-
公开(公告)号:AU2018452176A1
公开(公告)日:2021-07-22
申请号:AU2018452176
申请日:2018-12-04
Applicant: CITRIX SYSTEMS INC
Inventor: WEI DAOWEN , DING JIAN , WANG HENGBO
IPC: G06F21/00
Abstract: Methods and systems for performing real time digital content concealment are described herein. A computing device may, in response to detecting a user within view of an image capture device of a client device, perform a first type of text recognition on a first region of digital content and a second type of text recognition on a second region of the digital content, where the first type of text recognition is determined based on a first type of content items contained in the first region and the second type of text recognition is determined based on a second type of content items contained in the second region. Based at least in part on rules corresponding to the user, the computing device may determine content items within the digital content to be concealed, and may modify the digital content to conceal the content items.
-
公开(公告)号:AU2018301289B2
公开(公告)日:2021-07-01
申请号:AU2018301289
申请日:2018-07-05
Applicant: CITRIX SYSTEMS INC
Inventor: SURESH ASHWIN
IPC: G06F9/50
Abstract: Aspects described herein are directed to leveraging multiple graphics processors, by a virtual GPU manager, to optimize the rendering of graphics in either a desktop or virtual desktop environment. The virtual GPU manager may enumerate all available physical GPUs, query performance variables including processing capacity of each of the available physical GPUs, and classify each of the physical GPUs based on the queried performance variables. Further, the virtual GPU manager may generate a logical GPU corresponding to one or more of the available physical GPUs. The virtual GPU manager may distribute graphics rendering requests across each of the plurality of available physical GPUs by way of the logical GPU.
-
93.
公开(公告)号:AU2020211396A1
公开(公告)日:2021-06-17
申请号:AU2020211396
申请日:2020-01-15
Applicant: CITRIX SYSTEMS INC
Inventor: RAMAREDDY SHASHIDHAR , MOMCHILOV GEORGY , MITTAL ANKUR
Abstract: A computing system may include a server, client computing devices, a gateway device in communication between the server and the client computing devices, and a local device to be coupled to a given client computing device and to be operable in a given virtual desktop instance associated with the given client computing device, thereby generating client initialization packets. The gateway device may be configured to when the local device is coupled to the given client computing device, determine whether a client packet from a plurality of client initialization packets is within a client mapping table, replace the client packet with a client mapping ID number to define compressed client initialization packets, and send the compressed client initialization packets to the server. The server may be configured to replace the client mapping ID number with the client packet in the compressed client initialization packets based upon a server mapping table.
-
公开(公告)号:AU2019392478A1
公开(公告)日:2021-06-17
申请号:AU2019392478
申请日:2019-12-03
Applicant: CITRIX SYSTEMS INC
Inventor: SURESH VISWANATH YARANGATTA
Abstract: Described embodiments provide systems and methods for establishing an end-to-end cryptographic context. A service node may be located intermediary between a client and server which provides a service to the client. At least one network device may be located intermediary between the service node and the server. The service node may obtain information for validating the service. The service node may establish an end-to-end cryptographic context between the service node and server through the network device(s). A first network device of the network device(s) may share a cryptographic context with the service node, which existed prior to establishment of the end-to-end cryptographic context. The service node may transmit a message to the network device encrypted using the first cryptographic context. The encrypted message may inform the first network device to pass through traffic that is encrypted using the end-to-end cryptographic context.
-
公开(公告)号:AU2019392368A1
公开(公告)日:2021-06-10
申请号:AU2019392368
申请日:2019-12-02
Applicant: CITRIX SYSTEMS INC
Inventor: ARISANKALA J MOHAN RAO , RAMAIAH CHAITRA MARALIGA , SRIVATSAN KARTHICK
Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.
-
公开(公告)号:AU2018454906A1
公开(公告)日:2021-05-27
申请号:AU2018454906
申请日:2018-12-29
Applicant: CITRIX SYSTEMS INC
Inventor: GE WENHAO
IPC: H04L12/16
Abstract: A method of managing shared resources includes detecting, upon receiving a request to extend a current use of a shared resource, a conflict in resource data between a requested end time of the current use and an earlier beginning time of a subsequent use. In one example the shared resource may be a conference room, the uses are adjacently scheduled meetings. The method further includes, in response to detecting the conflict, (1) receiving a permission indication with respect to the request, and (2) in response to the permission indication identifying acceptance of the request, (a) calculating a granted extension time for the current use, and (b) updating the resource data to add the granted extension time to a scheduled end time of the current use and the scheduled beginning time of the subsequent use to enable use of the shared resource without conflict.
-
公开(公告)号:AU2019430941B2
公开(公告)日:2021-05-13
申请号:AU2019430941
申请日:2019-08-20
Applicant: CITRIX SYSTEMS INC
Inventor: ZHOU FUPING , LIU YEPING
Abstract: Abstract A method comprising: segmenting a watermark into a plurality of watermark pieces; and for at least one watermark piece of the plurality of watermark pieces, responsive to determination of a data element of content being present at a location within the content at which to apply the at least one watermark piece, rendering the at least one watermark piece on the content such that the data element overlays the at least one watermark piece so as to render the watermark piece on the content as a masked watermark.
-
公开(公告)号:AU2020327347A1
公开(公告)日:2021-05-06
申请号:AU2020327347
申请日:2020-10-15
Applicant: CITRIX SYSTEMS INC
Inventor: LU YUHUA , MACDONALD GRAHAM , GRAHAM SIMON
IPC: G06F3/06
Abstract: A virtual disk is provided to a computing environment. The virtual disk includes identity information to enable identification of a virtual machine within the computing environment. A size of the virtual disk is increased within the computing environment to enable the virtual disk to act as a storage for the identity information and as a cache of other system data to operate the virtual machine. The virtual machine is booted within the computing environment. The virtual machine is configured to at least access the virtual disk that includes both identity information and caches other system data to operate the virtual machine. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:CA3150610A1
公开(公告)日:2021-04-15
申请号:CA3150610
申请日:2020-06-26
Applicant: CITRIX SYSTEMS INC
Inventor: PAVLOU CHRIS
IPC: G06F3/038 , G06F3/0481 , G06F3/0488 , G06F9/455
Abstract: Techniques process, in a user device, pointer input from an input device. Such techniques involve providing the input from the input device to a remote desktop session which is hosted on equipment that is remote from the user device. Such techniques further involve detecting an event on the user device, the event being indicative of deactivation of the remote desktop session. Such techniques further involve, in response to detecting the event, providing the input from the input device to at least one local application executable on the user device to enable continued processing of the input from the input device with use of the at least one local application instead of the remote desktop session.
-
公开(公告)号:AU2019326538A1
公开(公告)日:2021-04-15
申请号:AU2019326538
申请日:2019-08-22
Applicant: CITRIX SYSTEMS INC
Inventor: WOODMANSEE KEVIN , SINGLETON IV LEO C , SEENIRAJ SAM ARUN
Abstract: Aspects of the disclosure relate to using service pool architecture for multitenant services to support canary release. An enterprise canary release server may create a plurality of service pools for a tenant in a cloud-based system that supports a plurality of tenants, where each service pool may comprise a plurality of microservices. The enterprise canary release server may receive a request to perform a canary release for a new version of software and identify a first microservice out of the plurality of microservices in a first service pool. The enterprise canary release server may instantiate a new microservice in the first service pool and enable data plane connectivity between the new microservice and a second microservice. Accordingly, the enterprise canary release server may disable data plane connectivity between the first microservice and the second microservice.
-
-
-
-
-
-
-
-
-