-
公开(公告)号:US11361075B1
公开(公告)日:2022-06-14
申请号:US17351441
申请日:2021-06-18
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.
-
公开(公告)号:US20210392053A1
公开(公告)日:2021-12-16
申请号:US16902867
申请日:2020-06-16
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
IPC: H04L12/24 , G06F9/445 , H04L12/66 , H04L29/08 , G06F3/0482
Abstract: In one disclosed method, a first application accessed by a client device receives an indicator of an action that a second application is configured to take with respect to a third application. The client device accesses a fourth application and presents, based at least in part on the indicator received by the first application, a user interface element for the fourth application. Based at least in part on detecting selection of the user interface element, the client device presents a user interface configured to cause the second application to take the action with respect to the third application in response to a user input. The client device detects the user input to the user interface and causes, based at least in part on the user input, the second application to perform the action with respect to the third application.
-
公开(公告)号:US11201889B2
公开(公告)日:2021-12-14
申请号:US16369648
申请日:2019-03-29
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh , Devyash Sanghai
Abstract: Methods and systems for performing secure device selection based on sensitive content detection are described herein. The methods and systems may analyze content being accessed via a virtual session established with a first device to determine that at least a portion of the content is sensitive content, determine information indicating one or more security features of the first device and one or more security features of a second device associated with a user of the first device, determine, based on the information, that the second device is more secure than the first device, and, responsive to the determination that the second device is more secure than the first device, transfer the virtual session to the second device or enter a more secure configuration of the first device.
-
公开(公告)号:US20210357834A1
公开(公告)日:2021-11-18
申请号:US16876998
申请日:2020-05-18
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh , Harsh Shah , Rachelle Tobkes , Jacob Summers
Abstract: Methods and systems for resource allocation using data from a variety of systems are described herein. A plurality of periods of time for using one or more resources may be identified based on a user request. Data indicative of locations of one or more users over one or more time periods may be received. Such data may be from an application other than a calendar application. Anticipated locations of the one or more users may be determined based on the data received. A resource of the one or more resources may be selected based on a distance between the resource and the anticipated locations of the one or more users. Based on detecting a change to the data, a new resource may be selected.
-
公开(公告)号:US11157151B1
公开(公告)日:2021-10-26
申请号:US16940482
申请日:2020-07-28
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
IPC: G06F3/0484 , H04L12/24
Abstract: In some embodiments, a method includes: receiving, by a computing device, information indicative of user interface (UI) elements of an application and inputs received by the UI elements; identifying, by the computing device, a feature of the application based on the received information; generating, by the computing device, a direct link to the feature by determining, from the received information, one or more of the UI elements that received inputs to navigate to the feature; and providing, by the computing device, the direct link to one or more users of the application, wherein in response to an input received on the direct link, the direct link interacts with the one or more UI elements to navigate to the application feature.
-
公开(公告)号:US20210182439A1
公开(公告)日:2021-06-17
申请号:US16716669
申请日:2019-12-17
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
Abstract: Techniques are disclosed for context-aware obfuscation and unobfuscation of sensitive content in the display of the sensitive content. An example methodology implementing the techniques includes receiving content for display, the content including metadata indicative of a location of at least one item of sensitive content within the received content, and determining at least one contextual factor. The method also includes, responsive to a determination to obfuscate the item of sensitive content based on the at least one contextual factor, displaying the item of sensitive content in obfuscated form. The method may also include, responsive to a determination to not obfuscate the item of sensitive content based on at least one contextual factor, displaying a non-obfuscated version of the item of sensitive content.
-
公开(公告)号:US12167050B2
公开(公告)日:2024-12-10
申请号:US17744186
申请日:2022-05-13
Applicant: CITRIX SYSTEMS, INC.
Inventor: Manbinder Pal Singh
IPC: G06F15/16 , H04L65/61 , H04N21/218
Abstract: A method, a system, and a computer program product for managing multimedia streams of user devices. A reproduction of one or more multimedia streams on a first computing device is determined. A location of a second computing device being positioned in an area enclosed by one or more boundaries in a plurality of boundaries is detected. Each boundary in the plurality of boundaries is associated with a predetermined type of a multimedia stream in one or more multimedia streams. At least one of a pausing and an unpausing of the reproduction of one or more multimedia streams on the first computing device based on the detected location of the second computing device is executed.
-
公开(公告)号:US12093356B2
公开(公告)日:2024-09-17
申请号:US17171243
申请日:2021-02-09
Applicant: Citrix Systems, Inc.
Inventor: Daniel G. Wing , Asterios Stergioudis , Manbinder Pal Singh , Pratik Shah
CPC classification number: G06F21/316 , G06F11/3438 , G06N3/04 , G06N20/00
Abstract: A method may include receiving, by a computing system and from a first device, first data. The first data may be based at least in part on a first output from a first instance of a model processed by the first device. The method may further include receiving, by the computing system and from the first device, second data that was processed by the first instance of the model to produce the first output. The method may also include processing, by the computing system, the second data with at least a portion of a second instance of the model to produce a second output. The method may additionally include determining, by the computing system, third data based at least in part on the second output. Further, the method may include determining, by the computing system, that the third data is consistent with the first data.
-
公开(公告)号:US11822650B2
公开(公告)日:2023-11-21
申请号:US17123262
申请日:2020-12-16
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
IPC: G06F21/55 , G06F21/52 , G06F21/62 , G06F40/253
CPC classification number: G06F21/554 , G06F21/52 , G06F21/629 , G06F21/6245 , G06F40/253 , G06F2221/034 , G06F2221/2115
Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, monitoring an application for suspicious activity based on keystrokes to input data to the application and detecting an instance of suspicious activity within the application based on a sequence of keystrokes to input the data to the application, the sequence of keystrokes to provide characters indicative of sensitive data and in a format different than an expected format for the input data. The method also includes, by the computing device, generating an action to prevent loss of sensitive data in response to detection of the instance of suspicious activity.
-
公开(公告)号:US20230177855A1
公开(公告)日:2023-06-08
申请号:US17540516
申请日:2021-12-02
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh , Christopher Fleck
IPC: G06V30/146 , G02B27/01 , G06N3/08 , G06V30/148
CPC classification number: G06V30/147 , G02B27/017 , G06N3/08 , G06V30/153 , G02B2027/0138 , G02B2027/014
Abstract: Methods and systems for providing notifications in an extended reality (XR) environment are described herein. A computing device may provide, to a user and via an XR device, an XR environment. The computing device may detect one or more first locations of one or more display devices. At least one first display device of the one or more display devices may be in a physical environment around the XR device. The computing device may retrieve one or more notifications for display in the XR environment and determine, based on the one or more first locations of the one or more display devices, one or more second locations for the one or more notifications. The computing device may then provide, in the XR environment and at the one or more second locations, the one or more notifications.
-
-
-
-
-
-
-
-
-