Abstract:
Described embodiments provide systems and methods for sharing authentication data between devices for access to application or web resources. The access manager on a first device may receive a first request for a credential maintained at the first device. The credential may be to access a resource via a second device. The access manager may initiate, responsive to the request, a second request for an approval at the first device or the second device. The access manager may access, responsive to receiving the approval, the credential from a secure store. The secure store may securely maintain information of a plurality of credentials. The access manager may transmit the credential to the second device to authenticate a user to access the resource.
Abstract:
Described embodiments provide systems and methods for context aware frictionless authentication. A server may determine authentication method information, contextual scores and contextual weights of a device, in connection with a user request to access a resource via the device. The authentication method information may include a weight and a completion duration for each of a plurality of authentication methods available via the device. The server may determine an authentication score for each of the plurality of authentication methods using the authentication method information, the contextual scores and the contextual weights of the device. The server may identify a first authentication method from the plurality of authentication methods, according to the determined authentication score. The server may authenticate the user request via the first authentication method using a first device that supports the first authentication method.
Abstract:
The embodiments are directed to methods and systems for sending and receiving signals between one or more peripheral devices connected to a dongle system and an operating system. The methods and systems can detect when a dongle system has been connected to a mobile computing device. The methods and systems can receive an input to use the dongle system with a local operating system or a remote operating system. The methods and systems can also establish a communication channel between the local operating system and the remote operating system, and exchange signals between the dongle system and the remote operating system using one or more virtual filters.
Abstract:
The embodiments are directed to methods and systems for sending and receiving signals between one or more peripheral devices connected to a dongle system and an operating system. The methods and systems can detect when a dongle system has been connected to a mobile computing device. The methods and systems can receive an input to use the dongle system with a local operating system or a remote operating system. The methods and systems can also establish a communication channel between the local operating system and the remote operating system, and exchange signals between the dongle system and the remote operating system using one or more virtual filters.
Abstract:
Described embodiments provide systems and methods for contextual confidence scoring-based access control. The systems and methods can include one or more processors configured to receive a request from the client device to access an item of content. The one or more processors can select a first subset of authentication techniques. The authentication techniques identifiable with a score. The one or more processors can determine that a sum of the scores of the selected first subset of the authentication techniques exceeds a threshold. The one or more processors can transmit, to the client device, one or more authentication requests utilizing the selected first subset of authentication techniques. The one or more processors can provide, responsive to successful authentication by the client device, access to the item of content to the client device.
Abstract:
Methods and systems for resource allocation using data from a variety of systems are described herein. A plurality of periods of time for using one or more resources may be identified based on a user request. Data indicative of locations of one or more users over one or more time periods may be received. Such data may be from an application other than a calendar application. Anticipated locations of the one or more users may be determined based on the data received. A resource of the one or more resources may be selected based on a distance between the resource and the anticipated locations of the one or more users. Based on detecting a change to the data, a new resource may be selected.
Abstract:
Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein.
Abstract:
Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein.
Abstract:
Methods and systems for resource allocation using data from a variety of systems are described herein. A plurality of periods of time for using one or more resources may be identified based on a user request. Data indicative of locations of one or more users over one or more time periods may be received. Such data may be from an application other than a calendar application. Anticipated locations of the one or more users may be determined based on the data received. A resource of the one or more resources may be selected based on a distance between the resource and the anticipated locations of the one or more users. Based on detecting a change to the data, a new resource may be selected.
Abstract:
The embodiments are directed to methods and systems for sending and receiving signals between one or more peripheral devices connected to a dongle system and an operating system. The methods and systems can detect when a dongle system has been connected to a mobile computing device. The methods and systems can receive an input to use the dongle system with a local operating system or a remote operating system. The methods and systems can also establish a communication channel between the local operating system and the remote operating system, and exchange signals between the dongle system and the remote operating system using one or more virtual filters.