-
11.
公开(公告)号:US11620807B2
公开(公告)日:2023-04-04
申请号:US16952686
申请日:2020-11-19
Applicant: Citrix Systems, Inc.
Inventor: Haipeng Luo , Sai Xu
Abstract: Systems and methods for Optical Character Recognition (“OCR”) based anti-spoofing for Unicode homograph. The method comprises: performing operations by a computing device to make an OCR identification on an original electronic address so as to obtain an OCR electronic address; encoding (a) the original electronic address to obtain an encoded access address and (b) the OCR electronic address to obtain an encoded OCR electronic address; comparing the encoded access address to the encoded OCR electronic address; and determining if a Unicode homograph spoofing situation exists based on results of the comparing.
-
公开(公告)号:US11336606B2
公开(公告)日:2022-05-17
申请号:US17215113
申请日:2021-03-29
Applicant: Citrix Systems, Inc.
Inventor: Sai Xu , Taodong Lu , Qin Zhang
IPC: G06F15/16 , G06F9/54 , H04L29/06 , H04L51/224 , H04L51/42 , H04L51/046 , G06F3/0482 , G06Q10/10
Abstract: In accordance with one disclosed method, a first computing system may receive a message from an application hosted on a second computing system, the message being indicative of an event of the application. In response to receiving the message, the first computing system may generate a notification indicative of the event and send the generated notification to a client device. The first computing system may receive a response to the notification from the client device, and may process the response so as to cause the application to take an action responsive to the event.
-
公开(公告)号:US20210390475A1
公开(公告)日:2021-12-16
申请号:US16918111
申请日:2020-07-01
Applicant: Citrix Systems, Inc.
Inventor: Sai Xu , Yiming Wang
IPC: G06Q10/06 , H04L29/06 , G06F16/245 , G06F16/28 , G06F16/27
Abstract: Described embodiments provide systems and methods for providing remote application action feed cards. A ticket can be received from a client device. The ticket can be indicative of an action of a remote application and the remote application can be accessible by a group of users. The device can receive information about the action identified in the received ticket from at least one user of the group of users in response to provision of a determined key and the received ticket to the group of users. The device can provide the received information to client devices of user of the group of users to identify actions of other users of the group of users.
-
公开(公告)号:US11157882B1
公开(公告)日:2021-10-26
申请号:US17140406
申请日:2021-01-04
Applicant: Citrix Systems, Inc.
Abstract: A first computing system may determine that a first event is represented in first data received from a second computing system. Based at least in part on the first event being represented in the first data, the first computing system may generate a time-ordered schedule of events that includes an indication of the first event, and may send, to a client device, second data representing the time-ordered schedule of events.
-
公开(公告)号:US10986085B2
公开(公告)日:2021-04-20
申请号:US16265103
申请日:2019-02-01
Applicant: Citrix Systems, Inc.
IPC: H04L29/06
Abstract: Methods and systems for management of subscriber identities associated with user devices are described herein. The user device may enroll the user device to a server and lock a subscriber identity associated with the device by setting a password on the subscriber identity. If a credential entered by a user is verified, the subscriber identity associated with the device may be unlocked. Alternatively, the user device may retrieve one or more identities associated with the user, the user device and/or the subscriber identity. A server may register the one or more identities with a database. If the user device sends a request to connect to the network, the server may verify the one or more identities retrieved by the user device to determine whether to grant access from the user device to the network.
-
公开(公告)号:US10963981B2
公开(公告)日:2021-03-30
申请号:US16371596
申请日:2019-04-01
Applicant: Citrix Systems, Inc.
Inventor: Shuzhen Li , Sai Xu
Abstract: Methods and systems for tracking image senders using client devices are described herein. A computing system may receive an image containing a first watermark vector corresponding to a user account of an image sender. The computing system may convert the image to a frequency domain image that contains the first watermark vector. From the frequency domain image, the computing system may identify the first watermark vector. The computing system may compare the first watermark vector to each of a plurality of stored watermark vectors, each corresponding to a known user account, to determine a probability of a match. The computing system may determine the user account of the sender of the image by determining which of the plurality of stored watermark vectors has a highest probability of a match, and may send, to a workplace administrator platform, an indication of the user account.
-
公开(公告)号:US20210092155A1
公开(公告)日:2021-03-25
申请号:US16686888
申请日:2019-11-18
Applicant: Citrix Systems, Inc.
Inventor: Yiming Wang , Sai Xu
IPC: H04L29/06
Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to recognize a user input field of a web site displayable in a browser, the website identified as a security risk based on a whitelist of website addresses; determine that a sequence of characters within the user input field matches one or more entries in a list of partial passwords in response to the web site being identified as a security risk; and prevent the user from entering additional characters into the user input field in response to the determination, to block receipt of the password by the web site. The determination may be performed in response to a count of characters in the sequence of characters exceeding a threshold.
-
公开(公告)号:US20200026536A1
公开(公告)日:2020-01-23
申请号:US16039589
申请日:2018-07-19
Applicant: Citrix Systems, Inc.
Inventor: Maowen Li , Taodong Lu , Sai Xu
Abstract: Embodiments described include systems and methods for user interface (UI) anomaly detection. One or more processors of a client device can execute an application undergoing UI anomaly detection. The application can be injected with a detection engine. The detection engine can determine, while executing as a thread of the application on the one or more processors of the client device, that a dimension of a text-designated region of a first user interface element of the application is less than that of corresponding text for rendering on the user interface element. The detection engine can provide, to a server responsive to the determination, an indication of a first UI anomaly. The indication can include information about a position and size of the first user interface element.
-
公开(公告)号:US20230412542A1
公开(公告)日:2023-12-21
申请号:US17809150
申请日:2022-06-27
Applicant: Citrix Systems, Inc.
Abstract: A system and method for dynamically transforming email signatures. A method includes: receiving an email from an email client prior to delivery to an intended recipient, the email including an original signature; analyzing the email to obtain information associated with the intended recipient of the email; predicting a preferred language of the intended recipient based on the information; converting the original signature to a revised signature, wherein the revised signature utilizes the preferred language; and forwarding the email with the revised signature to the intended recipient.
-
公开(公告)号:US11539829B2
公开(公告)日:2022-12-27
申请号:US17180108
申请日:2021-02-19
Applicant: Citrix Systems, Inc.
IPC: H04M1/00 , H04M1/72466 , G06F3/01 , G06F21/84 , H04M1/72463
Abstract: Systems and methods for controlling access to a mobile device. A method for unlocking a mobile device includes detecting a user input comprising two or more user actions performed at one or more physical input buttons of the mobile device when the mobile device is in a lock state. The lock state prevents use of at least one functionality of the mobile device. Each user action corresponds to a code. The method also includes determining whether the detected user input is valid, and changing a state of the mobile device from the lock state to an unlock state to enable the use of the at least one functionality of the mobile device if the detected user input is valid.
-
-
-
-
-
-
-
-
-