forme codée la position ou le déplacement d'un élément
G06F 3/0346 - Dispositifs de pointage déplacés ou positionnés par l'utilisateur; Leurs accessoires avec détection de l’orientation ou du mouvement libre du dispositif dans un espace en trois dimensions [3D], p.ex. souris 3D, dispositifs de pointage à six degrés de liberté [6-DOF] utilisant des capteurs gyroscopiques, accéléromètres ou d’inclinaiso
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G08C 17/02 - Dispositions pour transmettre des signaux caractérisées par l'utilisation d'une voie électrique sans fil utilisant une voie radio
In accordance with one disclosed method, a client device may be caused to present a user interface for an application, the user interface enabling selective access to a plurality of resources via the client device. A state of a peripheral device that is connectable to the client device may be determined and, based at least in part on the state of the peripheral device, at least a first resource, from among the plurality of resources, may be identified with which the peripheral device can interact. Based at least in part on the identifying of the first resource, the user interface may be caused to include at least a first selectable user interface element that, when selected, causes the client device to access to the first resource so as to enable the peripheral device to interact with the first resource.
A method of casting a source device display screen to a target device includes, by an application on the source device, storing information about the target device in a shared memory and issuing a request to an operating system to initiate capturing and casting for the source device display screen. The operating system responds to the request by launching a casting extension and supplying a content stream containing content of the source device display screen. Upon being launched, the casting extension (1) obtains the information about the target device from the shared memory and uses the information to establish a display connection with the target device, and (2) forwards the content stream to the target device on the display connection.
A method includes: receiving, by a computing device, data about one or more applications associated with users of a group, the group being one in which to share information amongst the users; identifying, by the computing device, an application common to at least a subset of users of the group based on the received data; and providing, by the computing device, settings to a client device (504) of another user outside the subset of users, the client device (504) to apply the settings to enable the another user to access the application in common with use of the client device (504).
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p.ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
Described embodiments provide systems, methods, non-transitory computer-readable medium for initiating one-factor or multi-factor authentication. A device comprising one or more processors and coupled to memory. The device can receive a request to authenticate a user to enable access to an application by the user. The request can originate from an Internet Protocol (IP) address external to a network hosting the application. The device can determine that a previous request to authenticate the user originated from the IP address and was approved based on successful completion of multi-factor authentication by the user. The device can provide, responsive to the determination, the user with access to the application using one-factor authentication instead of the multi-factor authentication.
A method includes, by a computing device, responsive to initiation of an application of the computing device, a display of which including a virtual keyboard, detecting, by the computing device, an input on a shortcut key of the virtual keyboard. The method also includes, by the computing device, translating the shortcut key into one or more keystrokes based on a configuration file for that short key and providing the one or more keystrokes to the application to execute a function of the shortcut key in response to the detected input.
Methods, apparatuses, and systems for intention based search techniques are described herein. An example method comprises receiving data indicative of an intent of a user to perform an action via at least one application, the data comprising a description of the action that is input via a client device application on a client device, identifying, by the computing device, the at least one application based on a comparison of the description of the action and one or more records, the one or more records being indicative of prior intents of one or more users to perform actions and indicative of at least one selection by the one or more users to perform the actions with a selected application, and providing, by the computing device, output to the client device to enable performance of the action via the at least one application.
Systems and methods of reconstructing execution call flows to detect anomalies is provided. A device can establish call flows using information extracted from a log file to. Each of the call flows can identify information from the log file of a call flowing through a plurality of modules. The device can identify a count of a number of occurrences of one or more keywords in information of each call flow. The device can generate a vector of numbers for each call flow based at least on the count for the one or more keywords for that call flow. The device can classify each call flow into one or more clusters that indicate whether an operation of the call flow is anomalous. The device can classify each call flow using the vector of numbers for each call flow.
H04L 47/2441 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS en s'appuyant sur la classification des flux, p.ex. en utilisant des services intégrés [IntServ]
96.
COMPUTING DEVICE AND RELATED METHODS PROVIDING VIRTUAL SESSION LAUNCHING FROM PREVIOUSLY CACHED ASSETS
A computing device may include a memory and a processor configured to cooperate with the memory to run a browser configured to perform a sequence to obtain an asset and display a user interface for launching a virtual session using the asset. The processor may further run code configured to determine a failure of the browser to complete the sequence, and cause the browser to display the user interface for launching the virtual session using a previously cached version of the asset responsive to the failure of the browser to complete the sequence.
Methods and systems for rotating elements displayed by computing devices are described herein. At least one image of a user of a computing device may be captured by a camera of the computing device. An angle of the eyes of the user with respect to the computing device may be determined. Based on that determined angle, at least one element of content displayed by the computing device may be rotated so as to allow for display of that element in an orientation consumable by the user. For example, the element might be rotated at an angle corresponding to the angle of the eyes of the user with respect to the orientation of the computing device.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
98.
SYSTEMS AND METHODS OF PREDICTING MICROAPP USER ENGAGEMENT
A computer system including a memory, a network interface, and a processor is provided. The processor is configured to receive, via the network interface, one or more design attributes of a microapp from a microapp development tool hosted by an endpoint device, the one or more design attributes comprising an identifier of a system of record configured to supply data to the microapp; execute a machine learning process trained, using data regarding microapp usage within an organization, to predict at least one user engagement metric for the microapp based on the one or more design attributes; and transmit, via the network interface, the at least one user engagement metric to the microapp development tool hosted by the endpoint device.
G06F 8/10 - Analyse des exigences; Techniques de spécification
G06Q 90/00 - Systèmes ou méthodes spécialement adaptés à des fins administratives, commerciales, financières, de gestion ou de surveillance, n'impliquant pas de traitement significatif de données
G06F 30/27 - Optimisation, vérification ou simulation de l’objet conçu utilisant l’apprentissage automatique, p.ex. l’intelligence artificielle, les réseaux neuronaux, les machines à support de vecteur [MSV] ou l’apprentissage d’un modèle
99.
SYSTEMS AND METHODS TO IMPLEMENT MICROAPPS IN DIGITAL WORKSPACES
Described embodiments provide systems and methods for enhancing user engagement with micro applications. A computing device can include one or more processors and memory. The computing device can receive an indication of an action to be completed with use of a micro application. The computing device can be in communication with a client device and one or more computing systems of record to execute the micro application. The computing device can values for one or more attributes of the micro application. The computing device can generate, based on the identified values, a score for the micro application. The computing device can provide the score to the client device for display within a user interface. The user interface can be configured to initiate the action with use of the micro application.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A system and method that detects malicious account creation in a web-based platform. A method includes detecting suspicious events associated with an account creation process using a username classifier that evaluates a username used to create a new account, an IP address classifier that evaluates an IP address used to create the new account, and a domain classifier that evaluates a domain from an email address used to create the new account; analyzing each detected suspicious event with a density analysis classifier to determine if each detected suspicious event comprises a malicious event based on a density of detected suspicious events from a collections of account creation processes; and determining an alert condition based on at least one malicious event detection.
G06F 21/50 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation