Patents by Inventor Alexandr Smelov

Alexandr Smelov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230342102
    Abstract: Methods and systems for selectively capturing screen content are described herein. The projector associated with a plurality of layers may be initiated. The plurality of layers may comprise a surface layer that is a highest layer, a canvas layer that is the lowest layer and backdrop layer that is second lowest layer. Input associated with the positioning of the projector may be received. The portions of content may be determined to be between the surface layer and the backdrop layer and captured.
    Type: Application
    Filed: August 23, 2022
    Publication date: October 26, 2023
    Inventor: Alexandr Smelov
  • Patent number: 11658993
    Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
    Type: Grant
    Filed: January 10, 2022
    Date of Patent: May 23, 2023
    Inventors: Alexandr Smelov, Christopher Fleck
  • Publication number: 20220131886
    Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
    Type: Application
    Filed: January 10, 2022
    Publication date: April 28, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Alexandr Smelov, Christopher Fleck
  • Patent number: 11265337
    Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: March 1, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Alexandr Smelov, Christopher Fleck
  • Publication number: 20220006795
    Abstract: Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK.
    Type: Application
    Filed: September 20, 2021
    Publication date: January 6, 2022
    Applicant: Citrix Systems, Inc.
    Inventor: Alexandr Smelov
  • Patent number: 11201930
    Abstract: Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: December 14, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Ayush Jain, Jason-Lee Thomas, Alexandr Smelov
  • Patent number: 11159497
    Abstract: Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK.
    Type: Grant
    Filed: January 29, 2020
    Date of Patent: October 26, 2021
    Assignee: Citrix Systems, Inc.
    Inventor: Alexandr Smelov
  • Publication number: 20210234845
    Abstract: Techniques are provided for secure message passing. A sender process has a clear (non-encrypted) text message to pass to a recipient process as an encrypted message. The sender generates a message encryption key (MEK) for encrypting the message and sends the MEK to a first intermediary process, which encrypts the MEK. The sender uses the MEK to encrypt the message and passes both the encrypted message and the encrypted MEK to a second intermediary process. The second intermediary verifies that the sender is authorized to send messages and retains the encrypted message and the encrypted MEK. The second intermediary passes the encrypted message and the encrypted MEK to the recipient, which requests decryption of the encrypted MEK from the first intermediary. The first intermediary then decrypts the MEK and returns it to the recipient. Finally, the recipient decrypts the message using the MEK.
    Type: Application
    Filed: January 29, 2020
    Publication date: July 29, 2021
    Applicant: Citrix Systems, Inc.
    Inventor: Alexandr Smelov
  • Publication number: 20200358861
    Abstract: Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic.
    Type: Application
    Filed: July 29, 2020
    Publication date: November 12, 2020
    Applicant: Citrix Systems, Inc.
    Inventors: Ayush Jain, Jason-Lee Thomas, Alexandr Smelov
  • Patent number: 10771570
    Abstract: Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: September 8, 2020
    Assignee: Citrix Systems, Inc.
    Inventors: Ayush Jain, Jason-Lee Thomas, Alexandr Smelov
  • Publication number: 20200120169
    Abstract: Methods, systems, and computer-readable media for creating and managing a multi-tiered service messaging architecture within a cloud service provider or computing environment. In one or more embodiments, the multi-tiered service messaging architecture may comprise a primary topic configured to receive and manage particular service messages. Services of the cloud are allocated a service topic to receive the service messages managed by the primary topic and may itself subscribe to the primary topic to receive the service messages. Through the subscription to the service topic, the service may receive the service messages provided by the primary topic. Still other sub-topics may subscribe to the service topics for additional subscriptions by services to receive the service messages provided by the primary topic.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Ayush Jain, Jason-Lee Thomas, Alexandr Smelov
  • Publication number: 20190342315
    Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
    Type: Application
    Filed: May 3, 2019
    Publication date: November 7, 2019
    Inventors: Alexandr Smelov, Christopher Fleck