-
公开(公告)号:US11522785B2
公开(公告)日:2022-12-06
申请号:US17170271
申请日:2021-02-08
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Vladimir Vysotsky , Saurabh Pant , Srinivasarao Nelluri
IPC: H04L45/121 , H04L45/42 , H04L67/1097 , H04L9/40
Abstract: Described embodiments provide systems and method for intelligent path selection to reduce latency and maintain security. A client can request access to a server and multiple connections can be initiated to the requested destination, for example, a direct connection from a branch office and a backhauled connection through a data center. Traffic via the second connection can be controllable by application of at least one rule of the data center. A device can determine a delay in the exchange of data via the connections and a security level of the connections. The determination of the delay in the exchange of data via the another connection can be based on in part feedback about the application of the rule. The device can connect a client device to a server through one of the connections using the determination of the delay and the security level of the connection.
-
公开(公告)号:US11522701B2
公开(公告)日:2022-12-06
申请号:US16684780
申请日:2019-11-15
Applicant: Citrix Systems, Inc.
Inventor: Bradley Markus Rowe , Ricardo Feijoo , Tom Michael Kludy , Ayush Jain , Gerald Haagsma
Abstract: Methods, systems, computer-readable media, and apparatuses may provide creation and management of composite tokens for use with services in a virtual environment without the user having to re-authenticate each time the user accesses a different service. A composite identity server may receive a request to upgrade a first authentication token for a user. The composite identity server may redirect a user agent to an identity provider for authentication and, in response, may receive a second authentication token for the user. The composite identity server may send the second authentication token to a federated microservice and, in response, may receive one or more claims of the second authentication token designated for inclusion in a composite token. The composite identity server may generate a composite token including the one or more claims of the first authentication token and one or more claims of the second authentication token.
-
公开(公告)号:US20220383208A1
公开(公告)日:2022-12-01
申请号:US17330773
申请日:2021-05-26
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
Abstract: Methods, apparatuses, and systems for contextual resource registration are described herein. A resource, such as a computer, may be registered for use by a user with a mobile device. The resource may be connected to a controller that has an amount of control over the resource. The controller may broadcast its identifying information, such as an Internet protocol (IP) address, to mobile devices in the vicinity. A mobile device may receive the broadcast message and establish a connection with the controller. The controller may determine whether the mobile device is already registered and also whether the corresponding resource is available for registration. The controller may cause the resource to display a digital signage to facilitate registration with the resource.
-
公开(公告)号:US20220382617A1
公开(公告)日:2022-12-01
申请号:US17373107
申请日:2021-07-12
Applicant: Citrix Systems, Inc.
Inventor: Satyendra Tiwari , Nikolaos Georgakopoulos , Utkarsh Agarwal , Pavan Belani , Srinivas Reddy Kasu , Rahul Kumar
Abstract: Systems and methods of reconstructing execution call flows to detect anomalies is provided. A device can establish call flows using information extracted from a log file to. Each of the call flows can identify information from the log file of a call flowing through a plurality of modules. The device can identify a count of a number of occurrences of one or more keywords in information of each call flow. The device can generate a vector of numbers for each call flow based at least on the count for the one or more keywords for that call flow. The device can classify each call flow into one or more clusters that indicate whether an operation of the call flow is anomalous. The device can classify each call flow using the vector of numbers for each call flow.
-
公开(公告)号:US20220382430A1
公开(公告)日:2022-12-01
申请号:US17359720
申请日:2021-06-28
Applicant: Citrix Systems, Inc.
Inventor: Sai Xu , Taodong Lu , Qin Zhang
IPC: G06F3/0489 , G06F3/0488
Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, responsive to initiation of an application of the computing device, a display of which including a virtual keyboard, detecting, by the computing device, an input on a shortcut key of the virtual keyboard. The method also includes, by the computing device, translating the shortcut key into one or more keystrokes based on a configuration file for that short key and providing the one or more keystrokes to the application to execute a function of the shortcut key in response to the detected input.
-
136.
公开(公告)号:US11516211B2
公开(公告)日:2022-11-29
申请号:US16242649
申请日:2019-01-08
Applicant: CITRIX SYSTEMS, INC.
Inventor: James Roy Bulpin
Abstract: A system for providing a service may include a user device executing an application. The application may have an authorization token associated therewith to authenticate a given user to the service. The system may also include a server executing the service, and a virtual assistant to receive a request to access the service via the virtual assistant and communicate the request to the server. The server may determine whether the token has been obtained thereat based upon the identifier. When the token has been received by the server, the server may determine whether the token has expired, and when not expired, the server may process the request. When the token has not been received by the server, the server may obtain the token from the user device, and process the request based upon obtaining the token from the user device.
-
公开(公告)号:US11500685B2
公开(公告)日:2022-11-15
申请号:US16043747
申请日:2018-07-24
Applicant: Citrix Systems, Inc.
Inventor: Leo C. Singleton, IV
Abstract: Methods and systems for providing services using mixed instance catalogs are described herein. A catalog may comprise a plurality of first virtual machines and a plurality of second virtual machines. The capacity of a first virtual machine may be larger than the capacity of a second virtual machine. Connection requests to access a service associated with the catalog may be distributed among the plurality of first virtual machines and the plurality of second virtual machines.
-
公开(公告)号:US20220360560A1
公开(公告)日:2022-11-10
申请号:US17307713
申请日:2021-05-04
Applicant: Citrix Systems, Inc.
Inventor: Kasirao Velugu , Priya Bagaria , Ganesh Kathiresan , Thirumoorthi Thangamani
Abstract: Described embodiments provide systems and methods for generating firewall configuration profiles for firewalls. An intermediary device may modify a request from a client to access the server to include a payload provided by the device. The payload may include an action type selected from a plurality of action types used to probe the server for a corresponding security vulnerability of a plurality of security vulnerabilities. The device may transmit, to the server, the request including the payload to cause the server to provide a response to the device. The device may determine that the server is susceptible to a security vulnerability of the plurality of security vulnerabilities corresponding to the action type based at least on the response. The device may generate a configuration profile for the firewall to restrict requests of the action type to access the server from clients.
-
公开(公告)号:US11496430B2
公开(公告)日:2022-11-08
申请号:US14684778
申请日:2015-04-13
Applicant: Citrix Systems, Inc.
Inventor: Shaunak Mistry
IPC: G06F15/16 , H04L51/224 , H04L51/043 , H04L67/54 , H04L51/214
Abstract: Methods, systems, computer-readable media, and apparatuses may provide management of messaging for one or more devices of a user according to the user's configurable presence schedule. A messaging management server may receive notifications of messages and the messages themselves from a messaging service provider. The messages may have originated from a first user and be intended for receipt by a second user. After a preset time period has elapsed, a notification of the message may be sent from the messaging management server to each of the second user's devices in accordance with the second user's presence schedule. Subsequent messages from the first user and intended for the second user may be routed from the messaging management server to the device on which the second user responded to the notification of the initial message and might not be routed to the second user's other devices.
-
公开(公告)号:US11494004B2
公开(公告)日:2022-11-08
申请号:US16653211
申请日:2019-10-15
Applicant: Citrix Systems, Inc.
Inventor: Chris Pavlou , Mukund Ingale , Georgy Momchilov
IPC: G06F3/0354 , G06F3/038
Abstract: A technique controls operation of a local application running on a user device (e.g., a smart phone, a tablet, a personal digital assistant, etc.). The technique involves receiving, by the user device, mouse input from external electronic equipment communicating with the user device. The user device has a touchscreen that displays a touchscreen image of the local application. The mouse input indicates user operation of a hardware mouse. The technique further involves translating, by the user device, the mouse input into translated touchscreen input. The technique further involves providing, by the user device, the translated touchscreen input to the local application running on the user device to operate the local application.
-
-
-
-
-
-
-
-
-