H04L67/025

PROVIDING SERVICE SUPPORT EXTENSION DATA WITH POINT CLOUD FILE DATA
20230049384 · 2023-02-16 · ·

A point cloud file transmission method includes obtaining a point cloud file and extension information corresponding to the point cloud file, the point cloud file comprising point cloud data, the extension information providing information for a service. The service is implemented using the point cloud data. The method further includes indicating a correspondence between an item of the extension information and an item in the point cloud file by (i) the item in the point cloud file indicating an index of the item of the extension information or (ii) a file level location of the item of the extension information. The method further includes transmitting the point cloud file and the extension information to a receiving device, so that the receiving device performs the service using the point cloud data based on the extension information.

PROVIDING SERVICE SUPPORT EXTENSION DATA WITH POINT CLOUD FILE DATA
20230049384 · 2023-02-16 · ·

A point cloud file transmission method includes obtaining a point cloud file and extension information corresponding to the point cloud file, the point cloud file comprising point cloud data, the extension information providing information for a service. The service is implemented using the point cloud data. The method further includes indicating a correspondence between an item of the extension information and an item in the point cloud file by (i) the item in the point cloud file indicating an index of the item of the extension information or (ii) a file level location of the item of the extension information. The method further includes transmitting the point cloud file and the extension information to a receiving device, so that the receiving device performs the service using the point cloud data based on the extension information.

CONTEXT-AWARE INTERFACE LAYER FOR REMOTE APPLICATIONS
20230051572 · 2023-02-16 ·

Various embodiments of the present application set forth a computer-implemented method comprising receiving, at an endpoint device, a user input associated with a first remote application running on a workstation instance associated with the user, determining, based on a context associated with the user input, a first asset associated with the user input, and causing the workstation instance to modify an asset file in a local file system of the workstation instance, wherein the asset file corresponds to at least a portion of the first asset.

COORDINATING EXECUTION OF COMPUTING OPERATIONS FOR SOFTWARE APPLICATIONS
20230049332 · 2023-02-16 ·

A client-side system can include a service proxy that can receive a request to perform a computing operation from a web application that is executable in a web browser of the client-side system. The service proxy can determine if the computing operation is executable by a local execution module that is external to the web browser and local to the client-side system. The local execution module may be different from the web application and may be configured to execute one or more computing operations using computing resources local to the client-side system. If the computing operation is executable by a local execution module, the service proxy can transmit a communication to the local execution module for causing the local execution module to execute the computing operation.

Multiple application remoting

Techniques for providing remote access to application content are described herein. A virtual computing node may be leased to a first user requesting access to an application. On the virtual computing node, a virtualization process may spawn the application as a child process. In response to a second request, by the same user, to access an additional application, the virtual computing node may be identified. The virtualization process may spawn the second application as a child process in the process space of the first application. Data may be exchanged between the applications within the process space.

Multiple application remoting

Techniques for providing remote access to application content are described herein. A virtual computing node may be leased to a first user requesting access to an application. On the virtual computing node, a virtualization process may spawn the application as a child process. In response to a second request, by the same user, to access an additional application, the virtual computing node may be identified. The virtualization process may spawn the second application as a child process in the process space of the first application. Data may be exchanged between the applications within the process space.

Hidden desktop session for remote access
11582287 · 2023-02-14 · ·

Systems and methods of the present disclosure are directed to providing remote access capabilities in information technology infrastructure. In particular, systems and methods of the present disclosure can provide remotely access capabilities to facilitate the management, configuration, or maintenance of information technology infrastructure.

Hidden desktop session for remote access
11582287 · 2023-02-14 · ·

Systems and methods of the present disclosure are directed to providing remote access capabilities in information technology infrastructure. In particular, systems and methods of the present disclosure can provide remotely access capabilities to facilitate the management, configuration, or maintenance of information technology infrastructure.

Systems and methods for device communication
11582065 · 2023-02-14 · ·

Embodiments include a device comprising an interface module for interfacing with proprietary legacy systems. The interface module comprises a data interface for interfacing with a processing component of the legacy system, where the processing component uses a proprietary protocol for processing data of the legacy system. The interface module includes a protocol module that comprises a protocol corresponding to the proprietary protocol of the legacy system, and the interface module uses the protocol to exchange data with the processing component. The interface module includes a communication device that communicates with a remote system via a wireless channel. The interface module controls communications that include passing commands from the remote system to the legacy system, and passing event data of the legacy system to the remote system.

Systems and methods for device communication
11582065 · 2023-02-14 · ·

Embodiments include a device comprising an interface module for interfacing with proprietary legacy systems. The interface module comprises a data interface for interfacing with a processing component of the legacy system, where the processing component uses a proprietary protocol for processing data of the legacy system. The interface module includes a protocol module that comprises a protocol corresponding to the proprietary protocol of the legacy system, and the interface module uses the protocol to exchange data with the processing component. The interface module includes a communication device that communicates with a remote system via a wireless channel. The interface module controls communications that include passing commands from the remote system to the legacy system, and passing event data of the legacy system to the remote system.