-
公开(公告)号:US20220006795A1
公开(公告)日:2022-01-06
申请号:US17479291
申请日:2021-09-20
Applicant: Citrix Systems, Inc.
Inventor: Alexandr Smelov
Abstract: Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK.
-
公开(公告)号:US11658993B2
公开(公告)日:2023-05-23
申请号:US17572048
申请日:2022-01-10
Applicant: Citrix Systems, Inc.
Inventor: Alexandr Smelov , Christopher Fleck
CPC classification number: H04L63/1425 , H04L43/06 , H04L63/20
Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
-
公开(公告)号:US20220131886A1
公开(公告)日:2022-04-28
申请号:US17572048
申请日:2022-01-10
Applicant: Citrix Systems, Inc.
Inventor: Alexandr Smelov , Christopher Fleck
Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
-
公开(公告)号:US11201930B2
公开(公告)日:2021-12-14
申请号:US16942098
申请日:2020-07-29
Applicant: Citrix Systems, Inc.
Inventor: Ayush Jain , Jason-Lee Thomas , Alexandr Smelov
IPC: H04L29/08 , H04L12/911 , H04L12/927 , H04L12/24 , H04L29/06 , G06F15/16 , G06N5/04
Abstract: Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic.
-
公开(公告)号:US20200120169A1
公开(公告)日:2020-04-16
申请号:US16160337
申请日:2018-10-15
Applicant: Citrix Systems, Inc.
Inventor: Ayush Jain , Jason-Lee Thomas , Alexandr Smelov
IPC: H04L29/08
Abstract: Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic.
-
公开(公告)号:US20230342102A1
公开(公告)日:2023-10-26
申请号:US17821514
申请日:2022-08-23
Applicant: Citrix Systems, Inc.
Inventor: Alexandr Smelov
IPC: G06F3/14 , H04L65/403
CPC classification number: G06F3/1454 , H04L65/403
Abstract: Methods and systems for selectively capturing screen content are described herein. The projector associated with a plurality of layers may be initiated. The plurality of layers may comprise a surface layer that is a highest layer, a canvas layer that is the lowest layer and backdrop layer that is second lowest layer. Input associated with the positioning of the projector may be received. The portions of content may be determined to be between the surface layer and the backdrop layer and captured.
-
公开(公告)号:US20210234845A1
公开(公告)日:2021-07-29
申请号:US16775901
申请日:2020-01-29
Applicant: Citrix Systems, Inc.
Inventor: Alexandr Smelov
Abstract: Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK.
-
公开(公告)号:US10771570B2
公开(公告)日:2020-09-08
申请号:US16160337
申请日:2018-10-15
Applicant: Citrix Systems, Inc.
Inventor: Ayush Jain , Jason-Lee Thomas , Alexandr Smelov
IPC: H04L29/08
Abstract: Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic.
-
公开(公告)号:US11265337B2
公开(公告)日:2022-03-01
申请号:US16402935
申请日:2019-05-03
Applicant: Citrix Systems, Inc.
Inventor: Alexandr Smelov , Christopher Fleck
Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
-
公开(公告)号:US11159497B2
公开(公告)日:2021-10-26
申请号:US16775901
申请日:2020-01-29
Applicant: Citrix Systems, Inc.
Inventor: Alexandr Smelov
Abstract: Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK.
-
-
-
-
-
-
-
-
-