Patent application number | Description | Published |
20080208957 | Quarantine Over Remote Desktop Protocol - Described are systems and methods for implementing quarantine over a remoting protocol. The systems and methods verify whether remotely connected computing devices or client devices comply with specified system health requirements. This includes determining whether the remotely connected computing devices have correct security software installed, current operating system updates, correct configuration, etc. | 08-28-2008 |
20080209538 | Strategies for Securely Applying Connection Policies via a Gateway - A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity (e.g., a TS server) via a gateway using a remote-operating protocol (e.g., RDP). The strategy involves establishing a first secure channel between the gateway and the TS server and transmitting policy information from the gateway to the TS server. The strategy then involves deactivating the first secure channel and setting up a second secure channel between the TS client and the TS server. The strategy uses the second secure channel to transmit RDP data from the TS client to the TS server. The TS server uses the previously-transmitted policy information to determine whether to enable or disable a feature that affects the TS client, such as device redirection. | 08-28-2008 |
20090006537 | Virtual Desktop Integration with Terminal Services - An integration system is disclosed that provides a virtual desktop integration with terminal services. A client computer is connected to one the virtual desktops operating in a server. The client computer examines information contained in a remote desktop protocol (RDP) compliant packet supplied by the server. The client computer connects to one of the many virtual desktops based on information. Use of the information enables integration of the virtual desktop with the existing terminal session deployment model. Client devices can establish a session using a single network name and can be appropriately directed to either a virtual desktop or terminal session. | 01-01-2009 |
20090222531 | XML-based web feed for web access of remote resources - Techniques for XML (Extensible Markup Language) web feeds for web access of remote resources are described. In one embodiment, a method includes obtaining information regarding one or more available resources from one or more resource hosts, rendering the information regarding one or more available resources into an Extensible Markup Language (XML) document, and providing the XML document to a user device. | 09-03-2009 |
20090222565 | Centralized Publishing of Network Resources - Techniques for centralized publishing of network resources within computer networks are described. Publication of and access to the network resources are controlled from a single, centralized location, advantageously improving the uniformity of network administration responsibilities, and overall robustness of the network. | 09-03-2009 |
20090259757 | Securely Pushing Connection Settings to a Terminal Server Using Tickets - Systems and techniques for securely pushing connection settings to a terminal server using tickets are described. In one embodiment, a request is received at a first network component from a client for access to a second network component. A ticket associated with one or more connection settings is created and provided to the client. The ticket is provided by the client to the second network component. The ticket is provided from the second network component to the first network component, and the one or more connection settings associated with the ticket are received from the first network component back to the second network component. The one or more connection settings are enforced at the second network component. | 10-15-2009 |
20090276667 | Session Broker Extensibility Application Program Interface - Described are techniques for providing an application program interface that leverages the terminal services session broker infrastructure to support third party plug-in applications. In a typical scenario, when a user requests for a connection to access third party plug-in applications, the application program interface may override the session broker logic and interacts with the session broker process to identify sessions or suitable servers to which the user can be connected. The user may access the third party plug-in applications through the identified sessions or suitable servers. | 11-05-2009 |
20090327905 | INTEGRATED CLIENT FOR ACCESS TO REMOTE RESOURCES - Techniques for discovering, connecting to, disconnecting from, reconnecting to, updating, and removing workspaces are described. In one embodiment, a list of discovered workspaces is maintained on a user device. Shortcuts for resources corresponding to each respective one of the discovered workspaces are integrated into a user interface of the user device. A request to access one of the resources contained in one of the discovered workspaces is received. Responsive to receiving the request, a connection from the user device to one or more resource hosts containing the resources corresponding to the indicated one of the discovered workspaces is opened. Access from the user device to the resources stored on the resource host(s) corresponding to the indicated one of the discovered workspaces is enabled by presenting shortcuts for resources corresponding to the discovered workspaces as though they were local resources. | 12-31-2009 |
20090328182 | ENABLING TWO-FACTOR AUTHENTICATION FOR TERMINAL SERVICES - Techniques for enabling two-factor authentication for terminal services are described. A client receives an authentication token from an authentication server. The authentication token is used as a factor for authenticating the client to a terminal services device. Native authentication of the client is also performed. | 12-31-2009 |
20100131654 | PLATFORM FOR ENABLING TERMINAL SERVICES VIRTUALIZATION - Disclosed are techniques for providing a platform and application program interface (API) that leverages a terminal services session broker infrastructure to support third party plug-in applications. In a typical scenario, when a user requests for a connection to access third party plug-in applications, the application program interface may interact with the session broker process to identify sessions or suitable servers to which the user can be connected. The user may access the third party plug-in applications through the identified sessions or suitable servers. | 05-27-2010 |
20110153716 | ENABLING VIRTUAL DESKTOP CONNECTIONS TO REMOTE CLIENTS - Disclosed are techniques for providing a platform that allows a user to remotely establish a connection with a virtual machine operating on a server farm In a typical scenario, when a user requests for a connection to access third party plug-in applications, the application program interface may interact with the session broker process to identify sessions or suitable servers to which the user can be connected. The user may access the third party plug-in applications through the identified sessions or suitable servers. | 06-23-2011 |
20110153838 | SESSION MONITORING OF VIRTUAL DESKTOPS IN A VIRTUAL MACHINE FARM - Disclosed are techniques for determining the status of virtual machine sessions on a computing device for a user by reading from a memory location written to by a program executing within a virtual machine. The memory location is preferably a registry key that contains the status of a remote user session operating on a guest operating system operational on the virtual machine, the virtual machine executing in a virtual environment comprising a plurality of virtual machines operating on a computing device. | 06-23-2011 |
20110153853 | REMOTE APPLICATION PRESENTATION OVER A PUBLIC NETWORK CONNECTION - Web access over a public network for applications that operate on virtual desktops on a plurality of servers is facilitated. Through the web access the user is provided with the information necessary to establish a connection with an application by way of the virtual desktop. Applications that the user is authorized to access are determined and those applications that the user is not authorized to access are filtered out. The applications associated access control list is used for determining the user's access to discover an application. | 06-23-2011 |
20110307614 | Techniques For Efficient Remote Presentation Session Connectivity And Routing - Techniques are disclosed for efficient remote presentation session connectivity and routing. In an embodiment, the roles of a remote presentation session deployment involved in receiving a connection from a client and determining a virtual machine (VM) to serve the client's remote presentation session are consolidated on one or more servers of the deployment that host such VMs. When this consolidated role receives a connection set up communication from a client, it uses information local to it and its server to determine a VM to serve the remote presentation session. Where the deployment comprises a plurality of such servers, the consolidated role may communicate with an inter-server connection broker to determine a different server that will conduct the remote presentation session. | 12-15-2011 |
20120084381 | Virtual Desktop Configuration And Operation Techniques - Techniques for configuring and operating a virtual desktop session are disclosed herein. In an exemplary embodiment, an inter-partition communication channel can be established between a virtualization platform and a virtual machine. The inter-partition communication channel can be used to configure a guest operating system to conduct virtual desktop sessions and manage running virtual desktop sessions. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures. | 04-05-2012 |
20120084570 | Remote Resources Single Sign On - Exemplary techniques for enabling single sign-on to an operating system configured to conduct a remote presentation session are disclosed. In an exemplary embodiment, a user credential can be encrypted using an encryption key generated by a remote presentation session server and sent to a client. The client can send the encrypted user credential to the remote presentation session server. The remote presentation session server can decrypt the user credential and use it to log a user into an operating system running on the remote presentation session server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures. | 04-05-2012 |
20120084775 | Techniques for Streaming Virtual Machines from a Server to a Host - Techniques for configuring a commodity server to host virtual hard disks are disclosed herein. In an exemplary embodiment, a virtual hard disk file can be split into a plurality of differencing VHD files and one or more of the files can be downloaded to a virtualization host as it runs off the VHD files stored on the server. After the one or more VHD files are downloaded, the virtualization host can be configured to use the local copy instead of the copy on the commodity server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures. | 04-05-2012 |
20120203911 | XML-BASED WEB FEED FOR WEB ACCESS OF REMOTE RESOURCES - Techniques for XML (Extensible Markup Language) web feeds for web access of remote resources are described. In one embodiment, a method includes obtaining information regarding one or more available resources from one or more resource hosts, rendering the information regarding one or more available resources into an Extensible Markup Language (XML) document, and providing the XML document to a user device. | 08-09-2012 |
20130125215 | REMOTE APPLICATION PRESENTATION OVER A PUBLIC NETWORK CONNECTION - Web access over a public network for applications that operate on virtual desktops on a plurality of servers is facilitated. Through the web access the user is provided with the information necessary to establish a connection with an application by way of the virtual desktop. Applications that the user is authorized to access are determined and those applications that the user is not authorized to access are filtered out. The applications associated access control list is used for determining the user's access to discover an application. | 05-16-2013 |