-
公开(公告)号:US20210232673A1
公开(公告)日:2021-07-29
申请号:US16774262
申请日:2020-01-28
Applicant: Citrix Systems, Inc.
Inventor: Anudeep Athlur , Praveen Raja Dhanabalan , Anuj Magazine
IPC: G06F21/44 , G06F16/176 , G06F40/109
Abstract: A computing system may perform a method that involves receiving an input indicating at least one person, other than a user of a computing device, is proximate to the computing device, determining that the person is within a threshold distance of the computing device based on the received input, and modifying an output of the computing device in response to determining that the person is within the threshold distance from the computing device, so as to inhibit the person from receiving content from the computing device.
-
公开(公告)号:US11005821B2
公开(公告)日:2021-05-11
申请号:US16242613
申请日:2019-01-08
Applicant: CITRIX SYSTEMS, INC.
Inventor: Anudeep Athlur , Praveen Raja Dhanabalan
Abstract: A server for detecting a proxy device in a communications path may include a processor and a memory associated therewith. The processor may obtain an encrypted first portion of an encryption key from the client device. The encryption key may be based upon user-input credentials for a given user. The processor may also communicate an encrypted second portion of the encryption key to the client device based upon determining that the encrypted first portion matches a corresponding first portion of the encryption key indicative of an absence of the proxy device in the communications path. The processor may also detect a loss in connectivity between the server and the client device in response to the client device determining that the decrypted second portion of the encryption key does not match a corresponding second portion of the encryption key indicative of a proxy device in the communications path.
-
公开(公告)号:US11683166B2
公开(公告)日:2023-06-20
申请号:US16943188
申请日:2020-07-30
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Anudeep Athlur , Anuj Magazine
IPC: H04L9/08 , G06F16/176 , G06F21/60 , G06F16/11
CPC classification number: H04L9/0861 , G06F16/116 , G06F16/176 , G06F21/602 , H04L9/0891
Abstract: In some embodiments, a method may be performed by a computing device that involves displaying an identifier indicative of a file, the display of the identifier being readable by a second device, receiving first data from the second device in response to the identifier being read by the second device, and enabling performance of at least one action with respect to the file with use of the first data. In some embodiments, the method may further involve receiving a first encryption fragment associated with the file, receiving, from the second device, a second encryption fragment associated with the file, reconstructing, using at least the first encryption fragment and the second encryption fragment, an encryption key enabling viewing of the file, and viewing the file using the encryption key.
-
公开(公告)号:US20220217174A1
公开(公告)日:2022-07-07
申请号:US17142743
申请日:2021-01-06
Applicant: Citrix Systems, Inc.
Inventor: Preveen Raja Dhanabalan , Anuj Magazine , Anudeep Athlur
Abstract: A method for providing a visual indication of the security threat awareness level is disclosed. Such a visual indication helps improve the security of a device or an enterprise by giving a user an indication of the security risks associated with currently open and active applications. In turn, the user can use the visual indication as a cue to take mitigating actions to reduce the security risk, such as by using the application more carefully or by exiting the application. Each application is assigned a security score and the system determines the security threat awareness level based on the security score(s) of the open and active applications.
-
公开(公告)号:US20220083509A1
公开(公告)日:2022-03-17
申请号:US17083416
申请日:2020-10-29
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Anudeep Athlur , Anuj Magazine
IPC: G06F16/14 , G06F16/13 , G06F16/182 , H04L29/08 , H04L29/06
Abstract: A computing system may compare a first hash with a second hash, the first hash generated by a client device using a first section of a file at the client device and the second hash generated using first data stored by the computing system. In response to a match between the first and second hashes, the computing system may generate a copy of the file with use of the first data to avoid delay caused by upload of the first section of the file from the client device.
-
公开(公告)号:US20210258367A1
公开(公告)日:2021-08-19
申请号:US17245152
申请日:2021-04-30
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Anuj Magazine , Anudeep Athlur
Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.
-
公开(公告)号:US20210232542A1
公开(公告)日:2021-07-29
申请号:US16774448
申请日:2020-01-28
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Anudeep Athlur , Anuj Magazine
IPC: G06F16/176 , G06F16/14 , G06F16/2457 , G06F21/62 , H04L29/08
Abstract: A computing system may perform a method that involves receiving, from a first computing device, a request for a file, where the request identifies at least one user who has access to the file and includes information indicative of the file. The method further includes identifying, based at least in part on the received request, the file within a repository of files, sending, to a second computing device, a first indication of the request to access the file, receiving, from the second computing device, a second indication that the file is to be made accessible via the first computing device, and causing the file to be transferred from the repository to the first computing device.
-
公开(公告)号:US11044300B2
公开(公告)日:2021-06-22
申请号:US16658298
申请日:2019-10-21
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Anuj Magazine , Anudeep Athlur
Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.
-
公开(公告)号:US20210120071A1
公开(公告)日:2021-04-22
申请号:US16658298
申请日:2019-10-21
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Anuj Magazine , Anudeep Athlur
Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.
-
公开(公告)号:US20200334698A1
公开(公告)日:2020-10-22
申请号:US16387055
申请日:2019-04-17
Applicant: Citrix Systems, Inc.
Inventor: Anuj Magazine , Praveen Raja Dhanabalan , Anudeep Athlur
Abstract: A machine learning system may monitor usage of network or hosted resources by users or employees, and may dynamically generate short or “micro” surveys for immediate presentation. These surveys may be aggregated and analyzed by the machine learning system, reducing delays of responses. As a result, engagement may be measured in real-time or near real-time, actionable insights generated, and responsive actions taken. The machine learning system may monitor various interactions of users or employees with a virtual or hosted environment or workspace, including connections to virtual machines, remote desktop applications, SaaS applications, web applications, or other such entities, as well as environmental characteristics such as network location and/or quality.
-
-
-
-
-
-
-
-
-