Secure remote access of computing resources

    公开(公告)号:US10783235B1

    公开(公告)日:2020-09-22

    申请号:US15587015

    申请日:2017-05-04

    Abstract: Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.

    Persisting user settings for non-persistent application streaming environments

    公开(公告)号:US11782731B1

    公开(公告)日:2023-10-10

    申请号:US16208367

    申请日:2018-12-03

    CPC classification number: G06F9/4451 G06F9/45558 G06F9/485 G06F2009/45579

    Abstract: Methods, systems, and computer-readable media for persisting user settings for non-persistent application streaming environments are disclosed. An application streaming service may receive a selection of an application for a user and assign a compute instance to the user. An agent provided by the compute instance obtains a storage location of a user settings file associated with the user (e.g., based on use of the application during a previous session). The agent downloads the user settings file from the storage location to the compute instance and mounts the user settings file at a file system location associated with an execution environment of the compute instance. The application is executed and the user settings file is updated during use of the application. In response to termination of the session, the agent uploads the updated user settings file to a storage location. The user settings file is not persisted on the compute instance.

    Secure remote access of computing resources

    公开(公告)号:US11586721B1

    公开(公告)日:2023-02-21

    申请号:US17007949

    申请日:2020-08-31

    Abstract: Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.

    Secure embedding of private content via a dynamically-set security policy

    公开(公告)号:US11528301B1

    公开(公告)日:2022-12-13

    申请号:US16917560

    申请日:2020-06-30

    Abstract: Disclosed are system architectures and techniques for securely embedding private content via dynamically-set security policy. A streaming service stores associations of particular streaming content with security policies that each specify domains allowed to initiate streaming from the streaming service. Requests for the streaming content are received from user-agents. The streaming service identifies respective security policies associated with each of the streaming content indicated by each of the requests and dynamically sets each security policy in a response. The responses are transmitted back to the user-agent where the security policy is enforced. In some instances, the streaming service is an application streaming service that hosts respective applications for different entities for streaming application content, and the security policies specify domains allowed to initiate application streaming from the application streaming service for the corresponding hosted application. A configuration interface for configuring the permitted domains and other features is also disclosed.

Patent Agency Ranking