Patents by Inventor Zhongmin Lang
Zhongmin Lang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140109078Abstract: Methods and systems for developing, modifying, and distributing software applications for enterprise systems are described herein. A software component, such as a native mobile application or a template application, may be modified into a managed mobile application, and metadata associated with the managed mobile application may be generated. The managed application and associated metadata may be provided to one or more application stores, such as public application stores and/or enterprise application stores. Managed applications and/or associated metadata may be retrieved by computing devices from public application stores and/or enterprise application stores, and may be executed as managed applications in an enterprise system.Type: ApplicationFiled: October 16, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Zhongmin Lang, Gary Barton, James Robert Walker, Vipin Aravindakshan
-
Publication number: 20140109176Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 27, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109178Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: Citrix Systems, Inc.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140108793Abstract: Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device.Type: ApplicationFiled: September 27, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140108794Abstract: Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109172Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109072Abstract: A stub for a proxy of an operating system (OS) application program interface (API) call may be generated. Policy enforcement logic may be inserted into the stub for the proxy of the OS API call. Code of an application may be parsed to identify one or more calls corresponding to the OS API call. The one or more calls corresponding to the OS API call may be replaced with a reference to the stub for the proxy of the OS API call.Type: ApplicationFiled: October 16, 2013Publication date: April 17, 2014Applicant: Citrix Systems, Inc.Inventors: Zhongmin Lang, Gary Barton, James Robert Walker, Vipin Aravindakshan
-
Publication number: 20140108649Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109177Abstract: Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.Type: ApplicationFiled: September 30, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109171Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 16, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109173Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109175Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140109174Abstract: Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.Type: ApplicationFiled: September 17, 2013Publication date: April 17, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, Zhongmin Lang, Nitin Desai, James Robert Walker
-
Publication number: 20140095894Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: December 4, 2013Publication date: April 3, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Publication number: 20140096186Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: December 4, 2013Publication date: April 3, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Publication number: 20140053234Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: October 3, 2013Publication date: February 20, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Patent number: 8650303Abstract: A method and system for managing an application with multiple modes are described. A device manager that manages a mobile device may monitor the mobile device. The device manager may detect that a first type of application that runs in a managed mode (or in multiple managed modes) and an unmanaged mode is installed on the mobile device. When the application is executed on the device, the application executes in accordance with the selected application mode, e.g., based on location, user, role, industry presence, or other predefined context.Type: GrantFiled: September 10, 2013Date of Patent: February 11, 2014Assignee: Citrix Systems, Inc.Inventors: Zhongmin Lang, Gary Barton, Nitin Desai, James R. Walker
-
Publication number: 20140040978Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: October 3, 2013Publication date: February 6, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Publication number: 20140040979Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: October 3, 2013Publication date: February 6, 2014Applicant: Citrix Systems, Inc.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang
-
Publication number: 20140040638Abstract: Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.Type: ApplicationFiled: October 3, 2013Publication date: February 6, 2014Applicant: CITRIX SYSTEMS, INC.Inventors: Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang