-
公开(公告)号:US11658907B2
公开(公告)日:2023-05-23
申请号:US17806113
申请日:2022-06-09
Applicant: CITRIX SYSTEMS, INC.
Inventor: Georgy Momchilov , Hubert Divoux , Roberto Valdes , Leo C. Singleton, IV , Paul Browne , Kevin Woodmansee
IPC: H04L45/586 , H04L45/42 , H04L67/141 , H04L9/40 , H04L67/01
CPC classification number: H04L45/586 , H04L45/42 , H04L63/0442 , H04L63/0876 , H04L63/108 , H04L67/01 , H04L67/141
Abstract: A method may include storing and updating published resource entitlements for a plurality of client devices at a computing device. The method may also include using a plurality of virtual delivery appliances to receive connection requests from the client devices, with the connection requests including connection leases having associated resource entitlements the client devices are respectively permitted to access, and request validation of the connection leases from the computing device. At the computing device, responsive to validation requests from the virtual delivery appliances, the connection leases may be compared to the updated published resource entitlements and validated based thereon. At the virtual delivery appliances, the client devices may be provided with access to virtual sessions corresponding to the published resource entitlements responsive to the virtual session request validations from the computing device.
-
公开(公告)号:US11653200B2
公开(公告)日:2023-05-16
申请号:US17234941
申请日:2021-04-20
Applicant: Citrix Systems, Inc.
Inventor: Hao Wu
IPC: H04L29/06 , H04W12/06 , H04L9/40 , H04W12/10 , H04W64/00 , H04W4/02 , G01S19/48 , G01S19/13 , H04W4/80
CPC classification number: H04W12/06 , G01S19/48 , H04L63/0853 , H04L63/107 , H04L63/20 , H04W4/02 , H04W12/10 , H04W64/00 , H04W64/003 , G01S19/13 , H04W4/80
Abstract: Described embodiments provide systems and methods for policy-based authentication, where the policy may designate locations and/or forms of proof of locations, for use in authentication. Some embodiments include or utilize a database storing authentication policies. In an example system, an authentication server in communication with the database is configured to receive a request from a device needing authentication. The request may include a credential. The authentication server is configured to retrieve, from the database storing authentication policies, an authentication policy corresponding to the device, the retrieved authentication policy specifying a location parameter. The authentication server is configured to receive location data from the device and resolve the authentication request using the credential and the received location data pursuant to the retrieved authentication policy.
-
公开(公告)号:US11652873B2
公开(公告)日:2023-05-16
申请号:US17229843
申请日:2021-04-13
Applicant: CITRIX SYSTEMS, INC.
Inventor: Jong Kann , Kenneth Bell
IPC: H04L67/1023 , H04L9/40 , H04L67/02 , H04L67/1061
CPC classification number: H04L67/1023 , H04L63/0281 , H04L67/02 , H04L67/1065
Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.
-
84.
公开(公告)号:US20230147714A1
公开(公告)日:2023-05-11
申请号:US17541923
申请日:2021-12-03
Applicant: Citrix Systems, Inc.
Inventor: Saifulla Shaik , Aikaterini Kalou , Stuart Kennedy
IPC: H04L9/40
CPC classification number: H04L63/1408 , H04L63/18 , H04L63/1433
Abstract: Described embodiments provide systems and methods for generating a network space to perform mitigation actions on a plurality of users. At least one server may determine a plurality of users of one or more levels of riskiness in a network environment, and network locations of the users. Using a plurality of clustering features, the at least one server may generate a network space comprising a cluster of network locations corresponding to a subset of the users of at least a defined level of riskiness. The at least one server may perform a mitigation action on the subset of users corresponding to the generated network space.
-
公开(公告)号:US11647025B2
公开(公告)日:2023-05-09
申请号:US17348688
申请日:2021-06-15
Applicant: Citrix Systems, Inc.
Inventor: Abhishek Chauhan , Jeroen Mattijs van Rotterdam
IPC: H04L9/40 , H04L67/141 , H04L67/146 , H04W12/63 , H04W12/64 , H04L67/01
CPC classification number: H04L63/102 , H04L63/107 , H04L63/20 , H04L67/141 , H04L67/146 , H04W12/63 , H04L63/08 , H04L67/01 , H04W12/64
Abstract: In some aspects, a method for revoking access to a network application on a client device. The method includes establishing, by a client application on a client device responsive to authenticating a user, access to one or more network applications of one or more first servers of a first entity via an embedded browser of the client application, receiving, by the client application, a notification from a second server of a second entity that access for the user to a network application of the one or more network applications is to be revoked, and performing, by the client application responsive to the notification, one or more revoking actions based at least on a policy.
-
公开(公告)号:US11647005B2
公开(公告)日:2023-05-09
申请号:US17501476
申请日:2021-10-14
Applicant: Citrix Systems, Inc.
CPC classification number: H04L63/0428 , G06F16/9577 , H04L9/0838 , H04L63/0884 , H04L67/14 , H04L67/535 , H04L67/63
Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.
-
公开(公告)号:US20230139213A1
公开(公告)日:2023-05-04
申请号:US17643253
申请日:2021-12-08
Applicant: CITRIX SYSTEMS, INC.
Inventor: ZONGPENG QIAO , KE XU , DAN HU , ZE CHEN
IPC: G06F21/62 , G06V40/16 , H04L12/18 , H04L65/1089
Abstract: A computing device may include a memory and a processor coupled to the memory and configured to provide access to a computing session for a user through a user interface, and cooperate with a digital camera to detect activity other than that of the user in a field of view. Responsive to the detection, the processor may further block input of data to the user interface and permit viewing of the user interface. Responsive to an attempt to input data via the user interface, the processor may continue to block input of data and obstruct viewing of the user interface.
-
公开(公告)号:US11636228B2
公开(公告)日:2023-04-25
申请号:US17160567
申请日:2021-01-28
Applicant: CITRIX SYSTEMS, INC.
Inventor: Christopher W. Midgley
IPC: G06F21/78 , G06F9/4401 , G06F9/445 , G06F8/61
Abstract: A computing device includes a memory and at least one processor configured to cooperate with the memory. The processor is to boot the computing device, and direct generated data to data storage. The data storage includes at least one persistent layer and a non-persistent layer. The processor determines if the data is to be stored in the at least one persistent layer or the non-persistent layer based on a version of the operating system being used to boot the computing device.
-
公开(公告)号:US11636068B2
公开(公告)日:2023-04-25
申请号:US16678463
申请日:2019-11-08
Applicant: Citrix Systems, Inc.
Inventor: Deepak R. , Shailendra Shrivastav , Sangamesh Vishweshwar Kalagond
IPC: G06F16/176 , G06F16/182 , G06F16/27 , G06F16/215
Abstract: Methods and systems for file locking are described herein. An on-premise file share may store files that are accessible to both a local on-premise client and a remote off-premise client. The off-premise file share may request to check-out one of the files. In response, one of multiple nodes may obtain for the file a file handle with exclusive write access. File locking information may be stored at the file share that indicates the node that holds the file handle and that indicates the file is in a locked state whereby other remote off-premise clients or local on-premise clients are prevented from editing the file.
-
公开(公告)号:US20230123860A1
公开(公告)日:2023-04-20
申请号:US17505065
申请日:2021-10-19
Applicant: Citrix Systems, Inc.
Inventor: Bruno Marquie , Harshavardhan Gupta , Madhumitha Raveendar , Gaurav Saraf , Venkatesh Bonageri , Sangamesh Vishweshwar Kalagond , Rakesh Kumar
IPC: G06F9/54 , G06F16/2457
Abstract: One disclosed method involves receiving, at a first application programming interface (API) endpoint of a computing system, a first API call requesting performance of a first type of operation; invoking, by the computing system and based on the first API call, a first process to send at least a second API call to a second API endpoint of a first system of record; receiving, by the computing system and from the first system of record, a first response to the second API call; and sending, from the computing system to a source of the first API call, a second response that is based at least in part on the first response.
-
-
-
-
-
-
-
-
-