G06F8/61

Browser-driven capture of application installations for application virtualization
11561814 · 2023-01-24 · ·

Techniques are described for performing browser-driven application capture of application installations. When the browser on the client machine detects a request to begin an application capture session, it downloads an orchestrator binary from an origin server. The orchestrator is a self-extracting executable that decompresses components responsible for preparing the client machine for the application capture session. Preparing the client machine includes starting a local web server, executing a registry script to create the necessary registry state, mounting a virtual disk, and deploying an agent that will record state changes on the client machine. Once the client machine has been prepared, the application installation can begin. During the installation process, the agent intercepts state changes occurring on the client machine and redirects them to the virtual disk. Once finished, the application capture session is completed by adding identity and metadata information to the virtual disk to generate the application package.

Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.

Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.

Out of band layer scrubbing

A computer processing system includes a processor to operate in a first computing environment. The processor creates a generic application layer by scrubbing a new application layer within the computer processing system to remove objects associated with the new application layer and specific to the first computing environment. The processor further creates within the computer processing system a single composited layered image by merging the generic application layer with at least one other application layer having objects associated therewith.

Out of band layer scrubbing

A computer processing system includes a processor to operate in a first computing environment. The processor creates a generic application layer by scrubbing a new application layer within the computer processing system to remove objects associated with the new application layer and specific to the first computing environment. The processor further creates within the computer processing system a single composited layered image by merging the generic application layer with at least one other application layer having objects associated therewith.

Using keyboard app to encrypt e-mail and other digital data
11563725 · 2023-01-24 ·

A system uses a keyboard application to encrypt and decrypt e-mail, messages, and other digital data. By using quantum random number generators, the system has improved data security. Using a quantum random number, an agent (at a sender side) generates an encryption key which is used to automatically encrypt a message. The encryption key is stored at a key server. The encrypted message will be sent by an application using its standard transmission means such as SMTP, SMS, and others. The encrypted message can be automatically unencrypted by using an agent (at a recipient side) and retrieving the key from the key server. The system also provides an optional double encryption, where the message is encrypted with a user-generated password before being encrypted using the encryption key.

Using keyboard app to encrypt e-mail and other digital data
11563725 · 2023-01-24 ·

A system uses a keyboard application to encrypt and decrypt e-mail, messages, and other digital data. By using quantum random number generators, the system has improved data security. Using a quantum random number, an agent (at a sender side) generates an encryption key which is used to automatically encrypt a message. The encryption key is stored at a key server. The encrypted message will be sent by an application using its standard transmission means such as SMTP, SMS, and others. The encrypted message can be automatically unencrypted by using an agent (at a recipient side) and retrieving the key from the key server. The system also provides an optional double encryption, where the message is encrypted with a user-generated password before being encrypted using the encryption key.

METHOD, SYSTEM, MEDIUM, AND SERVER FOR OPERATION MANAGEMENT OF ELECTRONIC DEVICES
20230018479 · 2023-01-19 · ·

The present disclosure provides a method and system for managing the operation of an electronic device, a medium, and a server. The method for managing the operation of an electronic device includes: receiving related information of idle electronic devices reported by a client by using a first application program (101a); storing the related information of each idle electronic device (102a); receiving a usage request for an idle electronic device sent by a user terminal (103a); and searching for a correspondingly matched idle electronic device according to the usage request, and sending related information of the correspondingly matched idle electronic device to the user terminal, so that the user terminal remotely controls a second desktop system of the correspondingly matched idle electronic device by using a second application program (104a). In this method, an electronic device in an idle state may be rented to others for use, realizing full utilization of the electronic device, avoiding a waste of idle resources, saving user costs, and reducing pollution.

METHOD, SYSTEM, MEDIUM, AND SERVER FOR OPERATION MANAGEMENT OF ELECTRONIC DEVICES
20230018479 · 2023-01-19 · ·

The present disclosure provides a method and system for managing the operation of an electronic device, a medium, and a server. The method for managing the operation of an electronic device includes: receiving related information of idle electronic devices reported by a client by using a first application program (101a); storing the related information of each idle electronic device (102a); receiving a usage request for an idle electronic device sent by a user terminal (103a); and searching for a correspondingly matched idle electronic device according to the usage request, and sending related information of the correspondingly matched idle electronic device to the user terminal, so that the user terminal remotely controls a second desktop system of the correspondingly matched idle electronic device by using a second application program (104a). In this method, an electronic device in an idle state may be rented to others for use, realizing full utilization of the electronic device, avoiding a waste of idle resources, saving user costs, and reducing pollution.

METHOD AND APPARATUS FOR TRANSMITTING MOBILE EDGE COMPUTING APPLICATION
20230021063 · 2023-01-19 ·

A method, performed by an electronic device, of transmitting a mobile edge application, includes obtaining information related to an execution environment of at least one pre-installed mobile edge application, receiving an installation request for a new mobile edge application, determining a mobile edge computing host for installing the new mobile edge application, based on the information related to the execution environment and the requirement information related to an execution environment of the new mobile edge application, and transmitting the new mobile edge application to the determined mobile edge computing host.