Persisting user settings for non-persistent application streaming environments

    公开(公告)号:US11782731B1

    公开(公告)日:2023-10-10

    申请号:US16208367

    申请日:2018-12-03

    CPC classification number: G06F9/4451 G06F9/45558 G06F9/485 G06F2009/45579

    Abstract: Methods, systems, and computer-readable media for persisting user settings for non-persistent application streaming environments are disclosed. An application streaming service may receive a selection of an application for a user and assign a compute instance to the user. An agent provided by the compute instance obtains a storage location of a user settings file associated with the user (e.g., based on use of the application during a previous session). The agent downloads the user settings file from the storage location to the compute instance and mounts the user settings file at a file system location associated with an execution environment of the compute instance. The application is executed and the user settings file is updated during use of the application. In response to termination of the session, the agent uploads the updated user settings file to a storage location. The user settings file is not persisted on the compute instance.

    Secure remote access of computing resources

    公开(公告)号:US11586721B1

    公开(公告)日:2023-02-21

    申请号:US17007949

    申请日:2020-08-31

    Abstract: Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.

Patent Agency Ranking