-
公开(公告)号:US11223698B2
公开(公告)日:2022-01-11
申请号:US17021266
申请日:2020-09-15
Applicant: Citrix Systems, Inc.
Inventor: Xavier Gallardo , Leo C. Singleton, IV , Simon Frost
IPC: H04L29/08
Abstract: Methods, systems, computer-readable media, and apparatuses may provide for the intermediated retrieval of applications on a network. A computing device may be configured to receive an application from an application server on a network. Based on, for example, the network conditions between the computing device and the application server, the computing device may query a plurality of intermediary servers. Based on a decision that, for example, the network conditions between the computing device, application server, and a selected intermediary server are better than the network conditions between the computing device and the application server, the computing device may cause the application to be retrieved by a host application of the selected intermediary server. The host application may process and transmit the application to the computing device. The computing device may display the processed application and transmit user input corresponding to the processed application to the intermediary server.
-
公开(公告)号:US11216715B2
公开(公告)日:2022-01-04
申请号:US16887152
申请日:2020-05-29
Applicant: Citrix Systems, Inc.
Inventor: Yajun Yao , Yuan Bai , Juanjuan Chen
Abstract: Techniques are disclosed for a hybrid undo/redo for text editing, where non-linear undo and redo operations are performed across dynamic regions in a document and linear undo and redo operations are performed within the dynamic regions in the document. In an example, the hybrid undo/redo may be achieved by maintaining respective region offset values for the dynamic regions created in a document by the edits made to the document. In operation, the respective region offset values associated with the dynamic regions can be used to negate or otherwise counteract the effect of edits made in the dynamic regions.
-
公开(公告)号:US11216415B2
公开(公告)日:2022-01-04
申请号:US16446112
申请日:2019-06-19
Applicant: Citrix Systems, Inc.
IPC: G06F16/10 , G06F16/11 , G06F16/178 , G06K9/00 , G10L15/26
Abstract: One disclosed method involves determining at least first and second segments of content represented by a first file, determining first data corresponding to occasions on which the first segment has been previously accessed, and determining second data corresponding to occasions on which the second segment has been previously accessed. Based at least in part on the first data and the second data, the first segment may be determined to be more likely relevant to a first user than the second segment.
-
公开(公告)号:US20210406225A1
公开(公告)日:2021-12-30
申请号:US16987696
申请日:2020-08-07
Applicant: Citrix Systems, Inc.
Inventor: Arnav Akhoury , Divyansh Deora , Satish Vanahalli , Nandikotkur Achyuth
Abstract: A computing system may determine different patterns of modifications that are to be made to data of a file to generate respective modified versions of the file, the different patterns of modifications enabling identification of other files derived from the respective modified versions of the file, the different patterns of modifications including a first pattern of modifications. The computing system may generate a first modified version of the file at least in part by modifying the data based on the first pattern of modifications, may send the first modified version of the file to a client device, and may store signature data indicative the first pattern of modifications so as to enable identification of other files derived from the first modified version of the file.
-
公开(公告)号:US20210406186A1
公开(公告)日:2021-12-30
申请号:US17470631
申请日:2021-09-09
Applicant: CITRIX SYSTEMS, INC.
Inventor: Yuhua Lu , Graham Macdonald , Simon Graham
IPC: G06F12/0871 , G06F12/0868 , G06F9/455
Abstract: A virtual disk is provided to a computing environment. The virtual disk includes identity information to enable identification of a virtual machine within the computing environment. A size of the virtual disk is increased within the computing environment to enable the virtual disk to act as a storage for the identity information and as a cache of other system data to operate the virtual machine. The virtual machine is booted within the computing environment. The virtual machine is configured to at least access the virtual disk that includes both identity information and caches other system data to operate the virtual machine. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US20210406089A1
公开(公告)日:2021-12-30
申请号:US16915178
申请日:2020-06-29
Applicant: CITRIX SYSTEMS, INC.
Inventor: Steven Keller , Sindy Giraldo
Abstract: Data characterizing a log of requests by a plurality of software services executing based on a virtual resource that is within a remote computing environment is received. The executing includes transmitting the requests for utilization of the virtual resource. A metric of utilization of the virtual resource by a first software service of the plurality of software services is determined based on the log. The metric of utilization characterizes a portion of total usage of the virtual resource that is attributable to the first software service. The metric of utilization is provided. Related apparatus, systems, techniques and articles are also described.
-
247.
公开(公告)号:US11212113B2
公开(公告)日:2021-12-28
申请号:US16416452
申请日:2019-05-20
Applicant: CITRIX SYSTEMS, INC.
Inventor: Georgy Momchilov , Hubert Divoux , Roberto Valdes
Abstract: A computing device may include a memory and a processor cooperating with the memory and configured to receive a connection request from a client device having a public/private encryption key pair associated therewith. The connection request may be based upon a connection lease and the public key for the client device, and the connection lease may be generated based upon an authenticated version of the public key for the client device. The processor may also be configured to verify that the authenticated version of the public key upon which the connection lease was generated matches the public key for the client device and authorize a connection with the client device and provide the client device with access to a virtual computing session via the connection.
-
公开(公告)号:US11210113B2
公开(公告)日:2021-12-28
申请号:US16790980
申请日:2020-02-14
Applicant: Citrix Systems, Inc.
Inventor: Georgy Momchilov , Mukund Ingale , Bala Swaminathan
Abstract: Methods and systems for persisting a protocol state from a first instance of a virtual desktop application to a second instance of the virtual desktop application are described herein. In some embodiments, a computing platform may establish, by a first virtual desktop instance, a secure session with a virtual delivery agent (VDA), resulting in a protocol state of the first virtual desktop instance. Further, the computing platform may persist, using the first virtual desktop instance, the protocol state. Next, the computing platform may transmit, from the first virtual desktop instance to a second virtual desktop instance, the protocol state. Additionally, the computing platform may authenticate, using authentication tokens comprising the protocol state, a connection between the second virtual desktop instance and a gateway device. Subsequently, the computing platform may re-establish, after the authenticating, the secure session, wherein the secure session comprises a connection between the VDA and the second virtual desktop instance.
-
249.
公开(公告)号:US20210400075A1
公开(公告)日:2021-12-23
申请号:US17016985
申请日:2020-09-10
Applicant: Citrix Systems, Inc.
Inventor: Asterios Stergioudis , Aikaterini Kalou
IPC: H04L29/06
Abstract: Described embodiments provide systems, methods, computer readable media for determining risk metrics. A device may provide a risk model for a network environment. The risk model may include an input level and an output level. The input level may process first datasets each corresponding to a feature and a time window. The first datasets may include factors on access requests. The output level may generate a first aggregate risk metric of a first access request according to the datasets processed by the input level. The device may identify a second dataset corresponding to a second access request over the features and time windows. The device may determine a second aggregate risk metric by applying the second dataset to the risk model. The device may generate a response to the second access request according to an access control policy and the second aggregate risk metric.
-
公开(公告)号:US11206253B2
公开(公告)日:2021-12-21
申请号:US16857390
申请日:2020-04-24
Applicant: Citrix Systems, Inc.
Inventor: Feng Huang
Abstract: Aspects of the disclosure relate to processing systems using improved domain pass-through authentication techniques. A computing platform may send, to an external cloud computing platform, one or more registration requests that each may cause an RLS endpoint corresponding to each of a plurality of resource location connectors to be stored at the external cloud computing host platform. The computing platform may receive one or more requests for a resource location identifier. The computing platform may determine an accessible resource location connector and may send, to the user device, a corresponding resource location identifier. After receiving a pass-through authentication request, the computing platform may receive, from the ticketing service stored on the external cloud computing platform, a one-time ticket. The computing platform may send, to the user device, the one-time ticket, which may allow the user device to perform pass-through authentication with the external cloud computing platform.
-
-
-
-
-
-
-
-
-