Patent application number | Description | Published |
20090006618 | METHODS AND SYSTEMS FOR ACCESS ROUTING AND RESOURCE MAPPING USING FILTERS - A method for access routing and resource mapping using filters includes the step of receiving a request from a client for access to a resource. A rule is identified, the rule having a rule priority level and associated with: i) a filter, ii) at least one method for providing access to the resource, and iii) a server in a plurality of servers. The filter is applied, the filter identifying at least one pre-requisite to accessing the resource. A determination is made that the client satisfies the at least one pre-requisite, responsive to applying the filter. A determination is made regarding whether to provide access to the resource to the client by the server in the plurality of servers according to the at least one method for providing access to the resource. The server in the plurality of servers provides access to the resource for the client according to the at least one method for providing access to the resource. | 01-01-2009 |
20090007021 | METHODS AND SYSTEMS FOR DYNAMIC GENERATION OF FILTERS USING A GRAPHICAL USER INTERFACE - A method for dynamic generation of filters using a graphical user interface includes the step of describing a first clause of a filter in a first graphical user interface element. At least one of: i) a conjunctive clause of the filter in a second graphical user interface element, and ii) a disjunctive sub-clause of the first clause of the filter in the first graphical user interface element, are described. A filter is generated, responsive to the contents of the first graphical user interface element and the second graphical user interface element. | 01-01-2009 |
20090106220 | Systems and Methods for Gathering and Selectively Synchronizing State Information of at Least One Machine - A method for gathering and selectively synchronizing state information of at least one machine includes generating, by a first machine, a query identifying a plurality of metrics characterizing a state of a second machine and at least one criterion identifying a circumstance in which to respond to the query. The method includes determining, by the second machine, whether to respond to the query, responsive to the criterion in the query. The method includes transmitting, by the second machine, to the first machine, a response including a subset of the plurality of metrics, responsive to the determination. A system for gathering and selectively synchronizing state information of at least one machine, includes a first machine generating a query. The system includes an agent, on the second machine, determining whether to respond to the query, and transmitting a response including a subset of the plurality of metrics, responsive to the determination. | 04-23-2009 |
20090292737 | Methods and Systems for Patching Multiple Disk Images Derived from a Common Base Disk Image - A method for updating a plurality of disk images, each of the plurality of disk images derived from a common base disk image and a delta image comprising a plurality of delta files, includes applying a delta file to a base disk image to generate a second disk image comprising a portion of the base disk image modified by the delta file and an unmodified portion of the base disk image. Each delta file represents at least one difference between one of the plurality of user disk images and the base disk image. The method includes applying a patch to a copy of the base disk image, and determining that the patch is applied to a portion of the base disk image corresponding to the unmodified portion of the base disk image. The delta file is applied to the patched copy of the base disk image. | 11-26-2009 |
20090327908 | Methods and Systems for Interactive Evaluation Using Dynamically Generated, Interactive Resultant Sets of Policies - A method for interactive policy evaluation using dynamically generated, interactive resultant sets of policies includes the step of receiving, by a graphical user interface, at least one of: a description of a client requesting access to a resource, a description of the resource, and a description of a method of access requested by the client. The graphical user interface displays at least one policy applicable to the client request for access to the resource. The graphical user interface displays a decision made by applying the at least one policy to the received description. | 12-31-2009 |
20090327909 | Methods and Systems for Interactive Evaluation of Policies - A system for interactive evaluation of policies includes a first graphical user interface element and a second graphical user interface element. The first graphical user interface element enumerates at least one resource. The second graphical user interface element receives an identification of a characteristic of at least one client and displays a result of an application of at least one policy associated with the at least one resource to the at least one client, the at least on policy applied responsive to the received identification of the characteristic. | 12-31-2009 |
20100281528 | METHODS AND SYSTEMS FOR GENERATING AND DELIVERING AN INTERACTIVE APPLICATION DELIVERY STORE - A system for updating and delivering an interactive application delivery store, where the system includes a client computer, a server and an application delivery store executing on the server, the client computer communicating with the server over a communicative connection. A user accesses the application delivery store using the client computer, and subscribes to an application not included in a user profile of the user using the application delivery store. In response to subscribing to the application, the application delivery store verifies user permissions of the user and determines whether the user is permitted to subscribe to the application. Upon determining the user can subscribe to the application, the application delivery store updates the user profile with the application and transmits a stub application to the client computer. The stub application represents the application subscribed to by the user in that the stub application includes a portion of the application. | 11-04-2010 |
20110004649 | METHODS AND SYSTEMS FOR PROVIDING A CONSISTENT PROFILE TO OVERLAPPING USER SESSIONS - Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session. | 01-06-2011 |
20110099297 | METHOD AND SYSTEM FOR REMOTELY CONFIGURING A DEVICE ASSOCIATED WITH A LOCAL MACHINE - A system and method of configuring a USB device connected to a client machine includes detecting, by a local low level device insertion detection system of a client machine, a USB device connected to the client machine by a USB port, the client machine in communication with a remote machine via a remoting protocol; establishing, by the low level device insertion detection system of the client machine, a low-level connection by a USB remoting with a low level device insertion detection system executing in the remote machine; executing, by the remote machine, an application to determine whether to use a driver on the client machine or a driver on the remote machine to configure the device. | 04-28-2011 |
20110277027 | Systems and Methods for Providing a Single Click Access to Enterprise, SAAS and Cloud Hosted Application - The present disclosure is directed to methods and systems of providing a user-selectable list of disparately hosted applications. A device intermediary to a client and one or more servers may receive a user request to access a list of applications published to the user. The device may communicate to the client the list of published applications available to the user, the list comprising graphical icons corresponding to disparately hosted applications, at least one graphical icon corresponding to a third-party hosted application of the disparately hosted applications, the third party hosted application served by a remote third-party server. The device may receive a selection from the user of the at least one graphical icon. The device may communicate, from the remote third party server to the client of the user, execution of the third party hosted application responsive to the selection by the user. | 11-10-2011 |
20120297189 | Systems and Methods for Secure Handling of Data - The methods and systems described herein provide for secure implementation of external storage providers in an enterprise setting. Specifically, the present invention provides for allowing the secure use of processes that may transmit files to external storage providers or access files from an external storage provider. In some arrangements, process, such as an untrusted process, may request access to a file. A security agent may intercept the request and encrypt the file. The file can then be transmitted to the external storage provider. A user may subsequently request access to the file. A security agent may intercept a message in connection with this request, determine whether the user is authorized to access the file, and decrypt the file. | 11-22-2012 |
20130297700 | ENTERPRISE MANAGED SYSTEMS WITH COLLABORATIVE APPLICATION SUPPORT - Described herein is an enterprise system including an enterprise social platform associated with an application store platform, which is accessible by a computing device in a secure manner. The enterprise social platform stores information indicating user roles within the enterprise and provides at least one social networking feature to a group of users that are associated based on the roles, where the social networking feature is associated with an enterprise application store. An application catalog system of the enterprise application store platform includes sets of enterprise applications that are available for selection by enterprise users, and the application catalog system provides access to selected enterprise applications. An application store storage system includes a plurality of files associated with each one of the plurality of applications, wherein the plurality of files includes enterprise customized application templates, enterprise application usage information, application evaluation information, application recommendations, or an application support forum. An application store management system presents selected ones of the files to a user within the enterprise social platform based on the user's membership in the group of users. | 11-07-2013 |
20140033060 | METHODS AND SYSTEMS FOR INTERACTIVE EVALUATION USING DYNAMICALLY GENERATED, INTERACTIVE RESULTANT SETS OF POLICIES - A method for interactive policy evaluation using dynamically generated, interactive resultant sets of policies includes the step of receiving, by a graphical user interface, at least one of: a description of a client requesting access to a resource, a description of the resource, and a description of a method of access requested by the client. The graphical user interface displays at least one policy applicable to the client request for access to the resource. The graphical user interface displays a decision made by applying the at least one policy to the received description. | 01-30-2014 |
20140237049 | METHODS AND SYSTEMS FOR PROVIDING A CONSISTENT PROFILE TO OVERLAPPING USER SESSIONS - Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session. | 08-21-2014 |
20140297824 | PROVIDING AN ENTERPRISE APPLICATION STORE - Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, a request for updated policy information for at least one application may be received at an application store from a policy agent. Based on receiving the request, it may be determined, at the application store, whether one or more policies for the at least one application have been updated. Based on determining that the one or more policies for the at least one application have been updated, at least one policy update may be provided to the policy agent. | 10-02-2014 |
20140298400 | PROVIDING AN ENTERPRISE APPLICATION STORE - Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, a request for a software application may be received at an application store. Subsequently, the software application may be configured, at the application store, based on a single sign-on credential. The configured software application then may be provided, by the application store, to at least one recipient device associated with the single sign-on credential. | 10-02-2014 |
20140298401 | PROVIDING AN ENTERPRISE APPLICATION STORE - Methods, systems, and computer-readable media for providing an application store are presented. In some embodiments, authentication credentials of an administrative user of an application store may be received at the application store. Based on validating the authentication credentials of the administrative user, a mobile service management interface may be provided via the application store. In addition, the mobile service management interface may include at least one control that is configured to allow the administrative user to define one or more policies to be applied to at least one application that is available in the application store. | 10-02-2014 |
20140331060 | User and Device Authentication in Enterprise Systems - Methods and systems for authenticating users of client devices to allow access of resources and services in enterprise systems are described herein. An authentication device may validate a user based on authentication credentials received from a client device. Validation data stored by the authentication device, and a corresponding access token transmitted to the client device, may be used to authenticate the user for future resource access requests. A user secret also may be stored by the authentication device and used to validate the user for future resource access requests. Additionally, after validating a user with a first set of authentication credentials, additional sets of credentials for the user may be retrieved and stored at an access gateway for future requests to access other services or resources in an enterprise system. | 11-06-2014 |
20140331063 | Disrupting Password Attack Using Compression - Methods and systems for disrupting password attacks using compression are described. A user password may be stored on a mobile computing device. The password may be compressed, for example, using a Huffman compression algorithm, and may be subsequently encrypted using a short secret as a key. The user password may be stored as the compressed and encrypted key. The compressed and encrypted password may be stored such that a brute force password attack, for example, using every possible short secret, would reveal too may possible matches to allow an attacker to select the real password. | 11-06-2014 |