-
公开(公告)号:US20220271934A1
公开(公告)日:2022-08-25
申请号:US17662711
申请日:2022-05-10
Applicant: Citrix Systems, Inc.
Inventor: Anudeep Athlur , Praveen Raja Dhanabalan , Anuj Magazine
Abstract: Methods and systems for secure authentication in an extended reality (XR) environment are described herein. An XR environment may be output by a computing device and for display on a device configured to be worn by a user. A first plurality of images may be determined via the XR environment. The first plurality of images may be determined based on a user looking at a plurality of objects, real or virtual, in the XR environment. The first plurality of images may be sent to a server, and the server may return a second plurality of images. A public key and private key may be determined based on different portions of each of the second plurality of images. The public key may be sent to the server to register and/or authenticate subsequent communications between the computing device and the server.
-
公开(公告)号:US20220217001A1
公开(公告)日:2022-07-07
申请号:US17141602
申请日:2021-01-05
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Aayush Bhala , Shubham Choudhary
Abstract: A computing device may receive a file previously uploaded by another device, and may validate the received file using data including a first value encrypted based on a document (e.g., a digital certificate or identification certificate) of the uploading device. The computing device may determine the validity of the certificate based on a certificate of a remote computing device to which the file was uploaded, and may decrypt the first value using a key of the certificate of the uploading device. The computing device may determine a second value for the received file and may determine validity of the received file based on a match of the first value and the second value.
-
公开(公告)号:US11381657B2
公开(公告)日:2022-07-05
申请号:US16376026
申请日:2019-04-05
Applicant: Citrix Systems, Inc.
IPC: H04L67/5681 , H04L67/04 , H04L67/06
Abstract: A computer system is provided. The computer system can include a memory, a network interface, and at least one processor coupled to the memory and the network interface. The at least one processor can be configured to identify a file to provide to a computing device; predict a geolocation at which the computing device is to request access to the file; predict a network bandwidth to be available to the computing device at the geolocation; determine, based on the file and the network bandwidth, a first portion of the file to store in a cache of the computing device; and download, via the network interface, the first portion of the file to the cache.
-
公开(公告)号:US11362825B2
公开(公告)日:2022-06-14
申请号:US16887853
申请日:2020-05-29
Applicant: Citrix Systems, Inc.
Inventor: Anudeep Athlur , Praveen Raja Dhanabalan , Anuj Magazine
Abstract: Methods and systems for secure authentication in an extended reality (XR) environment are described herein. An XR environment may be output by a computing device and for display on a device configured to be worn by a user. A first plurality of images may be determined via the XR environment. The first plurality of images may be determined based on a user looking at a plurality of objects, real or virtual, in the XR environment. The first plurality of images may be sent to a server, and the server may return a second plurality of images. A public key and private key may be determined based on different portions of each of the second plurality of images. The public key may be sent to the server to register and/or authenticate subsequent communications between the computing device and the server.
-
公开(公告)号:US11356418B2
公开(公告)日:2022-06-07
申请号:US16898822
申请日:2020-06-11
Applicant: Citrix Systems, Inc.
IPC: H04L61/2575 , H04L61/2514 , H04L9/40
Abstract: Described embodiments provide systems and methods for using unencrypted communication tunnels. A first device intermediary between a client and a server may maintain an encrypted tunnel and an unencrypted tunnel with a second device intermediary between the client and the server. The first device may communicate, with the second device, at least one network address translation (NAT) rule via the encrypted tunnel. The first device may translate address information of a first packet, using the at least one NAT rule. The first device may send the first packet with the translated address information via the unencrypted tunnel, to the second device to reverse the translation of the address information using the at least one NAT rule.
-
公开(公告)号:US11216415B2
公开(公告)日:2022-01-04
申请号:US16446112
申请日:2019-06-19
Applicant: Citrix Systems, Inc.
IPC: G06F16/10 , G06F16/11 , G06F16/178 , G06K9/00 , G10L15/26
Abstract: One disclosed method involves determining at least first and second segments of content represented by a first file, determining first data corresponding to occasions on which the first segment has been previously accessed, and determining second data corresponding to occasions on which the second segment has been previously accessed. Based at least in part on the first data and the second data, the first segment may be determined to be more likely relevant to a first user than the second segment.
-
公开(公告)号:US20210318990A1
公开(公告)日:2021-10-14
申请号:US16892539
申请日:2020-06-04
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Anuj Magazine , Anudeep Athlur
IPC: G06F16/178 , G06F16/13
Abstract: A computing system may store a first file in a system repository that is to be synchronized with at least a first repository associated with a first client device and a second repository associated with a second client device. The computing system may determine that the first repository is to receive a downloaded copy of at least a portion of the first file, and may cause a copy of the at least a portion of the first file to be downloaded from the system repository to the first repository. Based at least in part on the computing system determining that the first repository is to receive the downloaded copy, an identifier of the at least a portion of first file may be stored in the second repository without storing a copy of the at least a portion of the first file in the second repository.
-
公开(公告)号:US20210234838A1
公开(公告)日:2021-07-29
申请号:US17230442
申请日:2021-04-14
Applicant: CITRIX SYSTEMS, INC.
Inventor: Anudeep Athlur , Praveen Raja Dhanabalan
Abstract: A computing device may include a processor and a memory. The processor may be configured to provide an encrypted second portion of a key to a client device in response to a match between data decrypted from an encrypted first portion of the key and a first portion of the key, the match being indicative of an absence of a proxy device. The processor may be configured to detect a loss in connectivity between the computing device and the client device based upon a mismatch between a decrypted second portion of the key and a second portion of the key, the mismatch being indicative of the proxy device.
-
公开(公告)号:US11025699B2
公开(公告)日:2021-06-01
申请号:US16747690
申请日:2020-01-21
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan
IPC: G06F15/16 , H04L29/06 , H04L12/26 , H04L29/08 , H04L12/859
Abstract: Described embodiments provide for dynamically optimizing the number of application layer streams that may be multiplexed into a single transport layer connection, providing the advantages of application layer multiplexing without incurring unnecessary congestion-based network delays. A device may monitor net bandwidth and packet loss rates for a connection, and may dynamically increase and decrease a number of concurrent application layer streams to balance throughput and congestion avoidance. As congestion increases, the device may reduce concurrent stream limits in order to spawn additional transport layer connections, allowing faster congestion recovery and reduced performance impairment.
-
20.
公开(公告)号:US20200374213A1
公开(公告)日:2020-11-26
申请号:US16990508
申请日:2020-08-11
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan
IPC: H04L12/727 , H04L12/823 , H04L29/06 , H04L12/861
Abstract: Described embodiments provide systems and methods for path selection proportional to a penalty delay in processing packets. A server-side intermediary may identify a delay penalty for processing packets of a server destined for a client. The server-side intermediary may be in communication via links of different latencies with a client-side intermediary. The server-side intermediary may select a second link with a latency that deviates from the lowest latency of a first link by the delay penalty. The server-side intermediary may transmit, to the client-side intermediary, duplicates of the packets via the selected second link with information indicating to hold the duplicates at the client-side intermediary. The server-side intermediary may receive an indication to drop or send the duplicates to the client. The server-side intermediary may transmit the indication to the client-side intermediary to drop or send the duplicates according to the indication.
-
-
-
-
-
-
-
-
-