1
Richard James Mazzaferri, Stephen Parry Barwick, Anthony Edward Low: Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment. Citrix Systems, Foley & Lardner, John D Lanza, November 1, 2011: US08051180 (161 worldwide citation)

A method for providing access to a computing environment includes the step of receiving a request from a client system for an enumeration of available computing environments. Collected data regarding available computing environments are accessed. Accessed data are transmitted to a client system, the ...


2
Richard Jason Croft, Anthony Edward Low, Richard James Mazzaferri, Bradley J Pedersen: Methods and systems for executing, by a virtual machine, an application program requested by a client machine. Citrix Systems, Foley and Lardner, John D Lanza, January 11, 2011: US07870153 (87 worldwide citation)

A method for executing, by a virtual machine, an application program requested by a client machine includes the step of receiving a file including access information for accessing a plurality of application files and for executing a first client capable of receiving an application stream. An identif ...


3
Richard Jason Croft, Anthony Edward Low, Richard James Mazzaferri, Bradley J Pedersen, David N Robinson: Methods and systems for assigning access control levels in providing access to resources via virtual machines. Citrix Systems, Foley & Lardner, John D Lanza, May 31, 2011: US07954150 (85 worldwide citation)

A system for granting access to resources includes a client machine, a collection agent, a policy engine, and a broker server. The client machine requests access to a resource. The collection agent gathers information about the client machine. The policy engine receives the gathered information and ...


4
Anthony Edward Low, Richard Jason Croft, Richard James Mazzaferri, Paul Adam Ryman, Nicholas Alexander Bissett, Michael Wookey, Donovan Ross Hackett: Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session. Citrix Systems, Foley and Lardner, John D Lanza, August 30, 2011: US08010679 (67 worldwide citation)

A method for providing access to a computing environment includes the step of receiving, by a broker machine, a request from a client machine for access to a computing environment, the request including an identification of a user of the client machine. One of a plurality of virtual machines is iden ...


5
Richard Jason Croft, Anthony Edward Low, Richard James Mazzaferri, David Neil Robinson, Bradley J Pedersen: Methods and systems for providing authorized remote access to a computing environment provided by a virtual machine. Citrix Systems, Foley & Lardner, John D Lanza, May 24, 2011: US07949677 (65 worldwide citation)

A method for providing authorized remote access to a computing environment provided by a virtual machine, includes the step of requesting, by a client machine, access to a resource. A collection agent gathers information about the client machine. A policy engine receives the gathered information. Th ...


6
Richard Jason Croft, Anthony Edward Low, Richard James Mazzaferri, David Neil Robinson, Bradley J Pedersen: Methods and systems for providing remote access to a computing environment provided by a virtual machine. Citrix Systems, Foley and Lardner, John D Lanza, February 14, 2012: US08117314 (53 worldwide citation)

A method for providing remote access to a computer environment provided by a virtual machine includes the step of receiving authentication information associated with a user of a client machine. Based on the received authentication information, a computer environment provided by a virtualized operat ...


7
Michael Wookey, Anthony Edward Low, Stephen Parry Barwick: Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session. Citrix Systems, Foley and Lardner, John D Lanza, January 15, 2013: US08355407 (30 worldwide citation)

A method for making a hypermedium page interactive, the hypermedium page displayed by a network browser, includes the step of selecting a hyperlink on the hypermedium page displayed on a client machine, the hyperlink identifying a desired computing resource. A hyperlink configuration file is retriev ...


8
Richard Jason Croft, Anthony Edward Low, Richard James Mazzaferri, Bradley J Pedersen: Methods and systems for selecting a method for execution, by a virtual machine, of an application program. Citrix Systems, Foley & Lardner, John D Lanza, December 25, 2012: US08341732 (26 worldwide citation)

A method for selecting a method of execution for an application includes the step of receiving credentials. A plurality of applications available to a client machine is enumerated responsive to the received credentials. A request to execute an enumerated application is received. One of a predetermin ...


9
Richard Jason CROFT, Anthony Edward LOW, Richard James MAZZAFERRI, David Neil Robinson, Bradley J Pedersen: Methods and systems for providing authorized remote access to a computing environment provided by a virtual machine. Citrix Systems, Choate Hall & Stewart, August 2, 2007: US20070179955-A1

A method for providing authorized remote access to a computing environment provided by a virtual machine, includes the step of requesting, by a client machine, access to a resource. A collection agent gathers information about the client machine. A policy engine receives the gathered information. Th ...


10
Anthony Edward Low, Richard Jason Croft, Richard James Mazzaferri, Paul Adam Ryman, Nicholas Alexander Bissett, Michael Wookey, Donovan Ross Hackett: Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session. Citrix Systems, Choate Hall & Stewart, August 2, 2007: US20070180448-A1

A method for providing access to a computing environment includes the step of receiving, by a broker machine, a request from a client machine for access to a computing environment, the request including an identification of a user of the client machine. One of a plurality of virtual machines is iden ...