-
公开(公告)号:US11023597B2
公开(公告)日:2021-06-01
申请号:US15764716
申请日:2018-02-22
Applicant: Citrix Systems, Inc.
Inventor: Hao Chen , Liming Wang
Abstract: A technique provides mobile device security to a mobile device. The technique involves, in response to operation of a camera of the mobile device, receiving image data from the camera, the image data representing a visual image captured by the camera. The technique further involves performing an image evaluation operation which electronically analyzes the image data received from the camera to determine whether the image data contains sensitive information. The technique further involves, based on a result of the image evaluation operation, performing a security operation that provides security to the mobile device.
-
公开(公告)号:US20200242260A1
公开(公告)日:2020-07-30
申请号:US15764716
申请日:2018-02-22
Applicant: Citrix Systems, Inc.
Inventor: Hao Chen , Liming Wang
Abstract: A technique provides mobile device security to a mobile device. The technique involves, in response to operation of a camera of the mobile device, receiving image data from the camera, the image data representing a visual image captured by the camera. The technique further involves performing an image evaluation operation which electronically analyzes the image data received from the camera to determine whether the image data contains sensitive information. The technique further involves, based on a result of the image evaluation operation, performing a security operation that provides security to the mobile device.
-
公开(公告)号:US20220182385A1
公开(公告)日:2022-06-09
申请号:US17116804
申请日:2020-12-09
Applicant: Citrix Systems, Inc.
Inventor: Anjaneya Padmakar Akondi , Sumana Gandur Satyanarayana , Liming Wang , Raul Planas
Abstract: A computer system to authorize a first endpoint to access enterprise digital resources is provided. The computer system includes the first endpoint, a second endpoint, and an endpoint management service being executed in a server. The endpoint management service communicates with the first endpoint via the second endpoint. For example, the endpoint management service receives authentication credentials from the first endpoint via the second endpoint. Similarly, the endpoint management service, upon verification of the authentication credentials, transmits an authorization token to the first endpoint via the second endpoint. The first endpoint, upon receiving and deploying the authorization token, can execute enterprise managed application programs and can access enterprise digital resources. In some examples, both the first and second endpoints are owned and/or used by a same user.
-
-