Patents by Inventor Anudeep Athlur

Anudeep Athlur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210234838
    Abstract: A computing device may include a processor and a memory. The processor may be configured to provide an encrypted second portion of a key to a client device in response to a match between data decrypted from an encrypted first portion of the key and a first portion of the key, the match being indicative of an absence of a proxy device. The processor may be configured to detect a loss in connectivity between the computing device and the client device based upon a mismatch between a decrypted second portion of the key and a second portion of the key, the mismatch being indicative of the proxy device.
    Type: Application
    Filed: April 14, 2021
    Publication date: July 29, 2021
    Inventors: Anudeep Athlur, Praveen Raja Dhanabalan
  • Publication number: 20210232673
    Abstract: A computing system may perform a method that involves receiving an input indicating at least one person, other than a user of a computing device, is proximate to the computing device, determining that the person is within a threshold distance of the computing device based on the received input, and modifying an output of the computing device in response to determining that the person is within the threshold distance from the computing device, so as to inhibit the person from receiving content from the computing device.
    Type: Application
    Filed: January 28, 2020
    Publication date: July 29, 2021
    Inventors: Anudeep Athlur, Praveen Raja Dhanabalan, Anuj Magazine
  • Publication number: 20210232542
    Abstract: A computing system may perform a method that involves receiving, from a first computing device, a request for a file, where the request identifies at least one user who has access to the file and includes information indicative of the file. The method further includes identifying, based at least in part on the received request, the file within a repository of files, sending, to a second computing device, a first indication of the request to access the file, receiving, from the second computing device, a second indication that the file is to be made accessible via the first computing device, and causing the file to be transferred from the repository to the first computing device.
    Type: Application
    Filed: January 28, 2020
    Publication date: July 29, 2021
    Inventors: Praveen Raja Dhanabalan, Anudeep Athlur, Anuj Magazine
  • Patent number: 11044300
    Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: June 22, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Praveen Raja Dhanabalan, Anuj Magazine, Anudeep Athlur
  • Patent number: 11005821
    Abstract: A server for detecting a proxy device in a communications path may include a processor and a memory associated therewith. The processor may obtain an encrypted first portion of an encryption key from the client device. The encryption key may be based upon user-input credentials for a given user. The processor may also communicate an encrypted second portion of the encryption key to the client device based upon determining that the encrypted first portion matches a corresponding first portion of the encryption key indicative of an absence of the proxy device in the communications path. The processor may also detect a loss in connectivity between the server and the client device in response to the client device determining that the decrypted second portion of the encryption key does not match a corresponding second portion of the encryption key indicative of a proxy device in the communications path.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: May 11, 2021
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Anudeep Athlur, Praveen Raja Dhanabalan
  • Publication number: 20210120071
    Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.
    Type: Application
    Filed: October 21, 2019
    Publication date: April 22, 2021
    Inventors: Praveen Raja Dhanabalan, Anuj Magazine, Anudeep Athlur
  • Publication number: 20200334698
    Abstract: A machine learning system may monitor usage of network or hosted resources by users or employees, and may dynamically generate short or “micro” surveys for immediate presentation. These surveys may be aggregated and analyzed by the machine learning system, reducing delays of responses. As a result, engagement may be measured in real-time or near real-time, actionable insights generated, and responsive actions taken. The machine learning system may monitor various interactions of users or employees with a virtual or hosted environment or workspace, including connections to virtual machines, remote desktop applications, SaaS applications, web applications, or other such entities, as well as environmental characteristics such as network location and/or quality.
    Type: Application
    Filed: April 17, 2019
    Publication date: October 22, 2020
    Inventors: Anuj Magazine, Praveen Raja Dhanabalan, Anudeep Athlur
  • Publication number: 20200322415
    Abstract: Described embodiments provide systems and methods for selecting between modes for delivering or providing access to a file. A server can be configured to deliver the file via a plurality of modes of delivery including. A first mode of delivery can include downloading the file and a second mode of delivery can include delivering the file via a virtualized stream. The server can receive a request and initiate downloading of the file for a length of time. The server can identify an amount of available bandwidth and size of the file and determine a first time for the first mode of delivery. The first time can be compared to a second time to deliver the file via the second mode of delivery. The server can select between the first mode of delivery and the second mode of delivery and provide the file via the selected mode of delivery.
    Type: Application
    Filed: April 3, 2019
    Publication date: October 8, 2020
    Inventors: Anuj Magazine, Praveen Raja Dhanabalan, Anudeep Athlur
  • Publication number: 20200220863
    Abstract: A server for detecting a proxy device in a communications path may include a processor and a memory associated therewith. The processor may obtain an encrypted first portion of an encryption key from the client device. The encryption key may be based upon user-input credentials for a given user. The processor may also communicate an encrypted second portion of the encryption key to the client device based upon determining that the encrypted first portion matches a corresponding first portion of the encryption key indicative of an absence of the proxy device in the communications path. The processor may also detect a loss in connectivity between the server and the client device in response to the client device determining that the decrypted second portion of the encryption key does not match a corresponding second portion of the encryption key indicative of a proxy device in the communications path.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Inventors: Anudeep Athlur, Praveen Raja Dhanabalan