Patents by Inventor Joseph Nord

Joseph Nord has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9021494
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, and this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 28, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 9009721
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 14, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 9009720
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: April 14, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 8997197
    Abstract: Encryption-based data access management may include a variety of processes. In one example, a device may transmit a user authentication request for decrypting encrypted data to a data storage server storing the encrypted data. The computing device may then receive a validation token associated with the user's authentication request, the validation token indicating that the user is authenticated to a domain. Subsequently, the computing device may transmit the validation token to a first key server different from the data storage server. Then, in response to transmitting the validation token the computing device may receive, from the first key server, a key required for decrypting the encrypted data. The device may then decrypt at least a portion of the encrypted data using the key.
    Type: Grant
    Filed: December 12, 2012
    Date of Patent: March 31, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, Benjamin Elliot Tucker, Timothy Gaylor
  • Publication number: 20140237049
    Abstract: Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session.
    Type: Application
    Filed: April 23, 2014
    Publication date: August 21, 2014
    Applicant: Citrix Systems, Inc.
    Inventors: Joseph Nord, Richard Hayton
  • Publication number: 20140164774
    Abstract: Encryption-based data access management may include a variety of processes. In one example, a device may transmit a user authentication request for decrypting encrypted data to a data storage server storing the encrypted data. The computing device may then receive a validation token associated with the user's authentication request, the validation token indicating that the user is authenticated to a domain. Subsequently, the computing device may transmit the validation token to a first key server different from the data storage server. Then, in response to transmitting the validation token the computing device may receive, from the first key server, a key required for decrypting the encrypted data. The device may then decrypt at least a portion of the encrypted data using the key.
    Type: Application
    Filed: December 12, 2012
    Publication date: June 12, 2014
    Applicant: CITRIX SYSTEMS, INC.
    Inventors: Joseph Nord, Benjamin Elliot Tucker, Timothy Gaylor
  • Patent number: 8725791
    Abstract: Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session.
    Type: Grant
    Filed: May 3, 2010
    Date of Patent: May 13, 2014
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, Richard Hayton
  • Publication number: 20130014121
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Publication number: 20130014122
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Publication number: 20120198468
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: March 29, 2012
    Publication date: August 2, 2012
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Patent number: 8171483
    Abstract: A method and system for associating installation scopes within an isolation environment, where the method includes defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and a second installation scope, and this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Grant
    Filed: October 20, 2007
    Date of Patent: May 1, 2012
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, David Hoy, Madhav Chinta
  • Publication number: 20110173251
    Abstract: The present invention is directed towards systems and methods of streaming an application from a remote location to a local machine system, and using local machine system resources in executing that application. In various embodiments, services needed by a streamed application may be started with high local system privileges in their own isolation environment. These service may be started, stopped, and otherwise managed by a Service Control Manager. In order for an application to both access services that operate at high local system privileges and the network so that it can access remotely stored, streaming, information; a streaming application may rely on privileges of the user when accessing network information rather than the higher privileges of the services running in isolation.
    Type: Application
    Filed: December 13, 2010
    Publication date: July 14, 2011
    Inventors: VIKRAMJEET SANDHU, Joseph Nord
  • Publication number: 20110004649
    Abstract: Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session.
    Type: Application
    Filed: May 3, 2010
    Publication date: January 6, 2011
    Inventors: Joseph Nord, Richard Hayton
  • Publication number: 20090106780
    Abstract: A method and system for aggregating installation scopes within an isolation environment, where the method includes first defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and the second installation scope, an this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.
    Type: Application
    Filed: October 20, 2007
    Publication date: April 23, 2009
    Inventors: Joseph NORD, David HOY, Madhav CHINTA
  • Publication number: 20070083501
    Abstract: A method and system for accessing a file in a directory structure associated with an application includes a method of accessing a file in a directory structure associated with an application. A request by an application for access to a file is intercepted. The request is redirected to a first isolation environment. A determination is made that the requested file does not exist in the first isolation environment. The request is redirected to a second isolation environment responsive to a determination that the file is identified in an enumeration of a directory structure including a plurality of application files residing on a remote machine. The requested file is retrieved from a file server, responsive to a determination that the second isolation environment does not contain the file and that the file is identified in the enumeration.
    Type: Application
    Filed: October 7, 2005
    Publication date: April 12, 2007
    Inventors: Bradley Pedersen, Joseph Nord, David Hoy
  • Publication number: 20070083522
    Abstract: A method and system for responding locally to requests for file metadata associated with files stored remotely includes a method of responding locally to requests for file metadata without downloading the file from a remote location. A directory structure representing an application program stored by a remote machine and metadata associated with each file comprising the stored application program are received from the remote machine. The directory and the metadata are stored. At least one request to access metadata associated with a specific tile in the directory structure is received. The stored metadata is used to respond to the at least one request.
    Type: Application
    Filed: October 7, 2005
    Publication date: April 12, 2007
    Inventors: Joseph Nord, David Hoy