Ubiquitous remote access to services has become commonplace as a result of the growth and availability of broadband and wireless network access. As such, users are accessing services using an ever-growing variety of client devices (e.g., mobile devices, tablet computing devices, laptop/notebook/desktop computers, etc.) to connect to a wide variety of remote services. A remote server may communicate messages that contain data or other information between the remote services and client devices over diverse networks including, 3G, 4G and LTE mobile data networks, wireless networks such as WiFi and WiMax, wired networks, etc.
Given such growth, there are conditions where the remote access server may not provide enough scalability to service large numbers of concurrent users of the client devices. In addition, there are situations, such as high demand and component failure where the remote access server may crash, disconnecting all of the users connected thereto.
Disclosed herein are systems and methods for providing a remote access to a service in a client-server remote access system. In accordance with an aspect of the disclosure, a method for providing remote access to a service in a client-server remote access system is disclosed. The method includes selecting, by a scheduler, an application server hosting the service, the selecting being performed in accordance with a utilization of resources in the client-server remote access system; and creating a session URL that includes a URL payload that uniquely identifies the service and being used to establish the remote access to the service by a client.
In accordance with other aspects of the disclosure, a client-server remote access system for providing access to a service is disclosed. The system includes a proxy server accessible at a resource Uniform Resource Locator (URL). The proxy server receives a request from a client to connect to the service. An authentication component authenticates the request in accordance with a payload of the resource URL. A scheduler that selects an application server hosting the service in accordance with a utilization of resources at the client-server remote access system. The scheduler creates a session URL that includes the payload that is used to establish a session between the client and the service. A service manager establishes the session between the client and the service connected at the session URL in accordance with the authenticated request to communicate application data and state information between the client and the service.
In accordance with yet other aspects, a method for enabling remote access to a service in a client-server remote access system is disclosed. The method includes selecting, by a scheduler, an application server hosting the service, the selecting being performed in accordance with a utilization of resources in the client-server remote access system; associating an App ID with the service; creating, by the scheduler, a session Uniform Resource Locator (URL) that includes the App ID as a payload, the session URL identifying the service hosted by the application server; and making the service available to a client at the session URL.
Other systems, methods, features and/or advantages will be or may become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features and/or advantages be included within this description and be protected by the accompanying claims.
The components in the drawings are not necessarily to scale relative to each other. Like reference numerals designate corresponding parts throughout the several views.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art. Methods and materials similar or equivalent to those described herein can be used in the practice or testing of the present disclosure. While implementations will be described for providing a highly scalable, fault tolerant remote access architecture and methods for connecting clients to remotely accessed applications and services provided by the remote access architecture, it will become evident to those skilled in the art that the implementations are not limited thereto.
With the above overview as an introduction, reference is now made to
The client SDK 104a/104b/104c is associated with the respective client remote access application 105a/105b/105c and is adapted to receive the display information from a remote access and application server 103a/103b to which it is connected. The client remote access application 105a/105b/105c may be, e.g., a web browser, dedicated application, etc., that provides a user interface at the client device 102a/102b/102c to display information from a connected service or services, such as one or more of applications 115a/115b/115c. The terms “application” and “service” are used interchangeably herein and refer to a program or group of programs that are delivered over a network to a client device. Example applications, include, but are not limited to, a medical imaging application, a CAD application, a seismographic application, a collaborative whiteboard application, or other.
The communication network 125 may be a 3G, 4G and/or LTE mobile data network, wireless networks such as WiFi and WiMax, or wired networks, etc. Connections over the communication network 125 may be HyperText Transfer Protocol (HTTP), WebSocket Protocol (WSS), or any other protocol supported within a TCP/IP network.
The proxy server 113a/113b/113c may be an HTTP server and reverse proxy server capable of handling a relatively large number of simultaneous requests (e.g., thousands to millions of simultaneous requests). In an implementation, the proxy server 113a/113b/113c executes on a node (e.g., a server computing device) separate from the remote access and application server(s) 103a/103b and is communicatively connected thereto by a communication connection 126. The communication connection 126 may be a higher capacity connection than communication connection 125. The proxy server 113a/113b/113c may also provide for scaling within architecture 100 in accordance with loading, computational cost, geographic location(s) of the remote access and application server 103a/103b, or other factors. An example proxy server 113a/113b/113c is nginx, available from Nginx Inc., San Francisco, Calif.
The remote access and application server 103a/103b may include a service manager 111a/111b, an application server 114a/114b, and one or more applications (services) 115a/115b/115c. In the architecture 100, the service manager 111a/111b is responsible for stopping and starting the applications 115a/115b/115c on a particular remote access and application server 103a/103b. The application server 114a/114b provides for connection marshalling. The application server 114a/114b may include a server SDK 116a/116b that provides display information to the application 115a/115b/115c from the client device 102a/102b/102c and from the application 115a/115b/115c to the client device 115a/115b/115c. An example of the remote access and application server 103a/103b is PUREWEB, available from Calgary Scientific, Inc. of Calgary, Alberta, Canada.
An authentication component 124 may be provided to authenticate users and applications 115a/115b/115c within the architecture 100. In accordance with the security model provided by the architecture 100, none of the applications 115a/115b/115c trust each other until authenticated and granted access by the authentication component 124. The authentication component 124 may use a token-based authentication scheme to provide its services. For example, restricted Uniform Resource Locators (URLs) may be mapped to users once authenticated.
A dashboard 127 provides a system administrator with the ability to launch instances of application servers and to configure components in the architecture 100. Example user interfaces presented by the dashboard are shown in
For example, the scheduler 130 may be provided to manage the utilization of resources, such as application servers 103a/103b or other nodes in the cluster 120. The scheduler 130 may implement one or more selection heuristics to determine which application server 103a/103b to service a remote access connection request. One example heuristic is to choose an application server that is running the fewest number of services (i.e., a lightest load heuristic). Another example heuristic is to choose the longest-running application server that has available capacity (i.e., an oldest with capacity heuristic). This example heuristic attempts to load more services onto fewer, older application servers such that recently created application servers become idle and can be shutdown. Yet another example heuristic accounts from the statefulness of the applications 115a/115b/115c and chooses an application server in accordance with a state of a preexisting running application (e.g., one of applications 115a/115b/115c). For example, an application 115a/115b/115c may have been queued by the application server such that is available to receive a connection from a particular client 102a/102b/102c. Once connected, the particular client 102a/102b/102c remains connected, or will reconnect to the same application 115a/115b/115c. This heuristic may be used in environments where the applications 115a/115b/115c are graphical in nature. In accordance with the above, the scheduler 130 may create session URLs and associated payload (e.g., an App ID that uniquely identifies the application/service) in real-time to direct a user of client device 102a/102b/102c to a service (e.g., 115a) hosted by a particular application server (e.g., 114a). Details of this feature are provided below with reference to
An orchestrator 131 may start and stop remote access and application servers 103a/103b in accordance with load, hardware capacity (e.g., CPU, GPU, memory), networking requirements, cost, geographic location, or other metrics. The scheduler 130 may deploy the application servers 103a/103b as a cluster 120 behind a firewall 134 associated with an enterprise, cloud services provider, e.g., Amazon Web Services, or other entity. Clustering enables the plural remote access and application servers 103a/103b to provide high availability, load balancing and/or parallel processing. In some implementations, the application servers 103a/103b may be cloud-based instances that are created from images in response to a start command received from the orchestrator 131. For example, there may be a pre-built image associated with each application 115 (or applications) such that the image can be loaded onto an application server when instantiated as, e.g., and instance in a cloud environment.
The orchestrator 131 may operate manually or automatically. When operated manually, a user remotely connects using a command line interfaces (e.g., on a client computing device associated with a developer) to the orchestrator 131, and turns on or off application servers using. When operated automatically, the orchestrator 131 may receive information from the scheduler 130 about current resource allocation within the cluster 120. If resource utilization within the cluster 120 or on a particular application server 103a or 103b is high, then the orchestrator 131 may automatically start a new application server instance or instances to meet demand. Similarly, if utilization within the cluster 120 or on a particular application server 103a or 103b is low, then the orchestrator 131 may automatically stop an existing application server instance.
Further, the orchestrator 131 may deploy additional proxy servers 113a/113b/113c (on additional nodes or a same node, as resources permit) to handle connections to the remote access and application servers 103a/103b in the cluster 120. Alternatively, additional remote access and application servers 103a/103b may be deployed on additional or same nodes as other remote access and application servers 103a/103b.
The service discovery and configuration component 132 may provide discovery services within the cluster 120. The service discovery and configuration component 132 is adapted to determine which resources that an application 115a/115b/115c may require, and to make the applications 115a/115b/115c accessible to the remote clients 102a/102b/102c. For example, the service discovery and configuration component 132 may provide Domain Name Services (DNS) for routing requests from the proxy servers 113a/113b/113c to an application 115a/115b/115c. An example of the service discovery and configuration component 132 is Consul, available from HashiCorp.
An API Edge 128 may be provided to interface with the dashboard 127 and other external components to obtain information from, or provide information to, components in the cluster 120, such as the scheduler 130 and service discovery and configuration component 132.
In some implementations, one or more components of the cluster 120, the proxy servers 113a/113b/113c, the authentication component 124 or the dashboard 127 may be deployed within a cloud infrastructure, such as, but not limited to, Amazon Web Services (AWS). An example of the client device 102a/102b/102c and the remote access and application server 103a/103b is shown in
With reference to
With reference to
At 204, a service is scheduled. For example, using the application name passed in flow 1, the scheduler 130 may request that the service manager 111a start the application 115a to fulfill a client request associated with the resource URL. The call flows associated with the operation performed at 204 are generally shown by flows 3 and 4 in
At 206, the application that is the subject of the resource URL is started. The scheduler 130 checks resource utilization on the application server 114a and, depending on load, etc., contacts the service manager 111a to start the application 115a. The call flows associated with the operation performed at 206 are generally shown by flows 5 through 14 in
The authentication information is provided to the authentication component 124 to determine if the user or client device 102a/102b/102c is authorized (or remains authorized) to access the application 115a/115b/115c (flow 6). If authentication passes, then the authentication component 124 makes a request to the scheduler 130 (flow 7), which then contacts the applications server 114a/114b (flow 8) to determine a load at the remote access and application server 103a/103b on which the application 115a/115b/115c executes. The service manager 111a/111b of the remote access and application server 103a/103b makes the determination (flow 9), and if the load is beyond a threshold amount or the application 115a/115b/115c is not running, then the scheduler 130 sends a Start message to the service manager 111a/111b (flow 10) to start the application 115a/115b/115c (flow 11). For example, the service manager 111a connects to and starts the application 115a using the App ID. The service manager 111a establishes a “session” associated with the application 115a, which is then considered to be “a queued service” to which a client device may remotely connect. The queued service may be known by a unique application name (for a single type of remotely accessible application) and/or the App ID that is unique to the queued service connection.
Next, the application 115a/115b/115c begins the start-up process, as described above, and connects to the application server 114a/114b using, e.g., a TCP Connect message (flow 12). The application 115a/115b/115c provides identification information (e.g., App ID, application name, and a server instance identifier, a service manager identifier), which is passed to the scheduler 130 (flow 13). The scheduler 130 then communicates the identification information to the client SDK 104a/104b/104c (flow 14).
Returning to
At 210, the client interacts with the application. The call flows associated with the operation performed at 210 are generally shown by flows 19 through 22 in
The call flows associated with the operation performed at 210 are generally shown by flows 19 through 22 in
Application state information may be communicated during the remote session in a state model and is information concerning the remotely-accessed application 115a/115b/115c and/or session information concerning the client device 102a/102b/102c or client devices 102a/102b/102c that may be participating in a collaborative session. In particular, the state model may be contain changes to the application state and may be communicated between the application server 114a/114b and the client device 102a/102b/102c, or client devices 102a/102b/102c if more than one client device 102a/102b/102c are in a collaboration session. The state model can be represented by, e.g., an Extensible Markup Language (XML) document. It should be understood that other representations of the state model can be used.
In
While the above operational and call flow diagrams provide example flows to connect and disconnect a client device 102a/102b/102c from a remote application 115a/115b/115c within the architecture 100, other variations and call flows will be evident to one of ordinary skill in the art.
At 406, the collaboration URL is returned to the requesting client. At 408, the user at the requesting client (e.g., 102a) may forward the collaboration URL to one or more of the collaborators 122a/122b/122c or clients 102b/102c. At 410, the collaborators or other clients connect to the collaboration session using the collaboration URL. At 412, the service discovery configuration component resolves the collaboration URL to the application server 114a. The service discovery and configuration component 132 may use DNS to perform location services. At 414, the collaborators join the collaboration session such that they each interact with the application 115a.
Thus, the operational flow 400 provides for a method to allow multiple users to collaboratively interact with application executing within the architecture 100.
Numerous other general purpose or special purpose computing system environments or configurations may be used. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use include, but are not limited to, personal computers, servers, handheld or laptop devices, multiprocessor systems, microprocessor-based systems, network personal computers (PCs), minicomputers, mainframe computers, embedded systems, distributed computing environments that include any of the above systems or devices, and the like.
Computer-executable instructions, such as program modules, being executed by a computer may be used. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Distributed computing environments may be used where tasks are performed by remote processing devices that are linked through a communications network or other data transmission medium. In a distributed computing environment, program modules and other data may be located in both local and remote computer storage media including memory storage devices.
With reference to
Computing device 600 may have additional features/functionality. For example, computing device 600 may include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated in
Computing device 600 typically includes a variety of tangible computer readable media. Computer readable media can be any available tangible media that can be accessed by device 600 and includes both volatile and non-volatile media, removable and non-removable media.
Tangible computer storage media include volatile and non-volatile, and removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Memory 604, removable storage 608, and non-removable storage 610 are all examples of computer storage media. Tangible computer storage media include, but are not limited to, RAM, ROM, electrically erasable program read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computing device 600. Any such computer storage media may be part of computing device 600.
Computing device 600 may contain communications connection(s) 612 that allow the device to communicate with other devices. Computing device 600 may also have input device(s) 614 such as a keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) 616 such as a display, speakers, printer, etc. may also be included. All these devices are well known in the art and need not be discussed at length here.
It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the presently disclosed subject matter, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the presently disclosed subject matter. In the case of program code execution on programmable computers, the computing device generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. One or more programs may implement or utilize the processes described in connection with the presently disclosed subject matter, e.g., through the use of an application programming interface (API), reusable controls, or the like. Such programs may be implemented in a high level procedural or object-oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language and it may be combined with hardware implementations.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
This application claims priority to U.S. Provisional Patent Application No. 62/109,914, filed Jan. 30, 2015, entitled “Highly Scalable, Fault Tolerant Remote Access Architecture and Method of Connecting Thereto,” the disclosure of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4975690 | Torres | Dec 1990 | A |
5345550 | Bloomfield | Sep 1994 | A |
5555003 | Montgomery et al. | Sep 1996 | A |
5742778 | Hao et al. | Apr 1998 | A |
5844553 | Hao et al. | Dec 1998 | A |
5870759 | Bauer et al. | Feb 1999 | A |
5920311 | Anthias | Jul 1999 | A |
5978842 | Noble et al. | Nov 1999 | A |
6045048 | Wilz et al. | Apr 2000 | A |
6061689 | Chang et al. | May 2000 | A |
6075531 | DeStefano | Jun 2000 | A |
6141698 | Krishnan et al. | Oct 2000 | A |
6145098 | Nouri et al. | Nov 2000 | A |
6175869 | Ahuja | Jan 2001 | B1 |
6253228 | Ferris et al. | Jun 2001 | B1 |
6343313 | Salesky et al. | Jan 2002 | B1 |
6453334 | Vinson et al. | Sep 2002 | B1 |
6453356 | Sheard et al. | Sep 2002 | B1 |
6570563 | Honda | May 2003 | B1 |
6587880 | Saigo | Jul 2003 | B1 |
6601233 | Underwood | Jul 2003 | B1 |
6792607 | Burd et al. | Sep 2004 | B1 |
6909545 | Takano et al. | Jun 2005 | B2 |
6918113 | Patel et al. | Jul 2005 | B2 |
6938096 | Greschler et al. | Aug 2005 | B1 |
6976077 | Lehew et al. | Dec 2005 | B1 |
7065568 | Bracewell et al. | Jun 2006 | B2 |
7069227 | Lintel, III et al. | Jun 2006 | B1 |
7073059 | Worely, Jr. et al. | Jul 2006 | B2 |
7149761 | Cooke et al. | Dec 2006 | B2 |
7167893 | Malone et al. | Jan 2007 | B1 |
7174504 | Tsao | Feb 2007 | B2 |
7181686 | Bahrs | Feb 2007 | B1 |
7240162 | de Vries | Jul 2007 | B2 |
7246063 | James et al. | Jul 2007 | B2 |
7320131 | O'Toole, Jr. | Jan 2008 | B1 |
7343310 | Stender | Mar 2008 | B1 |
7350151 | Nakajima | Mar 2008 | B1 |
7418711 | Lee et al. | Aug 2008 | B1 |
7451196 | de Vries et al. | Nov 2008 | B1 |
7577751 | Vinson et al. | Aug 2009 | B2 |
7620901 | Carpenter et al. | Nov 2009 | B2 |
7647370 | Liu et al. | Jan 2010 | B1 |
7650444 | Dirstine et al. | Jan 2010 | B2 |
7656799 | Samuels et al. | Feb 2010 | B2 |
7706399 | Janczak | Apr 2010 | B2 |
7725331 | Schurenberg et al. | May 2010 | B2 |
7802183 | Essin | Sep 2010 | B1 |
7831919 | Viljoen et al. | Nov 2010 | B1 |
7921078 | McCuller | Apr 2011 | B2 |
7941488 | Goodman et al. | May 2011 | B2 |
7966572 | Matthews et al. | Jun 2011 | B2 |
8024523 | de Vries et al. | Sep 2011 | B2 |
8125931 | Faber | Feb 2012 | B2 |
8261345 | Hitomi et al. | Sep 2012 | B2 |
8356252 | Raman et al. | Jan 2013 | B2 |
8359591 | de Vries et al. | Jan 2013 | B2 |
8509230 | Vinson et al. | Aug 2013 | B2 |
8527706 | de Vries et al. | Sep 2013 | B2 |
8533103 | Certain | Sep 2013 | B1 |
8572178 | Frazzini et al. | Oct 2013 | B1 |
8606952 | Pasetto et al. | Dec 2013 | B2 |
8607158 | Molander et al. | Dec 2013 | B2 |
8627081 | Grimen et al. | Jan 2014 | B2 |
8667054 | Tahan | Mar 2014 | B2 |
8832260 | Raja et al. | Sep 2014 | B2 |
8924512 | Stoyanov et al. | Dec 2014 | B2 |
20010047393 | Arner et al. | Nov 2001 | A1 |
20020032751 | Bharadwaj | Mar 2002 | A1 |
20020032804 | Hunt | Mar 2002 | A1 |
20020092029 | Smith | Jul 2002 | A1 |
20030014735 | Achlioptas et al. | Jan 2003 | A1 |
20030023670 | Walrath | Jan 2003 | A1 |
20030065738 | Yang et al. | Apr 2003 | A1 |
20030120324 | Osborn et al. | Jun 2003 | A1 |
20030120762 | Yepishin et al. | Jun 2003 | A1 |
20030149941 | Tsao | Aug 2003 | A1 |
20030163514 | Waldschmidt | Aug 2003 | A1 |
20030184584 | Vachuska et al. | Oct 2003 | A1 |
20030208472 | Pham | Nov 2003 | A1 |
20040015842 | Nanivadekar et al. | Jan 2004 | A1 |
20040029638 | Hytcheson et al. | Feb 2004 | A1 |
20040039742 | Barsness et al. | Feb 2004 | A1 |
20040068516 | Lee et al. | Apr 2004 | A1 |
20040106916 | Quaid et al. | Jun 2004 | A1 |
20040117804 | Scahill et al. | Jun 2004 | A1 |
20040162876 | Kohavi | Aug 2004 | A1 |
20040183827 | Putterman et al. | Sep 2004 | A1 |
20040236633 | Knauerhase et al. | Nov 2004 | A1 |
20040243919 | Muresan et al. | Dec 2004 | A1 |
20040249885 | Petropoulakis et al. | Dec 2004 | A1 |
20050005024 | Samuels et al. | Jan 2005 | A1 |
20050010871 | Ruthfield et al. | Jan 2005 | A1 |
20050021687 | Anastassopoulos et al. | Jan 2005 | A1 |
20050050229 | Comeau et al. | Mar 2005 | A1 |
20050138631 | Bellotti et al. | Jun 2005 | A1 |
20050188046 | Hickman et al. | Aug 2005 | A1 |
20050188313 | Matthews et al. | Aug 2005 | A1 |
20050216421 | Barry | Sep 2005 | A1 |
20050240906 | Kinderknecht et al. | Oct 2005 | A1 |
20060004874 | Hutcheson et al. | Jan 2006 | A1 |
20060026006 | Hindle | Feb 2006 | A1 |
20060031377 | Ng et al. | Feb 2006 | A1 |
20060036770 | Hosn et al. | Feb 2006 | A1 |
20060101397 | Mercer et al. | May 2006 | A1 |
20060130069 | Srinivasan et al. | Jun 2006 | A1 |
20060231175 | Vondracek et al. | Oct 2006 | A1 |
20060236328 | DeWitt | Oct 2006 | A1 |
20060258462 | Cheng et al. | Nov 2006 | A1 |
20060265689 | Kuznetsov et al. | Nov 2006 | A1 |
20060271563 | Angelo et al. | Nov 2006 | A1 |
20060288171 | Tsien | Dec 2006 | A1 |
20060294418 | Fuchs | Dec 2006 | A1 |
20070024645 | Purcell et al. | Feb 2007 | A1 |
20070047535 | Varma | Mar 2007 | A1 |
20070067754 | Chen et al. | Mar 2007 | A1 |
20070079244 | Brugiolo | Apr 2007 | A1 |
20070112880 | Yang et al. | May 2007 | A1 |
20070120763 | De Paepe et al. | May 2007 | A1 |
20070130292 | Tzruya et al. | Jun 2007 | A1 |
20070136677 | Agarwal | Jun 2007 | A1 |
20070203944 | Batra et al. | Aug 2007 | A1 |
20070208718 | Javid et al. | Sep 2007 | A1 |
20070226636 | Carpenter et al. | Sep 2007 | A1 |
20070233706 | Farber | Oct 2007 | A1 |
20070244990 | Wells | Oct 2007 | A1 |
20070256073 | Troung et al. | Nov 2007 | A1 |
20070282951 | Selimis et al. | Dec 2007 | A1 |
20080134211 | Cui | Jun 2008 | A1 |
20080146194 | Yang et al. | Jun 2008 | A1 |
20080183190 | Adcox et al. | Jul 2008 | A1 |
20080313282 | Warila et al. | Dec 2008 | A1 |
20090044171 | Avadhanula | Feb 2009 | A1 |
20090080523 | McDowell | Mar 2009 | A1 |
20090089742 | Nagulu et al. | Apr 2009 | A1 |
20090119644 | de Vries et al. | May 2009 | A1 |
20090209239 | Montesdeoca | Aug 2009 | A1 |
20090217177 | DeGrazia | Aug 2009 | A1 |
20100061238 | Godbole et al. | Mar 2010 | A1 |
20100077058 | Messer | Mar 2010 | A1 |
20100131591 | Thomas et al. | May 2010 | A1 |
20100150031 | Allen et al. | Jun 2010 | A1 |
20100174773 | Penner et al. | Jul 2010 | A1 |
20100205147 | Lee | Aug 2010 | A1 |
20100223566 | Holmes et al. | Sep 2010 | A1 |
20100268813 | Pahlavan et al. | Oct 2010 | A1 |
20110138283 | Marston | Jun 2011 | A1 |
20110154464 | Agarwal | Jun 2011 | A1 |
20110157196 | Nave et al. | Jun 2011 | A1 |
20110162062 | Kumar et al. | Jun 2011 | A1 |
20110184993 | Chawla et al. | Jul 2011 | A1 |
20110213830 | Lopez et al. | Sep 2011 | A1 |
20110222442 | Cole et al. | Sep 2011 | A1 |
20110252152 | Sherry et al. | Oct 2011 | A1 |
20120030275 | Boller et al. | Feb 2012 | A1 |
20120084419 | Kannan et al. | Apr 2012 | A1 |
20120084713 | Desai et al. | Apr 2012 | A1 |
20120090004 | Jeong | Apr 2012 | A1 |
20120133675 | McDowell | May 2012 | A1 |
20120154633 | Rodriguez | Jun 2012 | A1 |
20120221792 | de Vries et al. | Aug 2012 | A1 |
20120226742 | Momchilov et al. | Sep 2012 | A1 |
20120245918 | Overton et al. | Sep 2012 | A1 |
20120246225 | Lemire et al. | Sep 2012 | A1 |
20120324032 | Chan | Dec 2012 | A1 |
20130007227 | Hitomi et al. | Jan 2013 | A1 |
20130031618 | Momchilov | Jan 2013 | A1 |
20130046815 | Thomas et al. | Feb 2013 | A1 |
20130046816 | Thomas et al. | Feb 2013 | A1 |
20130054679 | Jooste | Feb 2013 | A1 |
20130070740 | Yovin | Mar 2013 | A1 |
20130086652 | Kavantzas | Apr 2013 | A1 |
20130117474 | Ajanovic et al. | May 2013 | A1 |
20130125226 | Shah | May 2013 | A1 |
20130138791 | Thomas et al. | May 2013 | A1 |
20130147845 | Xie et al. | Jun 2013 | A1 |
20130159062 | Stiehl | Jun 2013 | A1 |
20130179962 | Arai et al. | Jul 2013 | A1 |
20130262566 | Stephure et al. | Oct 2013 | A1 |
20130290408 | Stephure et al. | Oct 2013 | A1 |
20130346482 | Holmes | Dec 2013 | A1 |
20140240524 | Julia et al. | Aug 2014 | A1 |
20140298420 | Barton et al. | Oct 2014 | A1 |
20140337417 | Park et al. | Nov 2014 | A1 |
20150067769 | Barton et al. | Mar 2015 | A1 |
20150156133 | Leitch et al. | Jun 2015 | A1 |
20150163292 | Lemire et al. | Jun 2015 | A1 |
20150319252 | Momchilov et al. | Nov 2015 | A1 |
20160054897 | Holmes et al. | Feb 2016 | A1 |
20160226979 | Lancaster et al. | Aug 2016 | A1 |
Number | Date | Country |
---|---|---|
101236553 | Aug 2008 | CN |
102821413 | Dec 2012 | CN |
103997526 | Aug 2014 | CN |
0349463 | Jan 1990 | EP |
1422901 | May 2004 | EP |
2012238 | Jan 2009 | EP |
2663068 | Nov 2013 | EP |
2772026 | Sep 2014 | EP |
2007084744 | Mar 1995 | JP |
2002055870 | Feb 2002 | JP |
2004-287758 | Oct 2004 | JP |
2005031807 | Feb 2005 | JP |
2008-099055 | Apr 2008 | JP |
4405812 | Jan 2010 | JP |
2010-256972 | Nov 2010 | JP |
2295752 | Mar 2007 | RU |
2298287 | Apr 2007 | RU |
2305860 | Sep 2007 | RU |
1998058478 | Dec 1998 | WO |
2001016724 | Mar 2001 | WO |
2002009106 | Jan 2002 | WO |
2003032569 | Apr 2003 | WO |
2003083684 | Oct 2003 | WO |
2010060206 | Jun 2010 | WO |
2010088768 | Aug 2010 | WO |
2010127327 | Nov 2010 | WO |
2012127308 | Sep 2012 | WO |
2013024342 | Feb 2013 | WO |
2013024343 | Feb 2013 | WO |
2013070391 | May 2013 | WO |
2013109984 | Jul 2013 | WO |
2013128284 | Sep 2013 | WO |
2013153439 | Oct 2013 | WO |
2015080845 | Jun 2015 | WO |
Entry |
---|
United States Court of Appeal for the Federal Circuit, Affinity Labs of Texas, LLC, verse Amazon.com Inc., Sep. 23, 2016, pp. 3-5. |
Audun Josan et al., Trust Requirements in Identity Management, 2005, Published by Australasian Information Security Workshop (AISW), pp. 1-10 (Year: 2005). |
Coffman, Daniel, et al., “A Client-Server Architecture for State-Dependent Dynamic Visualizations on the Web,” IBM T.J. Watson Research Center, 2010, 10 pages. |
Fraser, N., “Differential Synchronization,” Google, Mountain View, CA, Jan. 2009, 8 pages. |
Jourdain, Sebastien, et al., “ParaViewWeb: A Web Framework for 3D Visualization and Data Processing,” International Journal of Computer Information Systems and Industrial Management Applications, vol. 3, 2011, pp. 870-877. |
Microsoft Computer Dictionary, Microsoft Press, 5th Edition, Mar. 15, 2002, p. 624. |
Mitchell, J. Ross, et al., A Smartphone Client-Server Teleradiology System for Primary Diagnosis of Acute Stroke, Journal of Medical Internet Research, vol. 13, Issue 2, 2011, 12 pages. |
ParaViewWeb, KitwarePublic, retrieved on Jan. 27, 2014 from http://www.paraview.org/Wiki/ParaViewWeb, 1 page. |
Remote Desktop Protocol (RDP), retrieved on May 4, 2014 from http://en.wikipedia.org/wiki/Remote_Desktop_Protocol, 7 pages. |
Remote Desktop Services (RDS), Remote App, retrieved on May 4, 2014 from http://en.wikipedia.org/wiki/Remote_Desktop_Services, 9 pages. |
Remote Desktop Services (RDS), Windows Desktop Sharing, retrieved on May 4, 2014 from http://en.wikipedia.org/wiki/Remote_Desktop_Services, 9 pages. |
European Search Report, dated Sep. 29, 2015, received in connection with related European Application No. 12824363.1. |
European Search Report, dated Sep. 1, 2015, received in connection with related European Application No. 12824077.7. |
European Search Report, dated Mar. 3, 2015, received in connection with related European Application No. 09828497.9. |
European Search Report, dated Jun. 2, 2014, received in connection with European Application No. 12760310.8. |
European Search Report, dated Jul. 5, 2012, received in connection with European Application No. 10738183.2. |
Search Report and Written Opinion, dated Nov. 16, 2015, received in connection with SG Application No. 2013087150. |
International Search Report, dated Feb. 19, 2010, received in connection with International Patent Application No. PCT/CA2009/001704. |
International Preliminary Report on Patentability and Written Opinion, dated May 31, 2011, received in connection with International Patent Application No. PCT/CA2009/001704. |
International Search Report, dated May 12, 2010, received in connection with International Patent Application No. PCT/CA2010/000154. |
International Preliminary Report on Patentability and Written Opinion, dated Aug. 9, 2011, received in connection with International Patent Application No. PCT/CA2010/000154. |
International Search Report and Written Opinion, dated Jul. 31, 2012, received in connection with International Patent Application No. PCT/IB2012/000562. |
International Preliminary Report on Patentability and Written Opinion, dated Sep. 24, 2013, received in connection with International Patent Application No. PCT/CA2010/000562. |
International Search Report, dated Dec. 20, 2012, received in connection with International Patent Application No. PCT/IB2012/001589. |
International Preliminary Report on Patentability and Written Opinion, dated Feb. 18, 2014, received in connection with International Patent Application No. PCT/IB2012/001589. |
International Search Report, dated Dec. 28, 2012, received in connection with International Patent Application No. PCT/IB2012/001590. |
International Preliminary Report on Patentability and Written Opinion, dated Feb. 18, 2014, received in connection with International Patent Application No. PCT/IB2012/001590. |
International Search Report and Written Opinion, dated Aug. 21, 2013, received in connection with International Patent Application No. PCT/IB2013/000676. |
International Preliminary Report on Patentability and Written Opinion, dated Oct. 14, 2014, received in connection with International Patent Application No. PCT/CA2010/000676. |
International Search Report and Written Opinion, dated Jul. 31, 2013, received in connection with International Patent Application No. PCT/IB2013/000720. |
International Preliminary Report on Patentability and Written Opinion, dated Sep. 2, 2014, received in connection with International Patent Application No. PCT/CA2010/000720. |
International Search Report and Written Opinion, dated Mar. 19, 2015, received in connection with International Patent Application No. PCT/US2014/064243. |
International Preliminary Report on Patentability and Written Opinion, dated May 31, 2016, received in connection International Patent Application No. PCT/US2014/064243. |
International Search Report and Written Opinion, dated Jun. 30, 2016, received in connection International Patent Application No. PCT/IB2016/000277. |
Search Report, dated Jul. 12, 2018, received in connection with corresponding EP Patent Application No. 16742846.5. |
Number | Date | Country | |
---|---|---|---|
20160226871 A1 | Aug 2016 | US |
Number | Date | Country | |
---|---|---|---|
62109914 | Jan 2015 | US |