Abstract: Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
Type:
Grant
Filed:
January 10, 2019
Date of Patent:
May 5, 2020
Assignee:
Citrix Systems International GmbH
Inventors:
Herbert Anthony Little, Neil Patrick Adams, Stefan E. Janhunen, John Fredric Arthur Dahms
Abstract: Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
Type:
Grant
Filed:
December 23, 2016
Date of Patent:
February 19, 2019
Assignee:
Citrix Systems International GmbH
Inventors:
Herbert Anthony Little, Neil Patrick Adams, Stefan E. Janhunen, John Fredric Arthur Dahms
Abstract: Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
Type:
Grant
Filed:
March 23, 2016
Date of Patent:
January 31, 2017
Assignee:
Citrix Systems International GmbH
Inventors:
Herbert Anthony Little, Neil Patrick Adams, Stefan E. Janhunen, John Fredric Arthur Dahms
Abstract: A method and system for performing garbage collection involving sensitive information on a mobile device. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.
Type:
Grant
Filed:
March 2, 2015
Date of Patent:
April 12, 2016
Assignee:
Citrix Systems International GmbH
Inventors:
Herbert Anthony Little, Neil Patrick Adams, Stefan E. Janhunen, John Fredric Arthur Dahms
Abstract: A method includes receiving an indication of an elapsed time since a scheduled teleconference meeting start and a further indication of current attendance at the teleconference; applying at least one rule for determining, based on the indications, whether to issue a notification to an absent invitee of the teleconference; and in response to application of the rule, selectively issuing the notification to the absent invitee.
Type:
Grant
Filed:
March 12, 2012
Date of Patent:
July 30, 2013
Assignee:
Citrix Systems International GmbH
Inventors:
Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
Abstract: One or more computer-implemented methods provided by computer-readable media for providing and loading user profile data from a server computer system to a client computer system may be used together with the server and client computer systems. The client computer system may be caused to initiate a login process for a user on the client computer system and to send login information to the server during the login process. After reception of the login information from the client, the server evaluates the received login information to obtain user information corresponding to a user identified in the login information. Based on the obtained user information, the server finds user profile data stored on the server computer system. Finally, metadata relating to the user profile data may be determined by the client computer system by pulling corresponding data from the server computer system.