Fort Lauderdale, FL, United States
Fort Lauderdale, FL, United States

Citrix Systems, Inc. is an American multinational software company founded in 1989 that provides server, application and desktop virtualization, networking, software-as-a-service , and cloud computing technologies, including Xen open-source products.Citrix currently services around 330,000 organizations worldwide and is based in Fort Lauderdale, Florida, in the Miami metropolitan area, with subsidiary operations in California and Massachusetts, and additional development centers in Canada, Germany, Denmark, the United Kingdom, India and Australia.Following the acquisition of XenSource, Inc. in October 2007, Citrix started spearheading the Xen open-source hypervisor project. Wikipedia.


Time filter

Source Type

Patent
Citrix Systems | Date: 2017-02-02

Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device.


Patent
Citrix Systems | Date: 2017-02-08

The present application is directed towards systems and methods for selecting a database from a plurality of databases to forward a SQL query request based on a property of the SQL request. A device intermediary to a plurality of clients and databases may establish a plurality of connections to the plurality of databases. The device may receive, from a client of the plurality of clients, a request to execute a SQL query. The device may evaluate one or more properties of the request to execute the SQL query responsive to a policy. The device may select a database from the plurality of databases based on a result of evaluation of the one or more properties of the request to execute the SQL query. The device may forward the request to execute the SQL query to the selected database via a connection of the plurality of connections.


Patent
Citrix Systems | Date: 2017-03-08

Methods and systems are disclosed for providing approaches to authenticating and authorizing client devices in enterprise systems via a gateway device. The methods and systems may include passing, by a computing device to an enterprise device, a request transmitted by a client device for access to an enterprise resource, and transmitting, by the computing device, authentication credentials associated with the client device with a request for authorization information associated with the enterprise resource. The methods and systems may also include receiving, by the computing device, the authorization information associated with the enterprise resource, transmitting, by the computing device, the request transmitted by the client device for access to the enterprise resource with the received authorization information associated with the enterprise resource, and passing, by the computing device to the client device, information associated with the requested enterprise resource based on the received authorization information associated with the enterprise resource.


Patent
Citrix Systems | Date: 2017-03-15

Methods and systems for preventing clock rollback attacks are described herein. A rollback attack may occur when a user manually sets a system clock to a date/time earlier than the actual present day date and time, thereby tricking any software relying on the system clock to believe it is in fact the earlier date and time rather than the current date and time. According to aspects described herein, a particular application may check and store a record of the system time when an application goes inactive (or at intervals) and again when the application subsequently is activated again. When the application determines that the time has gone backward, the application (or system) may take some remedial measure(s) to prevent further use of the application (or system) until the user reestablishes trust (e.g., by reauthenticating or reestablishing a connection with a trusted time server).


Patent
Citrix Systems | Date: 2017-01-11

A technique enables a user to participate in an online meeting. The technique involves receiving, by processing circuitry of a vehicle, a join instruction to join the online meeting. The technique further involves performing, by the processing circuitry of the vehicle, a communications exchange with a remote online meeting server in response to the join instruction, the communications exchange establishing an online meeting session with the remote online meeting server to join the processing circuitry of the vehicle to the online meeting. The technique further involves outputting, after the online meeting session is established and by the processing circuitry of the vehicle, video of the online meeting on a display screen which is integrated with the vehicle. Along these lines, the display screen can output a static image while the vehicle is moving and moving video while the vehicle is not moving (e.g., parked).


Patent
Citrix Systems | Date: 2017-03-08

Methods and systems for configuring mobile applications for managed execution are described herein. Executable application binaries may each be converted into a corresponding dynamic library. The dynamic libraries may be bundled with a managing application that is configured to manage execution of the dynamic libraries at a mobile computing device. Resource files consumed by the application binary may also be bundled with the managing application and accessible to the dynamic libraries during execution. The managing application may provide a workspace within which operation of the dynamic library occurs. Operation of the dynamic library may at least partially correspond to operation of the executable application binary. Execution of the dynamic library may be bound to a process that is executed for the managing application at a processor of a computing device.


A method of managing access to enterprise resources is provided. An access manager may operate at a mobile device to validate a mobile application installed at that mobile device. If the access manager does not successfully validate the mobile application, the access manager may prevent the mobile application from accessing computing resource. If the access manager does successfully validate the mobile application, then the access manager may identify the mobile application as a trusted mobile application. The access manager may thus permit the trusted mobile application to access the computing resource.


Patent
Citrix Systems | Date: 2017-03-10

Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An application may prompt a user to provide user entropy such as a passcode (e.g. a password and/or PIN). The application may use the user entropy to decrypt a user-entropy-encrypted vault key. Once the vault key is decrypted, the application may decrypt a vault database of the shared vault. The shared vault may store shared secrets, such as server credentials, and an unlock key. The application may store the unlock key, generate an unlock-key-encrypted vault key, and cause the shared vault to store the unlock-key-encrypted vault key, thereby unlocking the vault. The application may then use the unlock key to decrypt the vault database without prompting the user to provide user entropy again.


Patent
Citrix Systems | Date: 2017-07-19

A technique for recording dictation, meetings, lectures, and other events includes automatically segmenting an audio recording into portions by detecting speech transitions within the recording and selectively identifying certain portions of the recording as noteworthy. Noteworthy audio portions are displayed to a user for selective playback. The user can navigate to different noteworthy audio portions while ignoring other portions. Each noteworthy audio portion starts and ends with a speech transition. Thus, the improved technique typically captures noteworthy topics from beginning to end, thereby reducing or avoiding the need for users to have to search for the beginnings and ends of relevant topics manually.


Patent
Citrix Systems | Date: 2017-07-19

Methods and systems for maintaining NAT session management on a multi-core device are disclosed. A first core of the multi-core device that is intermediary between a plurality of clients and a plurality of servers may insert a NAT session into a local outbound session table stored in a memory of the first core. The first core may determine that a second core of the multi-core device will serve as a receiving core for a response to the request from the server to the client. The first core may insert the NAT session into a global session table responsive to determining that the second core will serve as the receiving core.

Loading Citrix Systems collaborators
Loading Citrix Systems collaborators