-
公开(公告)号:US20220200977A1
公开(公告)日:2022-06-23
申请号:US17125266
申请日:2020-12-17
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
IPC: H04L29/06
Abstract: Described embodiments provide systems and methods for protecting private data or confidential information. A device can receive a request from a client for a page from a server that includes confidential information to be verified with an owner of the confidential information. The device may be intermediary between the client and the server. Prior to providing the page to the client for rendering, the device may replace a first user interface (UI) element having the confidential information in the page, with a second UI element to obfuscate the confidential information. The device may receive an activation of the second UI element to request the owner to verify the confidential information from the client. The device may send to the client an update to the page to include an indication of whether the confidential information has been correctly verified with the owner.
-
公开(公告)号:US11367445B2
公开(公告)日:2022-06-21
申请号:US16782470
申请日:2020-02-05
Applicant: Citrix Systems, Inc.
Inventor: Pawan Kumar Dixit , Dinesh Jidugu
IPC: G10L15/22 , G06F9/451 , G10L15/30 , H04L47/70 , H04L67/141 , G10L13/00 , G10L15/26 , H04L67/10 , H04L67/01
Abstract: Aspects of the disclosure relate to various systems and techniques that provide for a method and apparatus for transmitting speech as text to a remote server and converting the text stream back to speech for delivery to a remote application. For example, a person, through workspace virtualization, is accessing a remote application that accepts speech as its input. The user, using a microphone, would speak into the microphone where the speech would be converted into text with a local speech-to-text converter. The text version of speech is sent to a remote server, which converts the text back to speech using a remote server based text-to-speech converter where the reconstructed speech is usable as input to a remote application or device.
-
公开(公告)号:US20220188413A1
公开(公告)日:2022-06-16
申请号:US17123262
申请日:2020-12-16
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
IPC: G06F21/55 , G06F21/52 , G06F21/62 , G06F40/279
Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, monitoring an application for suspicious activity based on keystrokes to input data to the application and detecting an instance of suspicious activity within the application based on a sequence of keystrokes to input the data to the application, the sequence of keystrokes to provide characters indicative of sensitive data and in a format different than an expected format for the input data. The method also includes, by the computing device, generating an action to prevent loss of sensitive data in response to detection of the instance of suspicious activity.
-
公开(公告)号:US11362943B2
公开(公告)日:2022-06-14
申请号:US16847780
申请日:2020-04-14
Applicant: CITRIX SYSTEMS, INC.
Inventor: Georgy Momchilov , Hubert Divoux , Roberto Valdes , Leo C. Singleton, IV , Paul Browne , Kevin Woodmansee
IPC: H04L45/586 , H04L45/42 , H04L67/141 , H04L9/40 , H04L67/01
Abstract: A computing system may include a computing device configured to store and update published resource entitlements for a plurality of client devices. The system may further include a plurality of virtual delivery appliances configured to receive connection requests from the client devices, with the connection requests including a connection lease issued based upon the published resource entitlements for the client devices, request validation of the connection leases from the computing device, and provide the client devices with access to virtual sessions corresponding to the published resource entitlements responsive to validation of connection leases from the computing device. The computing device, responsive to validation requests from the virtual delivery appliances, may also compare the connection leases to the updated published resource entitlements and validate virtual session requests based thereon.
-
公开(公告)号:US11362825B2
公开(公告)日:2022-06-14
申请号:US16887853
申请日:2020-05-29
Applicant: Citrix Systems, Inc.
Inventor: Anudeep Athlur , Praveen Raja Dhanabalan , Anuj Magazine
Abstract: Methods and systems for secure authentication in an extended reality (XR) environment are described herein. An XR environment may be output by a computing device and for display on a device configured to be worn by a user. A first plurality of images may be determined via the XR environment. The first plurality of images may be determined based on a user looking at a plurality of objects, real or virtual, in the XR environment. The first plurality of images may be sent to a server, and the server may return a second plurality of images. A public key and private key may be determined based on different portions of each of the second plurality of images. The public key may be sent to the server to register and/or authenticate subsequent communications between the computing device and the server.
-
公开(公告)号:US11361075B1
公开(公告)日:2022-06-14
申请号:US17351441
申请日:2021-06-18
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.
-
公开(公告)号:US11356418B2
公开(公告)日:2022-06-07
申请号:US16898822
申请日:2020-06-11
Applicant: Citrix Systems, Inc.
IPC: H04L61/2575 , H04L61/2514 , H04L9/40
Abstract: Described embodiments provide systems and methods for using unencrypted communication tunnels. A first device intermediary between a client and a server may maintain an encrypted tunnel and an unencrypted tunnel with a second device intermediary between the client and the server. The first device may communicate, with the second device, at least one network address translation (NAT) rule via the encrypted tunnel. The first device may translate address information of a first packet, using the at least one NAT rule. The first device may send the first packet with the translated address information via the unencrypted tunnel, to the second device to reverse the translation of the address information using the at least one NAT rule.
-
公开(公告)号:US20220173890A1
公开(公告)日:2022-06-02
申请号:US17447713
申请日:2021-09-15
Applicant: CITRIX SYSTEMS, INC.
Inventor: GEORGY MOMCHILOV , HUBERT DIVOUX , ROBERTO VALDES
Abstract: A smart card may include a memory configured to store a user connection lease and user interface (UI) cache for a user and a private/public key pair of the smart card, with the user connection lease being bound to the private/public key pair of the smart card. The smart card may further include a processor coupled to the memory and configured to establish a communications link with a kiosk device to be shared by a plurality of different users, initiate a virtual session for the user at the kiosk device based upon the user connection lease and the private key responsive to establishing the communications link (with the smart card defining an endpoint for the virtual session authorization), and cause the kiosk device to launch the virtual session based upon the user UI cache.
-
公开(公告)号:US11349812B2
公开(公告)日:2022-05-31
申请号:US17117638
申请日:2020-12-10
Applicant: Citrix Systems, Inc.
Inventor: Gourish K Biradar , Kasirao Velugu , Vamshi Raghav , Ratnesh Singh Thakur , Rama Rao Katta , Srinivasa Reddy Kasu , Kapil Jaisinghani , Satyendra Tiwari
Abstract: Described embodiments provide systems and methods for learning across multiple application delivery controllers and updating settings across the application delivery controllers. A profile can be generated based on selection of a set of intermediary devices managed by a device. The set of intermediary devices configured to load balance data of an application hosted in different computing environments. Activity can be identified at the intermediary devices with use of a firewall. The activity having an appearance of a malicious attack on at least one intermediary device of the set. The device can determine if the activity is permissible or a violation based on a comparison of an aggregation of data records for the identified activity and a threshold. The device can provide a notification to at least one intermediary device of the set to configure the at least one intermediary device to allow the activity or prevent the activity.
-
公开(公告)号:US11349803B2
公开(公告)日:2022-05-31
申请号:US17024921
申请日:2020-09-18
Applicant: Citrix Systems, Inc.
Inventor: Josh Thomas Gray , Steven Lyons
IPC: H04L12/00 , H04L61/4511 , H04L61/4541 , H04L43/0864
Abstract: Described embodiments provide systems and methods for resolving Domain Name Service (DNS) requests. An authoritative DNS server may receive, from a recursive resolver, a DNS request to resolve a query on behalf of a client. The authoritative DNS server may determine whether the recursive resolver is classified as a non-client representative resolver or a client representative resolver. The authoritative DNS server may identify a redirect server based on the recursive resolver classified as the non-client representative resolver or the resolved server based on the recursive resolver classified as the client representative resolver. The authoritative DNS server may transmit, to the recursive resolver, a response to the DNS request including an address of one of the redirect server or the resolved server.
-
-
-
-
-
-
-
-
-