-
公开(公告)号:US11431722B2
公开(公告)日:2022-08-30
申请号:US16793433
申请日:2020-02-18
Applicant: Citrix Systems, Inc.
Inventor: Thomas Michael Kludy
Abstract: A method of performing operations involving accessing a set of protected computing resources of a computing device includes (a) receiving, by a frontend service, an instruction via a network connection, the instruction directing the computing device to perform an operation involving accessing the set of protected resources, the set of protected computing resources being configured to refuse access to the frontend service, (b) in response to receiving the instruction, sending a request from the frontend service to a backend service, the request instructing the backend service to access the set of protected resources, the backend service being configured to not communicate via the network connection, the set of protected computing resources being configured to permit access to the backend service, and (c) in response to the backend service receiving the request from the frontend service, the backend service accessing the set of protected resources in fulfillment of the operation.
-
公开(公告)号:US11429454B2
公开(公告)日:2022-08-30
申请号:US16834763
申请日:2020-03-30
Applicant: CITRIX SYSTEMS, INC.
Inventor: Steven A. Keller , Sindy Giraldo
Abstract: Data is received characterizing a plurality of virtual resources executing application code and deployed within a remote computing environment. The remote computing environment is providing a first configuration of computing resources for execution of the plurality of virtual resources. Resource consumption information associated with the plurality of virtual resources is monitored via an application programing interface of the remote computing environment. A second configuration of computing resources for the plurality of virtual resources is determined using a set of rules and the resource consumption information. A request is transmitted to the remote computing environment to provide the second configuration of computing resources for execution of the plurality of virtual resources. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US11429243B2
公开(公告)日:2022-08-30
申请号:US16183154
申请日:2018-11-07
Applicant: Citrix Systems, Inc.
Inventor: Christopher Fleck , Jeroen Mattijs van Rotterdam
IPC: G06F3/0481 , G06F9/451 , G06F16/954 , G06F16/957
Abstract: The present disclosure is directed towards systems and methods for configuring the interface of an embedded browser. The client application can dynamically control the interface of the embedded browser based on the sessions established between the client application and one or more network applications. The client application can change the configuration of the embedded browser's interface contextually based on different network applications accessed by the embedded browser.
-
公开(公告)号:US20220271934A1
公开(公告)日:2022-08-25
申请号:US17662711
申请日:2022-05-10
Applicant: Citrix Systems, Inc.
Inventor: Anudeep Athlur , Praveen Raja Dhanabalan , Anuj Magazine
Abstract: Methods and systems for secure authentication in an extended reality (XR) environment are described herein. An XR environment may be output by a computing device and for display on a device configured to be worn by a user. A first plurality of images may be determined via the XR environment. The first plurality of images may be determined based on a user looking at a plurality of objects, real or virtual, in the XR environment. The first plurality of images may be sent to a server, and the server may return a second plurality of images. A public key and private key may be determined based on different portions of each of the second plurality of images. The public key may be sent to the server to register and/or authenticate subsequent communications between the computing device and the server.
-
公开(公告)号:US11418566B2
公开(公告)日:2022-08-16
申请号:US16665264
申请日:2019-10-28
Applicant: CITRIX SYSTEMS, INC.
Inventor: Moso Lee
IPC: H04L65/65 , G06F3/06 , G06F9/455 , H04L67/1097 , G06F9/4401
Abstract: A client device includes a memory and at least one processor configured to cooperate with the memory. The at least one processor receives a virtual disk change notification from a server, with the virtual disk change notification including a new configuration for a virtual disk image. At least one change to the virtual disk image is determined based on a comparison of the virtual disk image with the new configuration of the virtual disk image. The virtual disk image is modified based on the determined at least one change.
-
公开(公告)号:US11411982B2
公开(公告)日:2022-08-09
申请号:US17034636
申请日:2020-09-28
Applicant: Citrix Systems, Inc.
Inventor: Kasirao Velugu , Priya Bagaria , Thirumoorthi Thangamani , Ganesh Kathiresan
Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.
-
公开(公告)号:US11411974B2
公开(公告)日:2022-08-09
申请号:US16415857
申请日:2019-05-17
Applicant: Citrix Systems, Inc.
Inventor: Chiradeep Vittal
Abstract: The implementations described herein provide a tool for identifying security issues and applying security policies to the service(s) and/or microservices. Rather than a user (such as an administrator) reactively diagnosing security incidents, the systems and methods described herein may provide a tool by which the user can proactively monitor the use of the services and microservices for security issues and control the user of such microservices and services via policies. The systems and methods allow API granular policy control to determine which APIs may be granted or denies access based on a variety of criteria, such as but not limited to the source of the request, the specific API being called, temporal conditions, geography and so forth. The user can identify security concerns or issues on a per API basis.
-
公开(公告)号:US11409716B2
公开(公告)日:2022-08-09
申请号:US16262496
申请日:2019-01-30
Applicant: Citrix Systems, Inc.
Inventor: Nishant Jaywant Karajgikar , Ajay Kumar , Jason Yanchuleff
IPC: G06F16/00 , G06F16/18 , G06F16/176
Abstract: Methods and systems for shared file conflict detection on a computing device are described herein. A computing device may store a shared file that may be accessed by a variety of other computing devices. An operating system executing on one or more computing devices may generate file handles corresponding to file operations associated with the shared file. One or more of the computing devices may receive, from a remote computing device, a request for a file operation associated with the shared file. A notification corresponding to file handles associated with the shared file may be transmitted to a user. The request for the file operation may be implemented or rejected based on file handles associated with the shared file, the file operation, and/or whether the file operation may cause an application to crash or cause data corruption.
-
公开(公告)号:US20220245017A1
公开(公告)日:2022-08-04
申请号:US17725745
申请日:2022-04-21
Applicant: Citrix Systems, Inc.
Inventor: Jeremy White , Ted Harwood , Wellington Goncalves
Abstract: Methods and systems for managing notifications relating to execution of microservices are described herein. A format of notifications relating to execution of a plurality of microservices may be defined. The format may provide that all notifications generated based on the format comprise code. The code may indicate, for example, an identity of one of a plurality of microservices, a version of the code, an occurrence of an issue in execution of the one of the plurality of microservices, and/or one or more scripts which may be executed to address an issue of the notification. Two or more notifications may be received, and the one or more notifications may be formatted based on the defined format. A third notification may be generated based on a comparison of the two or more notifications. The third notification may be transmitted to a computing device.
-
公开(公告)号:US20220231699A1
公开(公告)日:2022-07-21
申请号:US17614853
申请日:2020-05-06
Applicant: Citrix Systems, Inc.
Inventor: Muhammad Dawood
Abstract: Described embodiments provide systems and methods for stream-based compression. An encoder of a first device receives an input stream of bytes including a first byte preceded by one or more second bytes. The encoder may determine to identify a prefix code for the first byte. The encoder may select a prefix code table using the one or more second bytes. The encoder may identify, from the selected prefix code table, the prefix code of the first byte. The encoder may generate an output stream of bytes by replacing the first byte in the input stream with the prefix code of the first byte. The encoder may transmit the output stream from the encoder of the first device to a decoder of a second device. The output stream may have a fewer number of bits than the input stream.
-
-
-
-
-
-
-
-
-