FILE REDUNDANCY DETECTION AND MITIGATION
    21.
    发明申请

    公开(公告)号:US20200183887A1

    公开(公告)日:2020-06-11

    申请号:US16210565

    申请日:2018-12-05

    Abstract: Methods and systems for detecting and addressing file redundancies. A server may be configured to store a plurality of files associated with a plurality of identifiers. The identifiers may be generated using a hash function. The server may receive an indication of a first file. The indication of the first file may correspond to a user uploading the first file to the server, and may comprise a first identifier of the first file. The server may determine, by comparing the first identifier and the plurality of identifiers, that a second file is the same as the first file. Based on the second identifier, a pointer to the second file may be provided to prevent redundant storage of content similar to that of the second file. If an edit associated with a pointer, of a plurality of pointers to a centrally-stored file, is made, a new centrally-stored file may be created.

    OPTIMIZED ON-DEMAND FILE DOWNLOAD
    22.
    发明公开

    公开(公告)号:US20230224357A1

    公开(公告)日:2023-07-13

    申请号:US17578605

    申请日:2022-01-19

    CPC classification number: H04L67/06 H04L67/42 H04L67/2857 H04L67/306

    Abstract: In one disclosed method, a computing system receives a first request to download a first file to a client device. The computing system further sends, based at least in part on the first request, a first digest of the first file to the client device to enable the client device to compare the first digest with at least a second digest of a second file stored locally at the client device. The computing system further receives, after sending the first digest to the client device, a second request to refrain from downloading the first file to the client device.

    SYSTEMS AND METHODS FOR PROVIDING USER GUIDANCE VIA A WORKSPACE SCORE

    公开(公告)号:US20230038689A1

    公开(公告)日:2023-02-09

    申请号:US17408200

    申请日:2021-08-20

    Abstract: Described embodiments provide systems, methods, non-transitory computer-readable medium for generating a workspace score. The workspace score may be used to help a user make better use of applications on a remote workspace. The workspace score may be based on factors of user behavior. These factors may include such things as the immersion dimension, mature dimension, vendor preference dimension, discovery dimension, and others. These factors may monitor such things as the amount of features used in the remote workspace compared with the available features, the amount of applications used on a remote desktop workspace when compared with the amount of applications used on the local client device, and the amount of applications used by a preferred vendor, among others.

    File sharing service controller
    24.
    发明授权

    公开(公告)号:US11556504B2

    公开(公告)日:2023-01-17

    申请号:US16848675

    申请日:2020-04-14

    Abstract: A tracking engine may respond to a first user requesting to pin a link included in a message received from a second user by storing the link in a database table associated with the first user. Alternatively, if the first user requests to clone the link, the tracking engine may store the link in the database table as well as generate a local copy of a file associated with the link. The tracking engine may generate, based on the database table, a user interface for displaying, at a client associated with the first user, one or more links received by the first user. The tracking engine may update the database table to mark or remove invalid links. As such, the user interface that is generated based on the database table may exclude invalid links or include unselectable user interface elements for the invalid links.

    LOCATION-BASED APPLICATION DISCOVERY

    公开(公告)号:US20220353638A1

    公开(公告)日:2022-11-03

    申请号:US17812737

    申请日:2022-07-15

    Abstract: A computer system and method for providing location-based application access is provided. For example, the computer system includes a processor configured to receive a connection request for access to a distributed workspace, the connection request including location information for a client device. The processor can access metadata for each of a plurality of location-based applications, the metadata including location information for each of the applications defining at least one physical location where each of the applications can be accessed. The processor can compare the location information against the metadata for each of the applications and determine one or more applications that match the location information for the client device. The processor then can organize each of the applications that have associated location information that matches the location information into a listing of available applications and transmit the listing of available applications for display to a user of the client device.

    SENSITIVE INFORMATION OBFUSCATION DURING SCREEN SHARE

    公开(公告)号:US20210365589A1

    公开(公告)日:2021-11-25

    申请号:US16910615

    申请日:2020-06-24

    Abstract: Techniques are disclosed for protection of sensitive information on a computing device based on a security state of the environment in which the computing device is operating. An example methodology implementing the techniques includes determining that an application having screen share capability is running on a computing device and determining a security state of an environment of the computing device. The method also includes, responsive to a determination that the security state is unsecure, obfuscating sensitive information included in a notification displayed within an application window being displayed by the computing device.

    User Experience Oriented Path Selection
    28.
    发明申请

    公开(公告)号:US20200296036A1

    公开(公告)日:2020-09-17

    申请号:US16420808

    申请日:2019-05-23

    Abstract: Methods and systems for path selection involving remote access protocols and/or user behavior are described herein. A request, from a first computing device, for content hosted on a second computing device may be received. Based on network state metrics, remote access protocol metrics, and/or user experience metrics, a path of a plurality of paths between the first computing device and the second computing device may be selected. The path need not be the most direct path between the first computing device and the second computing device, and may comprise remote access to a computing device on an intermediary server. Based on user behavior analysis performed with respect to user input data, a path may be re-selected, and/or the network state metrics, remote access protocol metrics, and/or user experience metrics may be weighted.

Patent Agency Ranking