ENABLING SCREEN-SHARE IN ONLINE MEETING PLATFORM BASED ON VIRTUAL DESKTOP

    公开(公告)号:US20220382568A1

    公开(公告)日:2022-12-01

    申请号:US17329696

    申请日:2021-05-25

    Abstract: A method comprises: at a computer device configured with user applications grouped in multiple virtual desktops hosted on and displayed by the computer device: establishing an online meeting with remote computer devices over a network; responsive to user input, selecting one of the multiple virtual desktops to be a shared virtual desktop, such that all other ones of the multiple virtual desktops become unshared virtual desktops; sharing, with the remote computer devices, the shared virtual desktop, including first user applications of the user applications that are grouped in the shared virtual desktop; and not sharing, with the remote computer devices, any of the unshared virtual desktops and second user applications of the user applications that are grouped in the unshared virtual desktops.

    DISTRIBUTED DENIAL OF SERVICE MITIGATION FOR WEB CONFERENCING

    公开(公告)号:US20190387020A1

    公开(公告)日:2019-12-19

    申请号:US16551280

    申请日:2019-08-26

    Abstract: A web conferencing operator can enable participants to share multimedia content in real-time despite one or more of the participants operating from behind a middlebox via network address translation (NAT) traversal protocols and tools, such as STUN, TURN, and/or ICE. In NAT traversal, participants share a transport addresses that the participants can use to establish a joint media session. However, connectivity checks during NAT traversal can expose a media distribution device hosted by the web conferencing operator to various vulnerabilities, such as distributed denial of service (DDoS) attacks. The web conferencing operator can minimize the effects of a DDoS attack during the connectivity checks at scale and without significant performance degradation by configuring the middlebox to validate incoming requests for the connectivity checks without persistent signaling between the web conference operator and the middlebox.

    Distributed denial of service mitigation for web conferencing

    公开(公告)号:US10397271B2

    公开(公告)日:2019-08-27

    申请号:US15646429

    申请日:2017-07-11

    Abstract: A web conferencing operator can enable participants to share multimedia content in real-time despite one or more of the participants operating from behind a middlebox via network address translation (NAT) traversal protocols and tools, such as STUN, TURN, and/or ICE. In NAT traversal, participants share a transport addresses that the participants can use to establish a joint media session. However, connectivity checks during NAT traversal can expose a media distribution device hosted by the web conferencing operator to various vulnerabilities, such as distributed denial of service (DDoS) attacks. The web conferencing operator can minimize the effects of a DDoS attack during the connectivity checks at scale and without significant performance degradation by configuring the middlebox to validate incoming requests for the connectivity checks without persistent signaling between the web conference operator and the middlebox.

    Method and system for enabling media optimization in a cloud conference

    公开(公告)号:US10397183B2

    公开(公告)日:2019-08-27

    申请号:US15347832

    申请日:2016-11-10

    Abstract: An example method is provided and includes receiving a relay address allocation request from an endpoint, the relay address allocation request comprises a unique session identifier that identifies a conference session joined by the endpoint for media streaming; determining a relay candidate comprising a relay transport address for allocating to each endpoint of the conference session having the unique session identifier. Further, the method includes mapping the relay candidate with the unique session identifier and sending a relay address allocation response that comprises at least the relay candidate mapped with the unique session identifier. The method further includes receiving a single copy of one or more media stream packets from the conference controller and relaying the one or more media stream packets via the relay transport address identified by the unique session identifier to each of the one or more endpoints in the session having the unique session identifier.

    VEHICLE-TO-INFRASTRUCTURE (V2I) ACCIDENT MANAGEMENT

    公开(公告)号:US20180308344A1

    公开(公告)日:2018-10-25

    申请号:US15492559

    申请日:2017-04-20

    CPC classification number: G08B27/001 B60R21/00 B60R2021/0027 G16H10/60

    Abstract: In one embodiment, a computing device determines that a vehicle has been in an accident. The computing device also receives virtual black box data having a finite time period of recorded data from sensors that were in an operating mode during the finite time period prior to the accident, as well as a stream of data from sensors that changed to an accident mode in response to the accident. The computing device may then coordinate the virtual black box data and the stream of data for distribution to accident-based services. In another embodiment, a computing device determines identities of vehicle occupants. In response to an accident at a location, the device further determines one or more emergency services responsive to the accident at the location. As such, the device may then provide access to medical records of the occupants to devices associated with the determined emergency services.

    Encrypted data packet forwarding
    9.
    发明授权

    公开(公告)号:US11956221B2

    公开(公告)日:2024-04-09

    申请号:US17553375

    申请日:2021-12-16

    Abstract: A method of transmitting an encrypted data packet includes, with a processor, in response to receiving the encrypted data packet, executing an extended Berkeley packet filter (eBPF) application at an express data path (XDP) hook point located within a kernel space, determining whether the encrypted data packet is to be processed via a trusted application (TA) within a trusted execution environment (TEE) based on an analysis by the eBPF application, and identifying application intelligence data defining packet forwarding decisions based on a manner in which the encrypted data packet is processed.

Patent Agency Ranking