-
公开(公告)号:US20210281605A1
公开(公告)日:2021-09-09
申请号:US16808731
申请日:2020-03-04
Applicant: Citrix Systems, Inc.
Inventor: Rakesh Kumar THANGELLAPALLI , Rama Rao KATTA , Kasirao VELUGU , Praveen DANDIN , Aman AGRAWAL , Seth Kenneth KEITH , Ratnesh SINGH THAKUR , Josephine SUGANTHI JOSEPH LEO
IPC: H04L29/06 , G06F16/955
Abstract: Described embodiments provide systems and methods for detecting autonomous programs is provided. A device, intermediary to a plurality of clients and a plurality of servers, can receive a first request from a first client of the plurality of clients to a server of the plurality of servers via a connection between the device and the first client. The device can include, into a response from the server to the first client, a uniform resource locator (URL) comprising one or more randomly generated characters within a predetermined character space. The device can determine that the first client has an autonomous program responsive to receiving a second request from the first client using the URL. The device can terminate, responsive to the determination, the connection to the first client.
-
公开(公告)号:US20210271493A1
公开(公告)日:2021-09-02
申请号:US17320492
申请日:2021-05-14
Applicant: Citrix Systems, Inc.
Inventor: Trevor Stockert , Scott Israel
Abstract: Methods, systems, computer-readable media, and apparatuses may provide for the creation and management of applications with dependencies. An application executing via a client application on a computing device may require a dependency, such as a software module, that is unavailable at the computing device. The application may be compiled with a remote loader module. Based on determining the dependency is unavailable at the computing device, the remote loader module may send information about the dependency to a server, which may provide instructions for retrieving the dependency. The application may then, via the remote loader and based on the instructions, request the dependency. The server may locate the dependency or generate it based on capabilities of the computing device and send the dependency to the application. The application may execute with the received dependency.
-
公开(公告)号:US11108673B2
公开(公告)日:2021-08-31
申请号:US15707077
申请日:2017-09-18
Applicant: Citrix Systems, Inc.
Inventor: Thomas Kludy , Ricardo Feijoo , Ayush Jain
Abstract: Methods, computer-readable media, and apparatuses for checking the health of a cloud-based component. The method includes receiving, by a health event hub as output by a first device, a request for performing a health check on a second device; outputting, by the health event hub, the request to each health checker on the network; receiving, by the health event hub, a health data response output by at least one checker that is capable of performing the health check; collecting, by the health event hub, each health data response associated with the request output by the first device that is output by the at least one health checker that is capable of performing the health check on the second device; and outputting, by the health event hub to each health data collector on the network, each health data response associated with the request output by the first device.
-
284.
公开(公告)号:US11107561B2
公开(公告)日:2021-08-31
申请号:US15581696
申请日:2017-04-28
Applicant: Citrix Systems, Inc.
Inventor: Chris Matthieu , Darcíe Tuuri , Steve Wilson
Abstract: A system includes biometric devices generating biometric data on a person, with the biometric devices transmitting the biometric data via respective messaging protocols. A messaging platform receives the biometric data from the biometric devices based on the respective messaging protocols. A biometric data server receives the biometric data from the messaging platform. The biometric data server includes a biometric database, a biometric data algorithm, and a biometric data analyzer. The biometric database is to store the biometric data. The biometric data algorithm is to generate a biometric data model over time based on the biometric data to determine the person's version of normal bio-feedback at any given time in comparison to other like time periods. The biometric data analyzer is to analyze new biometric data in view of the biometric data model, and to generate at least one caregiver notification alert when an anomaly is detected outside the biometric data model.
-
公开(公告)号:US20210266738A1
公开(公告)日:2021-08-26
申请号:US16798725
申请日:2020-02-24
Applicant: Citrix Systems, Inc.
Inventor: Arnav Akhoury , Nandikotkur Achyuth , Divyansh Deora
Abstract: A method may involve receiving, by a device operated by a user, at least one first input indicating that information is to be shared with at least one individual other than the user. The first device may acquire first biometric data from the at least one individual, and the information may be caused to be made accessible to at least one account that is associated with stored biometric data that matches the first biometric data.
-
公开(公告)号:US20210258171A1
公开(公告)日:2021-08-19
申请号:US16790125
申请日:2020-02-13
Applicant: Citrix Systems, Inc.
Inventor: Moso Lee
Abstract: Methods and systems for device authentication based on generating and displaying an optically scannable visual representation of a public portion of a hardware secured encryption key (EK) are described herein. A client certificate is encrypted with the public portion of the EK based on a scan of the displayed visual representation. A connection may be established between a computing device and a server using the encrypted client certificate and a private portion of the EK to authenticate the computing device. In some implementations, a request is received from a second computing device to access a first computing device, and includes data encrypted using a public portion of an EK acquired from a displayed optically scannable visual representation of the public portion of the EK. The second computing device is provided access to the first computing device based on decryption of the encrypted data using a private portion of the EK.
-
公开(公告)号:US20210248205A1
公开(公告)日:2021-08-12
申请号:US16785096
申请日:2020-02-07
Applicant: Citrix Systems, Inc.
Inventor: Nagendra Tank , Shiv Prasad Khillar , Saifulla Shaik , Kapil Jaisinghani
IPC: G06F16/957 , G06F16/958
Abstract: Described embodiments provide systems and methods for providing a web application composed of micro-frontends. The systems and methods can receive a request to access a micro-frontend of a user interface for a web-application from a client application executing on a client device. The systems and methods can retrieve one or more user interface specifications corresponding to a micro-service that provides the micro-frontend. The systems and methods can identify a plurality of resources used by the micro-service corresponding to the user interface specification. The systems and methods can add a plurality of tags to a web page based on the plurality of resources. The systems and methods can load the plurality of resources to establish data objects for the micro-service, in response to adding the plurality of tags to the web page, to construct a document object model for rendering via the client application executing on the client device.
-
公开(公告)号:US20210243196A1
公开(公告)日:2021-08-05
申请号:US17237320
申请日:2021-04-22
Applicant: Citrix Systems, Inc.
Inventor: Vipin Borkar , Santosh Sampath , Deepak Sharma , Arvind SankaraSubramanian
Abstract: Embodiments described include systems and methods for securely managing browser plugins via embedded browser. The solution enables a client application or embedded browser to dynamically load the browser components into the embedded browser based on a risk or security profile and one or more policies. The policies can be centrally managed to enable only allowed browser components to be loaded within the embedded browser for a given risk profile. Based on the risk profile, a session established by the embedded browser can be transferred from the client application to a hosted browser at a secure sever. When the session is transferred to the hosted browser, the present system can also redirect the browser component configurations to the hosted browser such that the same browser components are enabled, disabled, or modified at the hosted browser.
-
公开(公告)号:US11082499B2
公开(公告)日:2021-08-03
申请号:US14886243
申请日:2015-10-19
Applicant: Citrix Systems, Inc.
Inventor: Juan Rivera
IPC: H04L29/08
Abstract: Methods, systems, and computer-readable media for transferring hosted web browser sessions between browser servers are described herein. In various embodiments, a broker service may create a browser server pool from a plurality of browser servers. The broker service may connect a client agent with a first web browser session in a first browser server in the browser server pool. The broker service, responsive to a determination that the first web browser session needs to be transferred to a second browser server in the browser server pool, may request and receive a session context from the first web browser session, launch a second web browser session in the second browser server, initialize the second web browser session with the session context from the first web browser session, transfer the client agent from the first web browser session to the second web browser session, and terminate the first web browser session.
-
公开(公告)号:US11080408B2
公开(公告)日:2021-08-03
申请号:US16552180
申请日:2019-08-27
Applicant: Citrix Systems, Inc.
Inventor: Thomas Kludy , Ricardo Fernando Feijoo
IPC: H04L29/06 , G06F21/60 , G06F21/62 , H04L9/08 , G06Q20/00 , G06Q20/38 , G06Q20/36 , H04W12/06 , H04L29/08
Abstract: Embodiments of the disclosure include systems and methods for secure storage and/or retrieval of customer secrets by, e.g., a cloud services provider. According to methods, secret data that is to be securely stored may be transmitted, along with an initialization vector, to an encryption service for encryption using a private key stored on in a remote key vault. The encrypted data can be returned and stored, in its encrypted form, in a secure storage along with the initialization vector data. To retrieve the securely stored data, embodiments disclose retrieving the encrypted form of the data and transmitting it, along with its related initialization vector data, to the encryption service for decryption using the private key stored in the remote key vault. The decrypted data can then be made available to a requesting product service.
-
-
-
-
-
-
-
-
-