REAL-TIME SCALABLE VIRTUAL SESSION AND NETWORK ANALYTICS

    公开(公告)号:US20200162338A1

    公开(公告)日:2020-05-21

    申请号:US16684244

    申请日:2019-11-14

    Abstract: Provided herein are systems and methods for providing insights or metrics in connection with provisioning applications and/or desktop sessions to end-users. Network devices (e.g., appliances, intermediary devices, gateways, proxy devices or middle-boxes) can gather insights such as network-level statistics. Additional insights (e.g., metadata and metrics) associated with virtual applications and virtual desktops can be gathered to provide administrators with comprehensive end-to-end real-time and/or historical reports of performance and end-user experience (UX) insights. Insights relating to an application or desktop session can be used to determine and/or improve the overall health of the infrastructure of the session, Citrix Virtual Apps and Desktops, the applications (e.g., remote desktop application) being delivered using the infrastructure, and/or the corresponding user experience.

    Privacy protection for proxy auto-configuration files

    公开(公告)号:US11005926B2

    公开(公告)日:2021-05-11

    申请号:US16522244

    申请日:2019-07-25

    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.

    SYSTEMS AND METHODS FOR PROVIDING A SMART GROUP
    8.
    发明申请
    SYSTEMS AND METHODS FOR PROVIDING A SMART GROUP 有权
    提供SMART GROUP的系统和方法

    公开(公告)号:US20140373090A1

    公开(公告)日:2014-12-18

    申请号:US14467749

    申请日:2014-08-25

    CPC classification number: H04L63/20 G06F21/45 H04L63/083 H04L63/102

    Abstract: The present invention is directed towards systems and methods for establishing and applying a policy group to control a user's access to an identified resource. A policy group representing an aggregate of one or more access configurations for a user to access one or more identified resources may be established via a policy manager. The policy group may include a login point component representing an entry point to access the identified resource. The login point may be configured via the policy manager to specify a uniform resource locator for the entry point. One or more authentication and authorization methods may be selected for the login point component. The device may receive a request to access the uniform resource locator. The device may initiate the policy group for evaluation. The device may initiate, with the user, one or more authentication and authorization methods specified by the login point component.

    Abstract translation: 本发明涉及用于建立和应用策略组以控制用户对所识别的资源的访问的系统和方法。 可以经由策略管理器来建立代表用户访问一个或多个所识别的资源的一个或多个访问配置的集合的策略组。 策略组可以包括表示访问所识别的资源的入口点的登录点组件。 可以通过策略管理器配置登录点,以指定入口点的统一资源定位符。 可以为登录点组件选择一个或多个认证和授权方法。 设备可以接收访问统一资源定位符的请求。 设备可以启动用于评估的策略组。 设备可以与用户一起发起由登录点组件指定的一个或多个认证和授权方法。

    Privacy protection for proxy auto-configuration files

    公开(公告)号:US11652873B2

    公开(公告)日:2023-05-16

    申请号:US17229843

    申请日:2021-04-13

    CPC classification number: H04L67/1023 H04L63/0281 H04L67/02 H04L67/1065

    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.

Patent Agency Ranking