This patent application is related to co-pending, commonly-owned U.S. patent application Ser. No. 12/039,725 entitled “XML-Based Web Feed for Web Access of Remote Resources,” filed concurrently herewith under Attorney Docket No. MS1-3651US, and co-pending, commonly-owned U.S. patent application Ser. No. 11/771,921 entitled “Virtual Desktop Integration with Terminal Services,” filed on Jun. 29, 2007, which applications are incorporated herein by reference.
Terminal servers are typically special purpose computers that are used to connect a number of devices to one or more hosts or servers. Terminal servers may be particularly configured to facilitate communications between various components of a network. In some cases, terminal servers may be used to publish applications available on the hosts or servers to various other devices on the network. Networks having many devices may require groups of terminal servers (or “TS farms”) to provide the required communication capability.
In conventional networks having multiple terminal servers, the database of which applications are currently published is replicated on multiple servers, leading to potential fragility. Similarly, an “Allow List” (a list which defines privileges of the various network devices to access the applications available on the host) is stored at each terminal server within the network (or a TS farm). If the data in any of these multiple storage locations of a network gets out of sync, service to end-users may be degraded, and the problems encountered may be difficult to diagnose. When a new application is made available, each Allow List stored at each storage location in the network must be manually updated. In short, although desirable results have been achieved using conventional terminal server publishing systems, there is room for improvement.
Techniques for centralized publishing of resources on a computer network are described. Both publication of and access to the network resources are controlled from a single, centralized location. This advantageously removes the dependency of who controls access to the network resources from the particular publishing technology, thereby improving the uniformity of network administration responsibilities, and may also improve the overall efficiency and robustness of network resource publishing activities.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The detailed description is described with reference to the accompanying figures. In the figures, the use of the same reference numbers in different figures indicates similar or identical items.
Techniques for centralized publishing of resources on a computer network are disclosed herein. Generally, a single, centralized capability administers publication and access control to network resources, without regard for the particular publishing technology used by the network. As used herein, the term “resources” includes applications, patches and upgrades, desktops, directories, documents, data, or any other suitable computer resources that may be installed and shared to multiple entities throughout a network environment. Thus, rather than having multiple publications and multiple allow lists throughout a network pertaining to network resources, the administration of network resources is centralized. Embodiments in accordance with the present disclosure may thereby improve the efficiency of resource administration activities, the consistency of network resource privileges, and the overall robustness of the computer network.
It will be appreciated that various modules and techniques may be described herein in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, and so forth for performing particular tasks or implementing particular abstract data types. These program modules and the like may be executed as native code or may be downloaded and executed, such as in a virtual machine or other just-in-time compilation execution environment. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments. An implementation of these modules and techniques may be stored on or transmitted across some form of computer readable media.
Referring again to
In the embodiment shown in
The administration tool 140 may be configured to allow a variety of different administrative functions to be performed on the network 400. For example, the administration tool 140 may permit network resources 116 to be installed on the resource hosts 114, and may specify which publishing databases are trusted to control the network resources 116 on the resource hosts 114, and may allow revision of the allow list 152. The administration tool 140 may also install the publishing role on the centralized database 150 (or other component of the network 100), may set up one or more locations or databases of network resources 116, and control which network resources are published from which resource hosts to which users (or user-groups), and specify any additional constraints on the access of such network resources 116. The administration tool 140 may also make a list of resource hosts 114 (or publishing databases) more (or less) discoverable throughout the network 100, including an ability to lock down the list of publishing databases if so desired. The administration tool 140 may also control the ability of the portal 112 to access a set of resource hosts 114 (or publishing databases), and determine the set of resource hosts 114 the client 110 will see available.
A second way of accessing the central database 150 is via the portal 112, which permits access to the database 150 to query which network resources are available for a particular client 110. For example, in some embodiments, the portal 112 may be used to render a list of network resources (e.g. applications) to the client 110 that may be launched remotely by the client 110. More specifically, for each network resource, the portal 112 may make Remote Desktop Protocol (RDP) settings defined by the administration tool 140 available to the client 110, so that an end-user doesn't have to specify settings themselves. Such RDP settings may advantageously allow many settings to be controlled by a network administrator using the administration tool 140, such as, for example, whether the client 110 needs to turn on drive-redirection when accessing a particular Terminal Server.
In some embodiments, the portal 112 may receive a user identity from the client 110, and may return to the client 110 a list of network resources 116 available for access. For each network resource 116, the portal 112 may provide, for example, a name of the network resource 116, an icon for display, a resource host 114 (e.g. Terminal Server) on which to access the network resource 116, and a communication protocol to use when accessing the network resource 116 (e.g. RDP).
Third, the broker 120 may access the centralized database 150 to determine which portion of the network 100 (e.g. Terminal Server, etc.) is best suited to launch the network resource requested by the client 110. More specifically, the broker 120 may perform one or more of the brokering activities described above. In further embodiments, the broker 120 may perform one or more of the brokering activities described in previously-incorporated, commonly-owned U.S. patent application Ser. No. 11/771,921 entitled “Virtual Desktop Integration with Terminal Services,” filed on Jun. 29, 2007. For example, in some embodiments, the broker 120 may receive the identity of the user from the client 110, along with the identity of the network resource 116 that the user desires to access. In turn, after the broker 120 accesses the centralized database 150, the broker 120 may provide an identity of the resource host 114 upon which to access the network resource 116, and a specified communication protocol to use for accessing the network resource 116.
For convenience, the data flow diagram 300 will be described with reference to the exemplary network 100 of
At 304, the centralized database 150 is configured to make one or more of the installed network resources 116 available to the client 110. For example, an administrator may use the administration tool 140 to configure the centralized database 150 to make certain network resources 116 available (or unavailable) to the client 110. In some embodiments, the network resources 116 (e.g. applications) may be made available to certain user groups via an “allow list.”
The centralized database 150 may be queried at 306 to determine which network resources are available to the client 110. For example, the centralized database 150 may be queried for a list of available network resources 116 that may be accessed by the client 110. Alternately, the centralized database 150 may be queried about a privilege of the client 110 to access a particular network resource 116. In the embodiment shown in
At 308, the client 110 elects to access a network resource 116. In some embodiments, the election of the network resource 116 may be accomplished by transmitting a resource-specific token (e.g. an application token) to the broker 120 via a suitable communication protocol (e.g. RDP). At 310, the centralized database 150 is queried to determine whether the client 110 is authorized to access the network resource 116. In some embodiments, the broker 120 queries the centralized database 150 as part of the brokering activities performed by the broker 120. At 312, if authorized, the client 110 accesses the selected network resource 116. The data flow diagram 300 may then end. Optionally, the data flow diagram 300 may return to 302 to repeat the above-described process, or may even return to electing to access other available network resources 116 at 308.
Techniques for centralized publishing of network resources in accordance with the present disclosure may provide significant advantages over the prior art. For example, such techniques may provide a single, centralized capability to publish and control access to network resources within a computer network, without regard for the particular publishing technology used by the network. The conventional practice of providing numerous access control lists distributed throughout the network may therefore be replaced with a single centralized database that controls such access throughout the network. As a result, the administrative activities associated with publishing and allowing network resources may be significantly simplified, and the efficiency and consistency of such activities greatly improved. Also, the overall robustness of the computer network may be considerably improved.
It will be appreciated that a variety of alternate embodiments may be conceived in accordance with the teachings of the present disclosure. For example,
As further shown in
In some embodiments, at least some of the communications with the data server abstraction layer 406 may be aliased. For example, if an aliased communication 418 specified “ICA/Wordpad,” the aliased communication 418 may be interpreted by the client 110 to mean the network resource “Wordpad” accessed using an ICA (Independent Computer Architecture) remoting protocol, such as the ICA protocol available from Citrix Systems of Fort Lauderdale, Fla. Of course, other aliasing schema may be employed.
As shown in
An administration tool 440 operatively communicates with one or more groups of resource hosts 442 (e.g. Terminal Server farms) that host one or more network resources. In turn, the groups of resource hosts 442 communicate with the centralized database 450 to update an allow list 452 that resides on the centralized database 450 and controls access to the network resources by the client 410 and other components of the network 400.
The network 400 shown in
Furthermore, in some embodiments, since access control settings are pushed to the groups of resource hosts 442, if a particular machine or group of resource hosts 442 is unreachable, there may be situations where the settings become out of synch. The network 400 remedies this situation by providing the centralized database 450 as the back-end to store the settings, so that checking to see if a network resource is allowed to be launched is accomplished by querying the centralized database 450.
In addition to the advantages described above with respect to the network embodiment shown in
Similarly,
In addition to the advantages described above with respect to the network embodiments shown in
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claims.
Number | Name | Date | Kind |
---|---|---|---|
5220674 | Morgan et al. | Jun 1993 | A |
5682478 | Watson et al. | Oct 1997 | A |
5764887 | Kells et al. | Jun 1998 | A |
5790853 | Nomura et al. | Aug 1998 | A |
5815574 | Fortinsky | Sep 1998 | A |
5884046 | Antonov | Mar 1999 | A |
5949975 | Batty et al. | Sep 1999 | A |
6049828 | Dev et al. | Apr 2000 | A |
6154787 | Urevig et al. | Nov 2000 | A |
6167445 | Gai et al. | Dec 2000 | A |
6310889 | Parsons et al. | Oct 2001 | B1 |
6452692 | Yacoub | Sep 2002 | B1 |
6463454 | Lumelsky et al. | Oct 2002 | B1 |
6463459 | Orr et al. | Oct 2002 | B1 |
6470384 | O'Brien et al. | Oct 2002 | B1 |
6473794 | Guheen et al. | Oct 2002 | B1 |
6510523 | Perlman et al. | Jan 2003 | B1 |
6519571 | Guheen et al. | Feb 2003 | B1 |
6536037 | Guheen et al. | Mar 2003 | B1 |
6552813 | Yacoub | Apr 2003 | B2 |
6560609 | Frey et al. | May 2003 | B1 |
6571245 | Huang et al. | May 2003 | B2 |
6594684 | Hodjat et al. | Jul 2003 | B1 |
6615166 | Guheen et al. | Sep 2003 | B1 |
6654807 | Farber et al. | Nov 2003 | B2 |
6675198 | Hagiwara et al. | Jan 2004 | B1 |
6714987 | Amin et al. | Mar 2004 | B1 |
6721713 | Guheen et al. | Apr 2004 | B1 |
6732117 | Chilton | May 2004 | B1 |
6816905 | Sheets et al. | Nov 2004 | B1 |
6836786 | Zoller et al. | Dec 2004 | B1 |
6854016 | Kraenzel et al. | Feb 2005 | B1 |
6915345 | Tummala et al. | Jul 2005 | B1 |
6922724 | Freeman et al. | Jul 2005 | B1 |
6954930 | Drake et al. | Oct 2005 | B2 |
6957186 | Guheen et al. | Oct 2005 | B1 |
6970902 | Moon | Nov 2005 | B1 |
6973482 | Mohammed et al. | Dec 2005 | B2 |
6976262 | Davis et al. | Dec 2005 | B1 |
6999912 | Loisey et al. | Feb 2006 | B2 |
7080404 | Abdo et al. | Jul 2006 | B2 |
7096248 | Masters et al. | Aug 2006 | B2 |
7100199 | Ginter et al. | Aug 2006 | B2 |
7111060 | Araujo et al. | Sep 2006 | B2 |
7130891 | Bernardin et al. | Oct 2006 | B2 |
7149698 | Guheen et al. | Dec 2006 | B2 |
7165041 | Guheen et al. | Jan 2007 | B1 |
7181302 | Bayne | Feb 2007 | B2 |
7257613 | Boudnik et al. | Aug 2007 | B2 |
7269580 | Matichuk | Sep 2007 | B2 |
7299274 | Rajarajan et al. | Nov 2007 | B2 |
7313588 | Shotton, Jr. et al. | Dec 2007 | B1 |
7330872 | Peart et al. | Feb 2008 | B2 |
7340654 | Bigagli et al. | Mar 2008 | B2 |
7363363 | Dal Canto et al. | Apr 2008 | B2 |
7502726 | Panasyuk et al. | Mar 2009 | B2 |
7584274 | Bond et al. | Sep 2009 | B2 |
7633483 | Ben-Schachar et al. | Dec 2009 | B2 |
8161160 | London et al. | Apr 2012 | B2 |
8272045 | Azeez et al. | Sep 2012 | B2 |
20010047406 | Araujo et al. | Nov 2001 | A1 |
20020026590 | Kusunoki | Feb 2002 | A1 |
20020059073 | Zondervan et al. | May 2002 | A1 |
20020072974 | Pugliese, III et al. | Jun 2002 | A1 |
20020122056 | Bhesania et al. | Sep 2002 | A1 |
20020124082 | San Andres et al. | Sep 2002 | A1 |
20020129054 | Ferguson et al. | Sep 2002 | A1 |
20020174359 | Haltmeyer | Nov 2002 | A1 |
20020198965 | Kraft | Dec 2002 | A1 |
20030055968 | Hochmuth et al. | Mar 2003 | A1 |
20030126236 | Marl et al. | Jul 2003 | A1 |
20030126265 | Aziz et al. | Jul 2003 | A1 |
20030140143 | Wolf et al. | Jul 2003 | A1 |
20030182392 | Kramer | Sep 2003 | A1 |
20030195950 | Huang et al. | Oct 2003 | A1 |
20030217166 | Dal Canto et al. | Nov 2003 | A1 |
20040010786 | Cool et al. | Jan 2004 | A1 |
20040039827 | Thomas et al. | Feb 2004 | A1 |
20040045004 | Cheenath | Mar 2004 | A1 |
20040073621 | Sampson | Apr 2004 | A1 |
20040103339 | Chalasani et al. | May 2004 | A1 |
20040107125 | Guheen et al. | Jun 2004 | A1 |
20040111519 | Fu et al. | Jun 2004 | A1 |
20040167984 | Herrmann | Aug 2004 | A1 |
20040205473 | Fisher et al. | Oct 2004 | A1 |
20040213220 | Davis | Oct 2004 | A1 |
20040250130 | Billharz et al. | Dec 2004 | A1 |
20050010926 | Narayanaswamy et al. | Jan 2005 | A1 |
20050027784 | Fusari | Feb 2005 | A1 |
20050027787 | Kuhn et al. | Feb 2005 | A1 |
20050044225 | Ota et al. | Feb 2005 | A1 |
20050080909 | Panasyuk et al. | Apr 2005 | A1 |
20050080915 | Shoemaker et al. | Apr 2005 | A1 |
20050097506 | Heumesser | May 2005 | A1 |
20050125529 | Brockway et al. | Jun 2005 | A1 |
20050125530 | Brockway et al. | Jun 2005 | A1 |
20050125560 | Brockway et al. | Jun 2005 | A1 |
20050125739 | Thompson et al. | Jun 2005 | A1 |
20050182838 | Sheets et al. | Aug 2005 | A1 |
20050198303 | Knauerhase et al. | Sep 2005 | A1 |
20050198310 | Kim et al. | Sep 2005 | A1 |
20050251855 | Brandstatter | Nov 2005 | A1 |
20050267972 | Costa-Requena et al. | Dec 2005 | A1 |
20050267974 | Panasyuk et al. | Dec 2005 | A1 |
20060010125 | Beartusk et al. | Jan 2006 | A1 |
20060015740 | Kramer | Jan 2006 | A1 |
20060026235 | Schwarz et al. | Feb 2006 | A1 |
20060026284 | Nguyen | Feb 2006 | A1 |
20060029063 | Rao et al. | Feb 2006 | A1 |
20060052998 | Michelman | Mar 2006 | A1 |
20060069797 | Abdo et al. | Mar 2006 | A1 |
20060070131 | Braddy et al. | Mar 2006 | A1 |
20060112181 | Affaki | May 2006 | A1 |
20060136389 | Cover et al. | Jun 2006 | A1 |
20060142878 | Banik et al. | Jun 2006 | A1 |
20060143067 | Calabria | Jun 2006 | A1 |
20060143703 | Hopen et al. | Jun 2006 | A1 |
20060149567 | Muller et al. | Jul 2006 | A1 |
20060195895 | Ben-Shachar et al. | Aug 2006 | A1 |
20060230105 | Shappir et al. | Oct 2006 | A1 |
20060230156 | Shappir et al. | Oct 2006 | A1 |
20060230438 | Shappir et al. | Oct 2006 | A1 |
20060235851 | Akachi | Oct 2006 | A1 |
20060236325 | Rao et al. | Oct 2006 | A1 |
20060248180 | Bernardi et al. | Nov 2006 | A1 |
20060282855 | Margulis | Dec 2006 | A1 |
20070005595 | Gafter | Jan 2007 | A1 |
20070033290 | Valen, III et al. | Feb 2007 | A1 |
20070055650 | Duncan et al. | Mar 2007 | A1 |
20070061266 | Moore et al. | Mar 2007 | A1 |
20070094389 | Nussey et al. | Apr 2007 | A1 |
20070100900 | Gibbins | May 2007 | A1 |
20070124373 | Chatterjee et al. | May 2007 | A1 |
20070150551 | Krishnan et al. | Jun 2007 | A1 |
20070156687 | Idicula et al. | Jul 2007 | A1 |
20070156809 | Dickinson et al. | Jul 2007 | A1 |
20070162749 | Lim | Jul 2007 | A1 |
20070168525 | DeLeon, III et al. | Jul 2007 | A1 |
20070180448 | Low et al. | Aug 2007 | A1 |
20070192329 | Croft et al. | Aug 2007 | A1 |
20070198656 | Mazzaferri et al. | Aug 2007 | A1 |
20070203972 | Wewalaarachchi et al. | Aug 2007 | A1 |
20070233804 | Palekar et al. | Oct 2007 | A1 |
20070244966 | Stoyanov et al. | Oct 2007 | A1 |
20070245240 | Hudson, Jr. | Oct 2007 | A1 |
20070260738 | Palekar et al. | Nov 2007 | A1 |
20070282951 | Selimis et al. | Dec 2007 | A1 |
20080015927 | Ramirez | Jan 2008 | A1 |
20080034071 | Wilkinson et al. | Feb 2008 | A1 |
20080034408 | Duggal | Feb 2008 | A1 |
20080127348 | Largman et al. | May 2008 | A1 |
20080134314 | Hamid | Jun 2008 | A1 |
20080137133 | Trappe | Jun 2008 | A1 |
20080163171 | Chess et al. | Jul 2008 | A1 |
20080209538 | Malakapalli et al. | Aug 2008 | A1 |
20080222299 | Boodaei | Sep 2008 | A1 |
20080228865 | Cruzada | Sep 2008 | A1 |
20080235624 | Murata | Sep 2008 | A1 |
20080250407 | Dadhia et al. | Oct 2008 | A1 |
20090006537 | Palekar et al. | Jan 2009 | A1 |
20090222531 | London et al. | Sep 2009 | A1 |
20090222565 | Ben-Shachar et al. | Sep 2009 | A1 |
20100023582 | Pedersen et al. | Jan 2010 | A1 |
Number | Date | Country |
---|---|---|
1845069 | Oct 2006 | CN |
20030003314 | Jan 2003 | KR |
WO2007075846 | Jul 2007 | WO |
Entry |
---|
Miles, “Implementing Windows Terminal Server and Citrix MetaFrame on IBM @ server xSeries Servers”, found at <<http://www.redbooks.ibm.com/redpapers/pdfs/redp3629.pdf>>, International Business Machines Corporation, Apr. 2003, 60 pgs. |
“Using Terminal Services in Application Server Mode with Small Business Server 2000,” retrieved on Oct. 10, 2007 at <<http://www.microsoft.com/technet/prodtechnol/sbs/2000/maintain/termsvcs.mspx>>, 2002, 13 pgs. |
“Technical Overview of Management Services,” Microsoft Windows Server 2003, retrieved from <<http://download.microsoft.com/download/1/c/7/1c701994-9f8a-47c2-ad65-7265356c10eb/Manageover.doc>>, Jul. 2002, 47 pgs. |
Gelu, “Securing Access to External Networks with Authentication, Authorization and Accountability”, found at <<http://www.loloweb.dyns.cx/files/gsec—gelu—laurent.pdf>>, GIAC Security Essentials Certification (GSEC), Apr. 7, 2004, pp. 1-19. |
Helander, et al., “eLearning for Engineering,” 9th International Conference on Engineering Education, Session M5H, Jul. 23-28, 2006, 6 pgs. |
General, “Secure Foundations for Microsoft Terminal Services,” accessible at <<http://www.giac.org/certified—professionals/practicals/gsec/3578.phpu>>, GSEC Practical V1.4b, Jan. 11, 2004, pp. 1-21. |
Tsai, et al., “Towards Ubiquitous Computing via Secure Desktop Service,” accessible at <<http://ieeexplore.ieee.org/iel5/7544/20542/00949577.pdf?isNumber=>>, IEEE Catalog No. 01CH37239, 2001, pp. 187-190. |
MacDonald, “Secure Access of Network Resources by Remote Clients,” accessible at <<http://www.sans.org/reading—room/whitepapers/vpns/759.php>>, GSEC version 1.3, SANS Institute, 2002, Feb. 20, 2006, pp. 1-22. |
“ProLiant Essentials Integrated Lights-Out Advanced Pack”, available at least as early as Jun. 27, 2007, at <<http://h18000.www1.hp.com/products/quickspecs/11052—div/11052—div.HTML>>, Hewlett-Packard, 2004, pp. 1-3. |
“iShadow Desktop—The Universal Citrix ICA, Terminal Services RDP, and VNC Client”, available at least as early as Jun. 27, 2007, at <<http://www.dabcc.com/showcontent.aspx?id=2420>>, pp. 1-4. |
Lubonski et al., “An Adaptation Architecture to Improve User-Perceived QoS of Multimedia Services for Enterprise Remote Desktop Protocols”, Next Generation Internet Networks, 2005, Apr. 18-20, 2005, pp. 149-156. |
“VMware Virtual Infrastructure”, available at least as early as Jun. 27, 2007, at <<http://www.centriserv.com/products—vmware.php>>, CentriServ, 2006, pp. 1. |
Mascolo et al., “XMILE: an XML based Approach for Incremental Code Mobility and Update,” Automated Software Engineering, vol. 9, No. 2, Apr. 2002, found at <<http://www.cs.ucl.ac.uk/staff/c.mascolo/www/asemob.pdf>>, pp. 1-15. |
Baude et al., “Interactive and Descriptor-based Deployment of Object-Oriented Grid Applications,” Proceedings 11th IEEE Intl Symposium on High Performance Distributed Computing, 2002, found at at<<http://citeseer.ist.psu.edu/cache/papers/cs/26702/http:zSzzSzwww-sop.inria.frzSzoasiszSzJulien.VayssierezSzpublicationszSzhpdc2002—vayssiere.pdf/baude02interactive.pdf>>, 10 pgs. |
Bhatia et al., “Extending Grid Protocols onto the Desktop using the Mozilla Framework,” Proceedings of GCE'06, 2006, found at <<http://www.cogkit.org/GCE06/papers/CameraReady—126.pdf>>, pp. 1-4. |
Rouse, “Managing Terminal Services with Group Policy,” retreived on Oct. 3, 2007 at <<http://www.msterminalservices.org/articles/Managing-Terminal-Services-Group-Policy.html>>, Mar. 15, 2007, 11 pgs. |
“Terminal Services Gateway (TS Gateway)”, retreived on Oct. 3, 2007 at <<http://technet2.microsoft.com/windowsserver2008/en/library/9da3742f-699d-4476-b050-c50aa14aaf081033.mspx?mfr=true>>, Microsoft Corporation, Sep. 24, 2007, 8 pgs. |
“Remote Users Group Policies,” retrieved on Oct. 3, 2007 at <<http://www.cleo.net.uk/index.php?category—id=332>>, CLEO, 2005, 6 pgs. |
Smith, “S.H.A.U.N: Secure Hospital Access from the University Network,” available at <<http://www.ja.net/community/nhs/shaun.pdf>>, Addenbrooke's NHS Trust, Jan. 2004, pp. 1-11. |
“TS Session Broker”, Microsoft TechNet, Jan. 21, 2008, retrieved from the internet at <<http://technet.microsoft.com/en-us/library/cc732594(WS.10).aspx>>. |
Office Action for U.S. Appl. No. 11/771,921, mailed on Apr. 29, 2011, Ashwin Palekar, “Virtual Desktop Integration with Terminal Services”, 15 pages. |
Non-Final Office Action for U.S. Appl. No. 12/163,673, mailed on Aug. 17, 2011, Ayesha M. Mascarenhas, “Integrated Client for Access to Remote Resources”, 12 pages. |
Office Action for U.S. Appl. No. 11/680,518, mailed on Aug. 2, 2011, Meher Malakapalli, “Strategies for Securely Applying Connection Policies via a Gateway”, 40 pages. |
Final Office Action for U.S. Appl. No. 12/103,542, mailed on Sep. 1, 2011, Ido Ben-Shachar, “Securely Pushing Connection Settings to a Terminal Server Using Tickets”, 27 pages. |
Office Action for U.S. Appl. No. 11/771,921, mailed on Dec. 8, 2011, Ashwin Palekar, “Virtual Desktop Integration with Terminal Services”, 15 pgs. |
Office Action for U.S. Appl. No. 12/163,673, mailed on Feb. 16, 2012, Ayesha M. Mascarenhas, “Integrated Client for Access to Remote Resources”, 12 pgs. |
“Access to Work—Dev Design Specification”, Microsoft Confidential, Version 1, pp. 1-25, 2007. |
Jose, “Workspace Versioning and Configuration Management API”, retrieved on Apr. 15, 2008 at <<http://www.reswhitepapers.com/documents/VirtualizedUserWorkspaceManagementBeyondDesktopManagement.pdf>>, Java Boutique, pp. 1-3. |
Koetzing, “Centralizing Application Access with Visionapp Workspace Management 2008”, retrieved on Apr. 15, 2008 at <<http://www.thomaskoetzing.de/index.php?option=com—content&task=view&id=266&Itemid=289>>, Thomas Koetzing, Mar. 26, 2008, pp. 1-5. |
“M2 Access to Work—Dev Design Specification”, Microsoft Confidential, Version 1.0, pp. 1-21 , 2007. |
“Virtualized User Workspace Management for Windows Environments”, RES Software, 2007, pp. 1-6. |
“Workspace Integration Into Win7 Networking UI—Feature Summary”, Windows Server—Terminal Services Team, pp. 1-8 , 2007. |
“Workspace Runtime—Dev Design Specification”, Microsoft Confidential, Version 1, pp. 1-15 , 2007. |
The Chinese Office Action mailed Dec. 14, 2012 for Chinese Patent application 200980107105.4, a counterpart foreign application of U.S. Appl. No. 12/039,725, 7 pages. |
The Chinese Office Action mailed Mar. 3, 2012 for Chinese Patent application 200980107105.4, a counterpart foreign application of U.S. Appl. No. 12/039,725, 13 pages. |
Office action for U.S. Appl. No. 11/771,921, mailed on Nov. 15, 2012, Palekar et al., “Virtual Desktop Integration with Terminal Services”, 15 pages. |
PCT International Search Report in Application PCT/US2009/066404, mailed Jan. 9, 2009, 2 pages. |
PCT International Search Report in Application PCT/2009/032599 mailed Oct. 16, 2009, 7 pages. |
PCT International Search Report and Written Opinion in Application PCT/US2008/053506, mailed Jun. 24, 2008, 6 pages. |
PCT International Search Report and Written Opinion in Application PCT/US2009/032593, mailed Aug. 25, 2009, 12 pages. |
The Chinese Office Action mailed May 29, 2013 for Chinese Patent application 200980107105.4. A counterpart foreign application of U.S. Appl. No. 12/039,725, 12 pages. |
Translated Japanese Office Action mailed Jan. 18, 2013, for Japanese Patent application 2010-548775, a counterpart foreign application of U.S. Appl. No. 12/039,725, 9 pages. |
Office action for U.S. Appl. No. 11/771,921, mailed on Jun. 10, 2013, Palekar et al., “Virtual Desktop Integration with Terminal Services”, 25 pages. |
RedCruise Corporation, “Front Line of RSS Media Business, Third Internet Media Following Email and Web, Part 1 Basics of RSS Technology, Part 2 Media Characteristics of RSS, Part 3 Examples of Use of RSS, Part 4 the Potential of RSS Is Limitless”, Internet magazine make innovation with technology! No. 127, pp. 44-71, Impress Corporation, Japan, Aug. 1, 2005. |
Russian Office Action mailed Feb. 6, 2013, for Russian Patent application 2010136035, a counterpart foreign application to U.S. Appl. No. 12/039,725, 5 pages. |
Tulluch, et al., “Chapter 8, Enhancement of Functions of Termnal Service, 8.2 TS RemoteApp 8.3 TS Web Access”, Introduction to Windows Server 2008 Technology, 1st Ed., pp. 202-216, Nikkei BP Soft Press, Inc., Japan, Nov. 2007. |
Number | Date | Country | |
---|---|---|---|
20090222565 A1 | Sep 2009 | US |