Real time digital content concealment

    公开(公告)号:AU2018452176A1

    公开(公告)日:2021-07-22

    申请号:AU2018452176

    申请日:2018-12-04

    Abstract: Methods and systems for performing real time digital content concealment are described herein. A computing device may, in response to detecting a user within view of an image capture device of a client device, perform a first type of text recognition on a first region of digital content and a second type of text recognition on a second region of the digital content, where the first type of text recognition is determined based on a first type of content items contained in the first region and the second type of text recognition is determined based on a second type of content items contained in the second region. Based at least in part on rules corresponding to the user, the computing device may determine content items within the digital content to be concealed, and may modify the digital content to conceal the content items.

    Graphical rendering using multiple graphics processors

    公开(公告)号:AU2018301289B2

    公开(公告)日:2021-07-01

    申请号:AU2018301289

    申请日:2018-07-05

    Inventor: SURESH ASHWIN

    Abstract: Aspects described herein are directed to leveraging multiple graphics processors, by a virtual GPU manager, to optimize the rendering of graphics in either a desktop or virtual desktop environment. The virtual GPU manager may enumerate all available physical GPUs, query performance variables including processing capacity of each of the available physical GPUs, and classify each of the physical GPUs based on the queried performance variables. Further, the virtual GPU manager may generate a logical GPU corresponding to one or more of the available physical GPUs. The virtual GPU manager may distribute graphics rendering requests across each of the plurality of available physical GPUs by way of the logical GPU.

    Computing system with gateway data transfer based upon device data flow characteristics and related methods

    公开(公告)号:AU2020211396A1

    公开(公告)日:2021-06-17

    申请号:AU2020211396

    申请日:2020-01-15

    Abstract: A computing system may include a server, client computing devices, a gateway device in communication between the server and the client computing devices, and a local device to be coupled to a given client computing device and to be operable in a given virtual desktop instance associated with the given client computing device, thereby generating client initialization packets. The gateway device may be configured to when the local device is coupled to the given client computing device, determine whether a client packet from a plurality of client initialization packets is within a client mapping table, replace the client packet with a client mapping ID number to define compressed client initialization packets, and send the compressed client initialization packets to the server. The server may be configured to replace the client mapping ID number with the client packet in the compressed client initialization packets based upon a server mapping table.

    Method for securely negotiating end-to-end cryptographic context using inline messages through multiple proxies in cloud and customer environment

    公开(公告)号:AU2019392478A1

    公开(公告)日:2021-06-17

    申请号:AU2019392478

    申请日:2019-12-03

    Abstract: Described embodiments provide systems and methods for establishing an end-to-end cryptographic context. A service node may be located intermediary between a client and server which provides a service to the client. At least one network device may be located intermediary between the service node and the server. The service node may obtain information for validating the service. The service node may establish an end-to-end cryptographic context between the service node and server through the network device(s). A first network device of the network device(s) may share a cryptographic context with the service node, which existed prior to establishment of the end-to-end cryptographic context. The service node may transmit a message to the network device encrypted using the first cryptographic context. The encrypted message may inform the first network device to pass through traffic that is encrypted using the end-to-end cryptographic context.

    System and apparatus for enhanced QoS, steering and policy enforcement for https traffic via intelligent inline path discovery of TLS terminating node

    公开(公告)号:AU2019392368A1

    公开(公告)日:2021-06-10

    申请号:AU2019392368

    申请日:2019-12-02

    Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.

    System with real-time detection and resolution of conflicts for shared resources

    公开(公告)号:AU2018454906A1

    公开(公告)日:2021-05-27

    申请号:AU2018454906

    申请日:2018-12-29

    Inventor: GE WENHAO

    Abstract: A method of managing shared resources includes detecting, upon receiving a request to extend a current use of a shared resource, a conflict in resource data between a requested end time of the current use and an earlier beginning time of a subsequent use. In one example the shared resource may be a conference room, the uses are adjacently scheduled meetings. The method further includes, in response to detecting the conflict, (1) receiving a permission indication with respect to the request, and (2) in response to the permission indication identifying acceptance of the request, (a) calculating a granted extension time for the current use, and (b) updating the resource data to add the granted extension time to a scheduled end time of the current use and the scheduled beginning time of the subsequent use to enable use of the shared resource without conflict.

    Masked watermarks and related systems and techniques

    公开(公告)号:AU2019430941B2

    公开(公告)日:2021-05-13

    申请号:AU2019430941

    申请日:2019-08-20

    Abstract: Abstract A method comprising: segmenting a watermark into a plurality of watermark pieces; and for at least one watermark piece of the plurality of watermark pieces, responsive to determination of a data element of content being present at a location within the content at which to apply the at least one watermark piece, rendering the at least one watermark piece on the content such that the data element overlays the at least one watermark piece so as to render the watermark piece on the content as a masked watermark.

    Provisioning virtual machines with a single identity and cache virtual disk

    公开(公告)号:AU2020327347A1

    公开(公告)日:2021-05-06

    申请号:AU2020327347

    申请日:2020-10-15

    Abstract: A virtual disk is provided to a computing environment. The virtual disk includes identity information to enable identification of a virtual machine within the computing environment. A size of the virtual disk is increased within the computing environment to enable the virtual disk to act as a storage for the identity information and as a cache of other system data to operate the virtual machine. The virtual machine is booted within the computing environment. The virtual machine is configured to at least access the virtual disk that includes both identity information and caches other system data to operate the virtual machine. Related apparatus, systems, techniques and articles are also described.

    DYNAMICALLY SWITCHING BETWEEN POINTER MODES

    公开(公告)号:CA3150610A1

    公开(公告)日:2021-04-15

    申请号:CA3150610

    申请日:2020-06-26

    Inventor: PAVLOU CHRIS

    Abstract: Techniques process, in a user device, pointer input from an input device. Such techniques involve providing the input from the input device to a remote desktop session which is hosted on equipment that is remote from the user device. Such techniques further involve detecting an event on the user device, the event being indicative of deactivation of the remote desktop session. Such techniques further involve, in response to detecting the event, providing the input from the input device to at least one local application executable on the user device to enable continued processing of the input from the input device with use of the at least one local application instead of the remote desktop session.

    Service pool architecture for multitenant services to support canary release

    公开(公告)号:AU2019326538A1

    公开(公告)日:2021-04-15

    申请号:AU2019326538

    申请日:2019-08-22

    Abstract: Aspects of the disclosure relate to using service pool architecture for multitenant services to support canary release. An enterprise canary release server may create a plurality of service pools for a tenant in a cloud-based system that supports a plurality of tenants, where each service pool may comprise a plurality of microservices. The enterprise canary release server may receive a request to perform a canary release for a new version of software and identify a first microservice out of the plurality of microservices in a first service pool. The enterprise canary release server may instantiate a new microservice in the first service pool and enable data plane connectivity between the new microservice and a second microservice. Accordingly, the enterprise canary release server may disable data plane connectivity between the first microservice and the second microservice.

Patent Agency Ranking