Patents by Inventor Richard Croft
Richard Croft has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10089458Abstract: Methods and systems are disclosed for opening unverified content in a separate, disposable virtualized environment using a temporary virtual machine (VM). In one example, the disclosed method includes intercepting a request to open/access unverified content from a third-party remote server, and comparing the particular information/attributes of the unverified content against predetermined criteria. Then, the user device may connect using a remote presentation protocol to the temporary VM in the separate, disposable environment such that the output of the unverified content may be transported to and displayed in the separate, disposable environment. The connection with the temporary VM may be terminated and the separate, disposable environment may be wiped clean to reduce the risk of malicious code in the unverified content.Type: GrantFiled: September 26, 2013Date of Patent: October 2, 2018Assignee: Citrix Systems, Inc.Inventors: Andrew Borzycki, Mallikharjuna Reddy Deva, Richard Croft, Hao Wang
-
Patent number: 10001134Abstract: A rotor disc having an enlarged radially outer rim defining a circumferentially-extending dovetail groove for housing the root portion of a rotor blade. The groove has a groove axis and the groove is unsymmetrical about the groove axis. For example, the dovetail groove may have a restricted radially outer opening extending to an enlarged radially inner bulb profile having a pair of axially opposed curved surfaces and the opposing curved surfaces may unsymmetrical about the groove axis.Type: GrantFiled: January 29, 2016Date of Patent: June 19, 2018Assignee: ROLLS-ROYCE plcInventors: Oliver R Jones, Richard A Crofts
-
Patent number: 9612724Abstract: By enabling mobile devices, such as smart phones and tablets, to leverage native user interface components, the methods and systems described herein provide users a more seamless experience, wherein the user can potentially be oblivious to the fact that the application is not executing locally on the mobile device. In some embodiments, a user interface is provided which the user uses to trigger the display of a native user interface component. In some embodiments, the systems and methods described herein auto-adjust the pan and zoom settings on the mobile device to ensure that remote windows are presented in a manner that makes it easier for the user to interact with the device. The systems and methods described herein permit the user to switch to the new window in focus or a visual cue may be displayed to indicate that a window has been created somewhere on the remote desktop.Type: GrantFiled: November 29, 2012Date of Patent: April 4, 2017Assignee: Citrix Systems, Inc.Inventors: Lee Laborczfalvi, Richard Croft, Anil Roychoudhry, Stephen Parry-Barwick, Gus Pinto
-
Publication number: 20160238020Abstract: A rotor disc having an enlarged radially outer rim defining a circumferentially-extending dovetail groove for housing the root portion of a rotor blade. The groove has a groove axis and the groove is unsymmetrical about the groove axis. For example, the dovetail groove may have a restricted radially outer opening extending to an enlarged radially inner bulb profile having a pair of axially opposed curved surfaces and the opposing curved surfaces may unsymmetrical about the groove axis.Type: ApplicationFiled: January 29, 2016Publication date: August 18, 2016Applicant: ROLLS-ROYCE plcInventors: Oliver R JONES, Richard A CROFTS
-
Publication number: 20150089497Abstract: Methods and systems are disclosed for opening unverified content in a separate, disposable virtualized environment using a temporary virtual machine (VM). In one example, the disclosed method includes intercepting a request to open/access unverified content from a third-party remote server, and comparing the particular information/attributes of the unverified content against predetermined criteria. Then, the user device may connect using a remote presentation protocol to the temporary VM in the separate, disposable environment such that the output of the unverified content may be transported to and displayed in the separate, disposable environment. The connection with the temporary VM may be terminated and the separate, disposable environment may be wiped clean to reduce the risk of malicious code in the unverified content.Type: ApplicationFiled: September 26, 2013Publication date: March 26, 2015Applicant: Citrix Systems, Inc.Inventors: Andrew Borzycki, Mallikharjuna Reddy Deva, Richard Croft, Hao Wang
-
Patent number: 8145777Abstract: A foreground protocol engine receives a request for rendering the contents of a packet in a recording of a protocol data stream, the protocol data stream comprising a plurality of packets. The foreground protocol engine identifies a state-snapshot having an associated timestamp previous to that of the requested packet. The foreground protocol engine displays the requested packet responsive to the identified state-snapshot.Type: GrantFiled: January 14, 2005Date of Patent: March 27, 2012Assignee: Citrix Systems, Inc.Inventors: Paul Ryman, Richard Croft, Tony Low
-
Publication number: 20070192329Abstract: A method for executing, by a virtual machine, an application program requested by a client machine includes the step of receiving a file including access information for accessing a plurality of application files and for executing a first client capable of receiving an application stream. An identification of the plurality of application files is retrieved, responsive to the received file. At least one characteristic required for execution of the plurality of application files is retrieved, responsive to the file. A determination is made as to whether a client machine includes the at least one characteristic. A second client is executed, responsive to a determination that the client machine lacks the at least one characteristic, the second client requesting execution of the plurality of application files on a remote machine comprising a virtual machine providing a computing environment having the at least one characteristic.Type: ApplicationFiled: January 18, 2007Publication date: August 16, 2007Applicant: CITRIX SYSTEMS, INC.Inventors: Richard CROFT, Anthony LOW, Richard MAZZAFERRI, Bradley Pedersen
-
Publication number: 20070180448Abstract: A method for providing access to a computing environment includes the step of receiving, by a broker machine, a request from a client machine for access to a computing environment, the request including an identification of a user of the client machine. One of a plurality of virtual machines is identified by a session management component, the identified virtual machine providing the requested computing environment. One of a plurality of execution machines is identified, the identified execution machine providing a terminal services session in which a hypervisor executes to provide access to hardware resources required by the identified virtual machine. The hypervisor launches the identified virtual machine. A connection is established between the client machine and the identified virtual machine, via the terminal services session.Type: ApplicationFiled: November 28, 2006Publication date: August 2, 2007Applicant: Citrix Systems, Inc.Inventors: Anthony Low, Richard Croft, Richard Mazzaferri, Paul Ryman, Nicholas Bissett, Michael Wookey, Donovan Hackett
-
Publication number: 20070180493Abstract: A system for granting access to resources includes a client machine, a collection agent, a policy engine, and a broker server. The client machine requests access to a resource. The collection agent gathers information about the client machine. The policy engine receives the gathered information and assigns one of a plurality of levels of access responsive to application of a policy to the received information. The broker server establishes, responsive to the assigned level of access, a connection between the client machine and a computing environment providing the requested resource, the computing environment provided by a virtual machine.Type: ApplicationFiled: January 18, 2007Publication date: August 2, 2007Applicant: CITRIX SYSTEMS, INC.Inventors: Richard Croft, Anthony Low, Richard Mazzaferri, Bradley Pedersen, David Robinson
-
Publication number: 20070180450Abstract: A method for selecting a method of execution for an application includes the step of receiving credentials. A plurality of applications available to a client machine is enumerated responsive to the received credentials. A request to execute an enumerated application is received. One of a predetermined number of methods for executing the requested application is selected responsive to a policy, the predetermined number of methods including a method for executing the requested application in a computing environment provided by a virtual machine.Type: ApplicationFiled: January 18, 2007Publication date: August 2, 2007Applicant: CITRIX SYSTEMS, INC.Inventors: Richard CROFT, Anthony LOW, Richard MAZZAFERRI, Bradley PEDERSEN
-
Publication number: 20070179955Abstract: A method for providing authorized remote access to a computing environment provided by a virtual machine, includes the step of requesting, by a client machine, access to a resource. A collection agent gathers information about the client machine. A policy engine receives the gathered information. The policy engine makes an access control decision based on the received information. A computing environment already associated with the user is identified in response to the received information, the identified computing environment provided by a virtual machine. A broker server establishes, responsive to the access control decision, a connection between the client machine and the identified computing environment.Type: ApplicationFiled: January 18, 2007Publication date: August 2, 2007Applicant: CITRIX SYSTEMS, INC.Inventors: Richard CROFT, Anthony LOW, Richard MAZZAFERRI, David Robinson, Bradley Pedersen
-
Publication number: 20070180449Abstract: A method for providing remote access to a computer environment provided by a virtual machine includes the step of receiving authentication information associated with a user of a client machine. Based on the received authentication information, a computer environment provided by a virtualized operating system and already associated with the user is identified.Type: ApplicationFiled: January 18, 2007Publication date: August 2, 2007Applicant: CITRIX SYSTEMS, INC.Inventors: Richard CROFT, Anthony LOW, Richard MAZZAFERRI, David Robinson, Bradley Pedersen
-
Publication number: 20060239921Abstract: The invention provides methods and systems for imaging vessels in a subject. In certain embodiments the vessels may be associated with a solid organ transplant.Type: ApplicationFiled: April 26, 2005Publication date: October 26, 2006Applicant: Novadaq Technologies Inc.Inventors: Gurpreet Mangat, Lukasz Brzozowski, Richard Croft
-
Publication number: 20060161959Abstract: A foreground protocol engine receives a request for rendering the contents of a packet in a recording of a protocol data stream, the protocol data stream comprising a plurality of packets. The foreground protocol engine identifies a state-snapshot having an associated timestamp previous to that of the requested packet. The foreground protocol engine displays the requested packet responsive to the identified state-snapshot.Type: ApplicationFiled: January 14, 2005Publication date: July 20, 2006Applicant: Citrix Systems, Inc.Inventors: Paul Ryman, Richard Croft, Tony Low
-
Publication number: 20060161671Abstract: A recorder intercepts a protocol data stream comprising a plurality of packets, sent from a first device to a second device, the protocol data stream representing display data. The recorder copies at least one packet of the protocol data stream. The recorder creates a recording of the protocol data stream using the at least one copied packet. A protocol engine reads the at least one copied packet from the recording of the protocol data stream. The protocol engine uses information associated with the at least one copied packet to regenerate the display data represented by the protocol data stream.Type: ApplicationFiled: January 14, 2005Publication date: July 20, 2006Applicant: Citrix Systems, Inc.Inventors: Paul Ryman, Richard Croft, Tony Low
-
Patent number: T102501Abstract: A process for the production of a stannic oxide sol-potassium stannate tin plating solution is disclosed comprising the steps of:anodically dissolving stannous tin in a potassium electrolyte such as potassium hydroxide to form potassium stannite in a first electrolytic cell including an anode compartment and a cathode compartment;simultaneously preventing the potassium stannite from migrating from the anode compartment to the cathode compartment by interposing therebetween a permselective ion exchange membrane (e.g.Type: GrantFiled: November 17, 1981Date of Patent: December 7, 1982Inventor: Richard Croft