Patents by Inventor Madhav Chinta

Madhav Chinta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9367703
    Abstract: The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting the write requests, the data included in those requests can be stored in the secure storage area of a client computer. In some embodiments, the methods and systems can include determining whether an application issuing the request is a trusted application that requires data to be stored in a secure storage repository. Upon making this determination, a filter driver can identify a secure storage area on a client computer and can redirect the write request to this secure storage. In other embodiments, the filter driver may deny requests of trusted applications to write to unsecure storage areas.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: June 14, 2016
    Assignee: Citrix Systems, Inc.
    Inventor: Madhav Chinta
  • Patent number: 9311509
    Abstract: The present application is directed to methods and systems for receiving a request for a virtual disk and creating a virtual disk that includes the virtual disk attributes identified in the request or determined by an organization's security policies. The created virtual disk can then be encrypted and in some aspects, an encryption key for the encrypted virtual disk can be stored in an encryption key database. Upon creating and encrypting the virtual disk, the virtual disk can be transmitted to a client. The client, upon receiving the encrypted virtual disk, can mount the virtual disk into the client system. The encrypted virtual disk may be stored as a file within an unencrypted virtual disk, and the unencrypted virtual disk backed up to a local or remote storage location.
    Type: Grant
    Filed: May 6, 2011
    Date of Patent: April 12, 2016
    Assignee: Citrix Systems, Inc.
    Inventors: Ryan Matthew Casper, Nitin Desai, Madhav Chinta, Jitendra Deshpande
  • Patent number: 9021494
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, and this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 28, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 9009720
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: April 14, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 9009721
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 14, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Publication number: 20140115660
    Abstract: The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting the write requests, the data included in those requests can be stored in the secure storage area of a client computer. In some embodiments, the methods and systems can include determining whether an application issuing the request is a trusted application that requires data to be stored in a secure storage repository. Upon making this determination, a filter driver can identify a secure storage area on a client computer and can redirect the write request to this secure storage. In other embodiments, the filter driver may deny requests of trusted applications to write to unsecure storage areas.
    Type: Application
    Filed: December 23, 2013
    Publication date: April 24, 2014
    Applicant: Citrix Systems, Inc.
    Inventor: Madhav Chinta
  • Patent number: 8707457
    Abstract: The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting the write requests, the data included in those requests can be stored in the secure storage area of a client computer. In some embodiments, the methods and systems can include determining whether an application issuing the request is a trusted application that requires data to be stored in a secure storage repository. Upon making this determination, a filter driver can identify a secure storage area on a client computer and can redirect the write request to this secure storage. In other embodiments, the filter driver may deny requests of trusted applications to write to unsecure storage areas.
    Type: Grant
    Filed: May 2, 2011
    Date of Patent: April 22, 2014
    Assignee: Citrix Systems, Inc.
    Inventor: Madhav Chinta
  • Publication number: 20130014121
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Publication number: 20130014122
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 8326943
    Abstract: Methods and systems that can launch applications into existing isolation environments do so by executing a run module on a computing machine to intercept requests to execute an application. A client communicating with the computing machine generates requests to execute an application on the computing machine. A run module identifies a profile associated with the requested application and queries an application delivery service to identify at least one isolation environment that corresponds to the profile. The run module receives from the application delivery service a response that identifies a first isolation environment associated with the application, and issues a command to a launch module to launch the application into the first isolation environment.
    Type: Grant
    Filed: November 7, 2011
    Date of Patent: December 4, 2012
    Assignee: Citrix Systems, Inc.
    Inventors: Madhav Chinta, Sam Arun Raj
  • Publication number: 20120198468
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: March 29, 2012
    Publication date: August 2, 2012
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 8171483
    Abstract: A method and system for associating installation scopes within an isolation environment, where the method includes defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and a second installation scope, and this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: October 20, 2007
    Date of Patent: May 1, 2012
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Publication number: 20120059876
    Abstract: Methods and systems that can launch applications into existing isolation environments do so by executing a run module on a computing machine to intercept requests to execute an application. A client communicating with the computing machine generates requests to execute an application on the computing machine. A run module identifies a profile associated with the requested application and queries an application delivery service to identify at least one isolation environment that corresponds to the profile. The run module receives from the application delivery service a response that identifies a first isolation environment associated with the application, and issues a command to a launch module to launch the application into the first isolation environment.
    Type: Application
    Filed: November 7, 2011
    Publication date: March 8, 2012
    Inventors: MADHAV CHINTA, Sam Arun Raj
  • Patent number: 8090797
    Abstract: Methods and systems that can launch applications into existing isolation environments do so by executing a run module on a computing machine to intercept requests to execute an application. A client communicating with the computing machine generates requests to execute an application on the computing machine. A run module identifies a profile associated with the requested application and queries an application delivery service to identify at least one isolation environment that corresponds to the profile. The run module receives from the application delivery service a response that identifies a first isolation environment associated with the application, and issues a command to a launch module to launch the application into the first isolation environment.
    Type: Grant
    Filed: May 2, 2009
    Date of Patent: January 3, 2012
    Assignee: Citrix Systems, Inc.
    Inventors: Madhav Chinta, SamArun Raj
  • Publication number: 20110276806
    Abstract: The present application is directed to methods and systems for receiving a request for a virtual disk and creating a virtual disk that includes the virtual disk attributes identified in the request or determined by an organization's security policies. The created virtual disk can then be encrypted and in some aspects, an encryption key for the encrypted virtual disk can be stored in an encryption key database. Upon creating and encrypting the virtual disk, the virtual disk can be transmitted to a client. The client, upon receiving the encrypted virtual disk, can mount the virtual disk into the client system. The encrypted virtual disk may be stored as a file within an unencrypted virtual disk, and the unencrypted virtual disk backed up to a local or remote storage location.
    Type: Application
    Filed: May 6, 2011
    Publication date: November 10, 2011
    Inventors: Ryan Matthew Casper, Nitin Desai, Madhav Chinta, Jitendra Deshpande
  • Publication number: 20110277013
    Abstract: The present application is directed to methods and systems for redirecting write requests issued by trusted applications to a secure storage. Upon redirecting the write requests, the data included in those requests can be stored in the secure storage area of a client computer. In some embodiments, the methods and systems can include determining whether an application issuing the request is a trusted application that requires data to be stored in a secure storage repository. Upon making this determination, a filter driver can identify a secure storage area on a client computer and can redirect the write request to this secure storage. In other embodiments, the filter driver may deny requests of trusted applications to write to unsecure storage areas.
    Type: Application
    Filed: May 2, 2011
    Publication date: November 10, 2011
    Inventor: Madhav Chinta
  • Publication number: 20100281102
    Abstract: Methods and systems that can launch applications into existing isolation environments do so by executing a run module on a computing machine to intercept requests to execute an application. A client communicating with the computing machine generates requests to execute an application on the computing machine. A run module identifies a profile associated with the requested application and queries an application delivery service to identify at least one isolation environment that corresponds to the profile. The run module receives from the application delivery service a response that identifies a first isolation environment associated with the application, and issues a command to a launch module to launch the application into the first isolation environment.
    Type: Application
    Filed: May 2, 2009
    Publication date: November 4, 2010
    Inventors: Madhav Chinta, SamArun Raj
  • Publication number: 20090106780
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: October 20, 2007
    Publication date: April 23, 2009
    Inventors: Joseph NORD, David HOY, Madhav CHINTA