H04L61/4523

Managing a virtualized application workspace on a managed computing device

Methods and systems for providing load balancing are provided. Example embodiments provide a Application Workspace System “AWS” which enables users to access remote server-based applications using the same interface that they use to access local applications, without needing to know where the application is being accessed. In one embodiment, a load balancing message bus is provided that performs load balancing and resource discovery within the AWS. For example, the AWS may use a broadcast message-bus based load balancing to determine which servers to use to launch remote application access requests or to perform session management. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.

Fingerprinting to identify devices and applications for use in management and policy in the cloud

Systems and methods include obtaining a plurality of parameters associated with a host; determining a fingerprint of the host utilizing the plurality of parameters; and providing the fingerprint to cloud service for enrollment and management of the host in the cloud service. The cloud service can include microsegmentation of the host. The cloud service can include any of Internet access for the host and private resource access by the host.

MANAGEMENT OF USER AUTHENTICATION BETWEEN ENTERPRISE-LEVEL AUTHENTICATION PROTOCOL AND CLOUD-NATIVE AUTHENTICATION PROTOCOL

Examples described herein relate to an authentication management system and a method for managing authentication of a user between an enterprise-level authentication protocol and a cloud-native authentication protocol. The authentication management system may receive an authentication request from an application hosted on a private on-premise network to authenticate a user using the enterprise-level authentication protocol. The authentication request is generated by the application upon receiving an access request from the user via a software as-a-service (SaaS) cloud platform in a cloud-native authentication protocol. Further, the authentication management system may generate an authentication response compliant with the enterprise-level authentication protocol based on an authentication reply that is formatted in compliance to the cloud-native authentication protocol and received from a cloud-native identity and authentication management system based on the authentication request. The authentication management system may then send the authentication response to the application.

Mapping of personally-identifiable information to a person based on natural language coreference resolution
11741163 · 2023-08-29 · ·

Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.

Mapping of personally-identifiable information to a person based on natural language coreference resolution
11741163 · 2023-08-29 · ·

Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.

CALL SCREENING SERVICE FOR DETECTING FRAUDULENT INBOUND/OUTBOUND COMMUNICATIONS WITH SUBSCRIBER DEVICES

An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.

CALL SCREENING SERVICE FOR DETECTING FRAUDULENT INBOUND/OUTBOUND COMMUNICATIONS WITH SUBSCRIBER DEVICES

An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.

SYSTEM AND METHOD FOR TRACKING AND INSTALLING MISSING SOFTWARE APPLICATIONS
20230259344 · 2023-08-17 ·

A method for tracking and installing missing software applications and other computer resource assets on a target list includes scanning a port for the missing computer resource asset, and, if the port is not active, pinging the missing computer resource asset and either remediating the missing computer resource or performing a reverse lookup of an IP address of the pinged computer resource asset to obtain a reverse lookup name, depending on whether there is a response to the ping. Actual computer resource asset names which match the reverse lookup name are checked whether enabled in an active directory database in which case the pinged computer resource asset is enabled, and in the absence of a match, a check is made whether the reverse lookup name is missing from a separate target list, in which case the pinged computer resource asset is remediated. The system implements the method.

Managing a virtualized application workspace on a managed computing device

Methods and systems for providing load balancing are provided. Example embodiments provide an Application Workspace System “AWS” which enables users to access remote server-based applications using the same interface that they use to access local applications, without needing to know where the application is being accessed. In one embodiment, a load balancing message bus is provided that performs load balancing and resource discovery within the AWS. For example, the AWS may use a broadcast message-bus based load balancing to determine which servers to use to launch remote application access requests or to perform session management. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.

Managing a virtualized application workspace on a managed computing device

Methods and systems for providing load balancing are provided. Example embodiments provide an Application Workspace System “AWS” which enables users to access remote server-based applications using the same interface that they use to access local applications, without needing to know where the application is being accessed. In one embodiment, a load balancing message bus is provided that performs load balancing and resource discovery within the AWS. For example, the AWS may use a broadcast message-bus based load balancing to determine which servers to use to launch remote application access requests or to perform session management. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.