Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secure cloud computing

A technology for identifying information and applications, which is applied in the field of secure cloud computing and can solve problems such as native applications connecting to malicious servers.

Inactive Publication Date: 2021-09-07
CITRIX SYST INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In some cases, malicious web applications may cause native applications to connect to malicious servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cloud computing
  • Secure cloud computing
  • Secure cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In the following description of various embodiments, reference is made to the accompanying drawings identified above and forming a part hereof, and in which is shown by way of illustration various embodiments in which aspects described herein may be practiced . It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope described herein. The various aspects are capable of other embodiments and of being practiced or carried out in various different ways.

[0024] As an overview of the subject matter described in more detail below, aspects described herein aim to safely use web applications to invoke applications to accomplish tasks. An application can use the identity information provided by the web application to determine whether to honor a request from the web application. Web applications can send requests to applications via a browser. The request may include the origin of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems for securely using a web application to invoke an application to complete a task are described herein. The application may use identity information provided by the web application to determine whether to comply with requests from the web application. The web application may send the request to the application via a browser. The request may include the origin of the request in an origin header to prevent malicious websites from spoofing the origin of the request. The application may exchange information with a trust service to determine whether the web application domain is trusted and / or belongs to the same organization of the user.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Nonprovisional Patent Application No. 16 / 246,104, filed January 11, 2019, which is expressly incorporated herein by reference in its entirety. technical field [0003] Aspects described herein relate generally to computing, software, and computer networks. More specifically, aspects described herein relate to securely launching remote resources in a cloud computing environment. Background technique [0004] In some cases, a user may wish to access remote resources via a client device. To access remote resources, a web application can call a native application executing on the client device to complete the task. In some cases, a malicious web application may cause a native application to connect to a malicious server. A malicious server can then send a request to the native application and cause the user to disclose sensitive information (eg, via spoofed user interface element...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12G06F21/57H04L29/08
CPCH04L67/02H04L63/126H04L63/10H04L61/4511G06F9/45558G06F2009/45587G06F2009/45595H04L9/3247H04L63/045H04L63/0807
Inventor 黄锋安迪·库珀
Owner CITRIX SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products