Patents by Inventor Nitin Desai
Nitin Desai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140201679Abstract: A local computing device may use a remote computing device to host various resources on behalf of the local computing device. The local computing device may receive data related to a graphical window of the remotely hosted resource and generate a graphical window on the local desktop environment for the remotely hosted resource. The local computing device may also update a taskbar to include the remote hosted resource. Window previews may also be generated by the local computing device and the window previews may include snapshots or dynamic images of the graphical window for the remotely hosted resource. In some instances, the snapshots may be provided to the local computing device from the remote computing device.Type: ApplicationFiled: March 14, 2014Publication date: July 17, 2014Applicant: Citrix Systems, Inc.Inventors: Nitin Desai, Georgy Momchilov
-
Publication number: 20140186524Abstract: Solvent systems and dispersions including such solvent systems for use in compositions including metals and inks are provided. In certain examples, the solvent systems may be used with capped metal particles to provide a dispersion that may be used to print conductive lines.Type: ApplicationFiled: December 3, 2013Publication date: July 3, 2014Applicant: ALPHA METALS, INC.Inventors: Oscar Khaselev, Michael T. Marczi, Bawa Singh, Nitin Desai
-
Patent number: 8769063Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: GrantFiled: October 3, 2013Date of Patent: July 1, 2014Assignee: Citrix Systems, Inc.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Publication number: 20140153203Abstract: Methods for attachment and devices produced using such methods are disclosed. In certain examples, the method comprises disposing a capped nanomaterial on a substrate, disposing a die on the disposed capped nanomaterial, drying the disposed capped nanomaterial and the disposed die, and sintering the dried disposed die and the dried capped nanomaterial at a temperature of 300° C. or less to attach the die to the substrate. Devices produced using the methods are also described.Type: ApplicationFiled: September 16, 2013Publication date: June 5, 2014Applicant: ALPHA METALS, INC.Inventors: Monnir Boureghda, Nitin Desai, Anna Lifton, Oscar Khaselev, Michael T. Marczi, Bawa Singh
-
Patent number: 8719898Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: GrantFiled: September 30, 2013Date of Patent: May 6, 2014Assignee: Citrix Systems, Inc.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Patent number: 8713474Abstract: A local computing device may use a remote computing device to host various resources on behalf of the local computing device. The local computing device may receive data related to a graphical window of the remotely hosted resource and generate a graphical window on the local desktop environment for the remotely hosted resource. The local computing device may also update a taskbar to include the remote hosted resource. Window previews may also be generated by the local computing device and the window previews may include snapshots or dynamic images of the graphical window for the remotely hosted resource. In some instances, the snapshots may be provided to the local computing device from the remote computing device.Type: GrantFiled: October 4, 2011Date of Patent: April 29, 2014Assignee: Citrix Systems, Inc.Inventors: Nitin Desai, Georgy Momchilov
-
Publication number: 20140109178Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: Citrix Systems, Inc.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109176Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 27, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109172Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140108649Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109174Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140108793Abstract: Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device.Type: ApplicationFiled: September 27, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109171Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 16, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109177Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109175Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109173Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140108794Abstract: Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140095894Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: December 4, 2013Publication date: April 3, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Publication number: 20140096186Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: December 4, 2013Publication date: April 3, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Publication number: 20140053234Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: October 3, 2013Publication date: February 20, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang