Systems and methods for application pre-launch

    公开(公告)号:US11153285B2

    公开(公告)日:2021-10-19

    申请号:US16183232

    申请日:2018-11-07

    Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.

    SYSTEM AND APPARATUS FOR ENHANCED QOS, STEERING AND POLICY ENFORCEMENT FOR HTTPS TRAFFIC VIA INTELLIGENT INLINE PATH DISCOVERY OF TLS TERMINATING NODE

    公开(公告)号:US20200177564A1

    公开(公告)日:2020-06-04

    申请号:US16209070

    申请日:2018-12-04

    Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.

Patent Agency Ranking