Patents by Inventor Manbinder Pal Singh

Manbinder Pal Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220222326
    Abstract: A method may include receiving, by a computing system and from a first device, first data. The first data may be based at least in part on a first output from a first instance of a model processed by the first device. The method may further include receiving, by the computing system and from the first device, second data that was processed by the first instance of the model to produce the first output. The method may also include processing, by the computing system, the second data with at least a portion of a second instance of the model to produce a second output. The method may additionally include determining, by the computing system, third data based at least in part on the second output. Further, the method may include determining, by the computing system, that the third data is consistent with the first data.
    Type: Application
    Filed: February 9, 2021
    Publication date: July 14, 2022
    Inventors: Daniel G. Wing, Asterios Stergioudis, Manbinder Pal Singh, Pratik Shah
  • Patent number: 11385775
    Abstract: A computer system includes a client device to remotely access a virtual desktop. The client device is configured to launch application windows on at least one display based on default launch positions, and monitor usage of applications within the application windows to identify user patterns on how the applications are used in various layouts on the at least one display. The various layouts correspond to preferred positions. Usage of the applications within the application windows is mapped, with the mapping including associating the preferred positions to the corresponding default launch positions. At least one of the application windows is repositioned to the preferred position associated therewith based on the mapping in response to the at least one application window not being in the preferred position.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: July 12, 2022
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Manbinder Pal Singh, Georgy Momchilov
  • Publication number: 20220210186
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to provide protection against theft of user credentials by email phishing attacks. The at least one processor is further configured to identify a company name included in a received email; identify a link in the received email; extract a domain name from the identified link; search a linkmap for an existing record associated with the identified company name, wherein the linkmap comprises a collection of records, the records relating names of companies to trusted domain names; determine if the extracted domain name matches a trusted domain name of the existing record; and identify the received email as genuine in response to the determination of the match.
    Type: Application
    Filed: December 28, 2020
    Publication date: June 30, 2022
    Applicant: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Publication number: 20220207162
    Abstract: In one embodiment, a method includes: receiving an input by an application executable on a computing device, the application being presented in a first window displayable on the computing device and configured to provide access to another application, and the another application being displayable in a second window different than the first window; and providing by the application a message to the another application to modify access to content of the another application via the computing device in response to receipt of the input by the application, so as prevent display of the content within the second window of the computing device.
    Type: Application
    Filed: December 29, 2020
    Publication date: June 30, 2022
    Inventors: Manbinder Pal Singh, Ashish Gujarathi
  • Publication number: 20220210187
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to protect against theft of user credentials. The at least one processor is further configured to recognize a uniform resource locator (URL) to which a web browser is navigating, as a URL for which protection is to be provided. The recognition is based on an absence of the URL from a history of visited URLs for which a password has been entered. The at least one processor is further configured to extract a character sequence of selected length that is entered into a field of a website associated with the recognized URL; compare an encryption of the character sequence to entries in a list of encrypted partial passwords of the same selected length; and perform a security action in response to a match resulting from the comparison.
    Type: Application
    Filed: December 29, 2020
    Publication date: June 30, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Daniel G. Wing, Manbinder Pal Singh
  • Publication number: 20220207121
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to receive a sequence of characters within a field of a web browser, the field being associated with a password entry field served to the web browser from a website. The processor is further configured to store the received sequence of characters and send an alternate sequence of characters to the website. The processor is further configured to encrypt the received sequence of characters to generate a received encrypted partial password and compare the received encrypted partial password to one or more entries in a list of encrypted partial passwords. The processor is further configured to, in response to the comparison resulting in a difference, delete the previously sent alternate sequence of characters, and send the stored sequence of characters to the website.
    Type: Application
    Filed: June 7, 2021
    Publication date: June 30, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Manbinder Pal Singh, Daniel G. Wing
  • Publication number: 20220200977
    Abstract: Described embodiments provide systems and methods for protecting private data or confidential information. A device can receive a request from a client for a page from a server that includes confidential information to be verified with an owner of the confidential information. The device may be intermediary between the client and the server. Prior to providing the page to the client for rendering, the device may replace a first user interface (UI) element having the confidential information in the page, with a second UI element to obfuscate the confidential information. The device may receive an activation of the second UI element to request the owner to verify the confidential information from the client. The device may send to the client an update to the page to include an indication of whether the confidential information has been correctly verified with the owner.
    Type: Application
    Filed: December 17, 2020
    Publication date: June 23, 2022
    Applicant: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Patent number: 11368373
    Abstract: In one disclosed method, a first application accessed by a client device receives an indicator of an action that a second application is configured to take with respect to a third application. The client device accesses a fourth application and presents, based at least in part on the indicator received by the first application, a user interface element for the fourth application. Based at least in part on detecting selection of the user interface element, the client device presents a user interface configured to cause the second application to take the action with respect to the third application in response to a user input. The client device detects the user input to the user interface and causes, based at least in part on the user input, the second application to perform the action with respect to the third application.
    Type: Grant
    Filed: June 16, 2020
    Date of Patent: June 21, 2022
    Assignee: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Publication number: 20220188413
    Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, monitoring an application for suspicious activity based on keystrokes to input data to the application and detecting an instance of suspicious activity within the application based on a sequence of keystrokes to input the data to the application, the sequence of keystrokes to provide characters indicative of sensitive data and in a format different than an expected format for the input data. The method also includes, by the computing device, generating an action to prevent loss of sensitive data in response to detection of the instance of suspicious activity.
    Type: Application
    Filed: December 16, 2020
    Publication date: June 16, 2022
    Inventor: Manbinder Pal Singh
  • Publication number: 20220188450
    Abstract: Examples described herein attempt to mitigate risk associated with digitally storing sensitive information (e.g., passwords) in insecure applications and transferring the stored sensitive information to a sensitive information field (e.g., a password field in a login page). A computing device may detect a transfer to a sensitive field. The computing device may determine if a source application for the transfer is an insecure application. If the source application is an insecure application, the computing device may provide a risk mitigation action. The computing device may also transmit to an analytic server telemetry data comprising the identification of the source application, identification of a target application containing the sensitive information field, and a username associated with the computing device. The analytic server may calculate risk score based on the received telemetry data and provide further risk mitigation actions to the computing device.
    Type: Application
    Filed: December 15, 2020
    Publication date: June 16, 2022
    Inventor: Manbinder Pal Singh
  • Publication number: 20220188504
    Abstract: Disclosed is a system for generating a document having a sequence of steps. A user input selecting an element of an application is received, where the user input indicates the element corresponds to a step in the sequence of steps to be represented in the document. A record is stored, where the record includes at least data representing the selected element and a sequence identifier, indicating a relative position of the step within the sequence of steps. The document is generated by using the data in the record to generate a visual portion for the step, and using the sequence identifier to determine a position of the visual portion in the document relative to another visual portion(s) representing another step(s) in the sequence of steps.
    Type: Application
    Filed: December 14, 2020
    Publication date: June 16, 2022
    Inventor: Manbinder Pal Singh
  • Patent number: 11361075
    Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.
    Type: Grant
    Filed: June 18, 2021
    Date of Patent: June 14, 2022
    Assignee: Citrix Systems, inc.
    Inventor: Manbinder Pal Singh
  • Patent number: 11356481
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to identify a first domain name associated with a website that served a login form to a web browser. The at least one processor is further configured to identify a one-time password (OTP) entry request served from the website in response to transmitting user credentials to the website. The at least one processor is further configured to identify a second domain name associated with an OTP server that provided an OTP. The at least one processor is further configured to perform a security action in response to determining that the first domain name differs from the second domain name. The security action may include blocking a response to the OTP request from the website, providing a warning, and/or obtaining confirmation for the response to the OTP entry request.
    Type: Grant
    Filed: October 14, 2021
    Date of Patent: June 7, 2022
    Assignee: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Patent number: 11354122
    Abstract: A method for creating and executing a micro-application includes receiving a user selection of a user interface element within a user interface of a primary application. Source code associated with the selected user interface element is parsed to obtain at least one attribute associated with the selected user interface element. Data associated with the selected user interface element is identified based on the source code. A response based on the at least one attribute and the data is generated. A microapp configured to process the response to obtain the data from within the primary application is generated.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: June 7, 2022
    Assignee: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Publication number: 20220147411
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to scan session data representative of operation of a user interface comprising a plurality of user interface elements; detect, at a point in the session data, at least one changed element within the plurality of user interface elements; classify, in response to detecting the at least one changed element, the at least one changed element as either indicating or not indicating an error; store an association between the error and the point in the session data; and provide access to the point in the session data via the association.
    Type: Application
    Filed: January 24, 2022
    Publication date: May 12, 2022
    Applicant: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Publication number: 20220147415
    Abstract: A computer system is provided. The computer system includes a memory, a network interface, and at least one processor configured to monitor a user interface comprising a plurality of user interface elements; detect at least one changed element within the plurality of user interface elements; classify, in response to detecting the at least one changed element, the at least one changed element as either indicating or not indicating an error; generate, in response to classifying the at least one changed element as indicating an error, an error signature that identifies the at least one changed element; identify, using the error signature, a remediation for the error; and provide the remediation in association with the at least one changed element.
    Type: Application
    Filed: January 24, 2022
    Publication date: May 12, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Manbinder Pal Singh, Georgy Momchilov
  • Publication number: 20220141169
    Abstract: Systems and methods including notification techniques for sharing information related to detected dialogs on secondary computing devices associated with a user are provided. For example, a system can include a user interface (UI) monitor on a first client computing device configured to detect a dialog and send an indication of the dialog to a workspace backend. The workspace backend can facilitate communication between the first client computing device and one or more secondary computing devices associated with the user such that the user receives notifications of dialogs displayed on the first client computing device on the one or more secondary computing devices. The user has the option of responding to the dialog on a secondary computing device, and the workspace backend facilitates transmission of the user response on the secondary computing device back to the first client computing device.
    Type: Application
    Filed: October 30, 2020
    Publication date: May 5, 2022
    Applicant: Citrix Systems, Inc.
    Inventor: Manbinder Pal Singh
  • Patent number: 11314563
    Abstract: In some embodiments, a computing system may receive at least first data indicative of a first event of a first system of record accessed using first access credentials associated with a user, determine, based at least in part on first stored contextual data associated with the user, to create at least a first notification of the first event based at least in part on the first data, and send the first notification to a client device operated by the user.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: April 26, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Manbinder Pal Singh, Aikaterini Kalou
  • Publication number: 20220116392
    Abstract: Described embodiments provide systems and methods for contextual confidence scoring-based access control. The systems and methods can include one or more processors configured to receive a request from the client device to access an item of content. The one or more processors can select a first subset of authentication techniques. The authentication techniques identifiable with a score. The one or more processors can determine that a sum of the scores of the selected first subset of the authentication techniques exceeds a threshold. The one or more processors can transmit, to the client device, one or more authentication requests utilizing the selected first subset of authentication techniques. The one or more processors can provide, responsive to successful authentication by the client device, access to the item of content to the client device.
    Type: Application
    Filed: October 14, 2020
    Publication date: April 14, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Harsh Shah, Manbinder Pal Singh, Rachelle Tobkes, Jacob Summers
  • Publication number: 20220100874
    Abstract: Techniques are disclosed for providing data loss protection of sensitive information during display on a secondary display separate from a display of a computing device. An example methodology implementing the techniques includes identifying sensitive information within content displayable with use of a display of a computing device and adding metadata to the sensitive information, the metadata to cause a change in an appearance of the content before display of that content on a secondary display, the secondary display being separate from the display of the computing device. The method also includes, responsive to a determination to display the content on the secondary display, modifying the content based on the added metadata so that sensitive information is hidden from view while the content is shown on the secondary display and providing on the secondary display the modified content so as to prevent the sensitive information from being viewable by users.
    Type: Application
    Filed: September 25, 2020
    Publication date: March 31, 2022
    Inventor: Manbinder Pal Singh