Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Technique for virtualized desktop exploitation for a roaming user in a "cloud-based" office

IP.com Disclosure Number: IPCOM000216077D
Publication Date: 2012-Mar-23
Document File: 2 page(s) / 36K

Publishing Venue

The IP.com Prior Art Database

Abstract

Technique for virtualized desktop exploitation by a nomadic user in a cloud-enabled office

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Technique for virtualized desktop exploitation for a roaming user in a "cloud-based" office

In Companies which are exploiting virtualization and cloud computing technologies, IT assets made available to employees in their offices, may exploit desktop virtualization solutions.

Such solutions, deployed and exploited in the same physical site, can be convenient and efficient, as they enable each user to access his own virtualized desktop, conveniently hosted in a virtualization hypervisor hosted in the local data center. This further enables ubiquitous access to the virtualized user desktop, from any pc/web based front end, available in the same site.

However, if the owner of a virtualized desktop system is frequently roaming thru the office building, with a nomadic behavior (e.g. from his room/desk to a different desk or to a meeting room, etc), the common practice for him to access information and applications in his virtual desktop, is to find a new front end pc, from which he can login to his remote virtual desktop.

In practice, the user may need to carry a laptop with him, while roaming thru office rooms, in order to remotely connecting to his virtual desktop.

The need of a personal laptop, just to remotely access a personal virtual system, may defeat the purpose and the efficiency of the desktop virtualization solution.

The techniques described in this article are aimed to provide simplified, instant and secure access to personal remote desktops, for nomadic users roaming inside a building. Although they can be applied to both virtual and physical remote desktop, they best fit environment where desktop virtualization solutions are adopted. Specifically, the main focus is about providing ways to simplify/automate logins, avoid usage of input devices like keyboard/pointing devices, avoid usage of monitors.

In practice, goal is toward the "office cloud-ification" not only in term of virtualizing physical desktop systems, but also of the classic input/output devices, needed to access virtualized systems remotely.

In the proposed solution, a company office site, would implement a user's system, as a virtual system hosted in the company cloud (desktop virtualization).

As each virtual desktop is instantiated it is assigned to the profile of...