H04L67/14

System and method for providing a customized graphical user interface based on user inputs

A system and method that provides customized graphical user interfaces on mobile devices based on user inputs. An exemplary method includes detecting a computing device remotely connected to a remote server over a network and having an active session of a software application running on the remote server. Moreover, the method further includes identifying and selecting one or more hotkey buttons based on the detected software application, transmitting the one or more hotkey buttons to the computing device to be displayed in a customized interface while the software application is active, detecting an activation of the one or more hotkey buttons displayed on the computing device, and executing, by the remote server, an operation for the active software application in response to the activation of the one or more hotkey button by the user.

IMAGE PROCESSING METHOD, APPARATUS, DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM

An image processing method includes displaying an object following page in a first session page in response to an object following operation performed on a first image, the object following page including a setting control corresponding to at least one display object in the first image. The first session page is a page corresponding to a local user account. The method also includes creating an object following relationship between a selected display object and the local user account in response to a trigger operation performed on the setting control in the object following page. The object following relationship provides an image update prompt to the local user account, the image update prompt prompting to view an image associated with the selected display object. Apparatus and non-transitory computer-readable storage medium counterpart embodiments are also contemplated.

SCREEN SHARING SESSION PRIVACY MANAGER

A screen sharing privacy manager performs method in response to initiating a screen sharing session on a computer network, in which the screen sharing session is of a first desktop environment of an operating system. A second desktop environment is generated with the operating system. The second desktop environment inaccessible to the screen sharing session. A selected item in the first desktop environment is moved to the second desktop environment based on a user profile.

MEDIA SERVER MANAGEMENT FOR COMMUNICATION SESSION

A method for communication session management by a session controller is described. Usage data associated with a video communication session is received for data stream handlers of a first network topology, which handle data streams of the video communication session at a first time. The first network topology includes a plurality of client devices and at least a first media server. A second network topology is determined based on the usage data to handle the data streams when a network parameter and/or an application parameter reaches a corresponding update threshold. Data stream handlers of the second network topology include at least a second media server. The data stream handlers of the second network topology are configured to handle the data streams at a second time, including instructing the first media server to offload at least some of the data streams to the second media server.

SYSTEMS AND METHODS TO DETECT AND PREVENT BOTS FROM RANDOM ACCESS BY RANDOMIZED HTTP URLS IN REAL TIME IN DISTRIBUTED SYSTEMS
20220417222 · 2022-12-29 · ·

Described embodiments provide systems and methods for preventing unauthorized access of information from a resource. A device intermediary between a client and a server in a session can receive a first request from the client that includes a first uniform resource locator (URL) of the server. The device may receive a response from the server that includes a second URL. The device may update the response by including a client identifier for the session in a set-cookie field, obfuscating the second URL into a string, and replacing the second URL in the response with the string. The device may receive a second request that includes a candidate client identifier, and a third URL. The device may determine whether the second request is valid, by at least one of: matching the candidate client identifier with the client identifier, and determining whether the second URL is recoverable using the third URL.

SYSTEM AND METHOD USING PEER-TO-PEER CONNECTIONS FOR A DISTRIBUTION INTERACTION SESSION

A system for facilitating a distribution interaction session between two or more user devices through peer-to-peer connections comprises a processor associated with a server. The processor is configured to receive a request from a first user device to initiate a distribution interaction session between the first user device and a second user device via a distribution interaction application. The first user device has established a peer-to-peer connection with the second user device based on geolocation information. The processor is further configured to initiate the distribution interaction session from the distribution interaction application and to receive account information from the first user device through data streaming between the first user device and the server. The processor is further configured to determine an account associated with a first user based on the received account information and to conduct the distribution interaction session between the first user and a second user.

AUTOMATED SESSION RECORDING FOR ABSENT PARTICIPANTS
20220417048 · 2022-12-29 ·

The technology disclosed herein enables recording of user communications during a communication session on behalf of a user who is unable to attend. In a particular embodiment, a method includes identifying a meeting at a meeting time when a user is unable to attend. In an automated recording system, the method includes joining a communication session for the meeting as an endpoint at the meeting time. During the communication session, the method includes receiving user communications in the automated recording system from other endpoints on the communication session. After receiving the user communications, the method includes storing the user communications to a storage system.

Methods and systems for information streaming to user interface

Methods and systems are disclosed for information streaming to a user interface via a networked contact center. In one example, a system includes communications computer circuitry to receive, at a networked contact center, a request to stream information to a user interface, the user interface being associated with the networked contact center and an agent to be contacted by others. Information streaming circuitry streams the requested information and to open a network connection between the user interface and a server of a networked contact center, and the information streaming circuitry keeps the network connection between the user interface and the server open as a persistent network connection to the user interface. The communications computer circuitry also pushes one or more events to the user interface via the persistent network connection to cause a change in the user interface without further network requests to the server from the user interface.

Methods and systems for information streaming to user interface

Methods and systems are disclosed for information streaming to a user interface via a networked contact center. In one example, a system includes communications computer circuitry to receive, at a networked contact center, a request to stream information to a user interface, the user interface being associated with the networked contact center and an agent to be contacted by others. Information streaming circuitry streams the requested information and to open a network connection between the user interface and a server of a networked contact center, and the information streaming circuitry keeps the network connection between the user interface and the server open as a persistent network connection to the user interface. The communications computer circuitry also pushes one or more events to the user interface via the persistent network connection to cause a change in the user interface without further network requests to the server from the user interface.

Sharing user context and preferences

Technology for interoperability is disclosed by enabling the sharing of user context or preferences for a computing experience across computing devices, operating systems, applications, or locations. A platform and application programming interface (API) are provided for computer applications and services to store and retrieve context data associated with a computing experience. Access to the context data for sharing may be managed by an access controller, which enables a user to manage access permissions for the sharing of the context data. The context data may be defined according to a common schema, which specifies the information for sharing and may be communicated using common communication channels or protocols. Thus context data may be shared across nearly any application or service including those developed in different computer programming languages or operating on different types of computing devices or devices running different operating systems or by different software developers.