-
公开(公告)号:US11012429B2
公开(公告)日:2021-05-18
申请号:US16210793
申请日:2018-12-05
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Surya Prakash Patel , J Mohan Rao Arisankala
Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.
-
公开(公告)号:US11716314B2
公开(公告)日:2023-08-01
申请号:US17307634
申请日:2021-05-04
Applicant: Citrix Systems, Inc.
Inventor: J Mohan Rao Arisankala , Chaitra Maraliga Ramaiah , Karthick Srivatsan
IPC: H04L9/40 , H04L9/08 , H04L67/141 , H04L67/143 , H04L69/16 , H04L67/01
CPC classification number: H04L63/0485 , H04L9/0861 , H04L67/141 , H04L67/143 , H04L67/01 , H04L69/16
Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.
-
公开(公告)号:US20210273927A1
公开(公告)日:2021-09-02
申请号:US17322501
申请日:2021-05-17
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Surya Prakash Patel , J Mohan Rao Arisankala
Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.
-
公开(公告)号:US11792174B2
公开(公告)日:2023-10-17
申请号:US17322501
申请日:2021-05-17
Applicant: Citrix Systems, Inc.
Inventor: Praveen Raja Dhanabalan , Surya Prakash Patel , J Mohan Rao Arisankala
CPC classification number: H04L63/0478 , H04L9/0643 , H04L12/4633 , H04L63/029 , H04L69/22 , H04L63/0478 , H04L63/029 , H04L12/4633 , H04L9/0643
Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.
-
公开(公告)号:US11647005B2
公开(公告)日:2023-05-09
申请号:US17501476
申请日:2021-10-14
Applicant: Citrix Systems, Inc.
CPC classification number: H04L63/0428 , G06F16/9577 , H04L9/0838 , H04L63/0884 , H04L67/14 , H04L67/535 , H04L67/63
Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.
-
公开(公告)号:US11153285B2
公开(公告)日:2021-10-19
申请号:US16183232
申请日:2018-11-07
Applicant: Citrix Systems, Inc.
IPC: H04L29/06 , G06F16/957 , H04L9/08 , H04L29/08
Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.
-
公开(公告)号:US20200177564A1
公开(公告)日:2020-06-04
申请号:US16209070
申请日:2018-12-04
Applicant: Citrix Systems, Inc.
Inventor: J Mohan Rao Arisankala , Chaitra Maraliga Ramaiah , Karthick Srivatsan
Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.
-
公开(公告)号:US20220070151A1
公开(公告)日:2022-03-03
申请号:US17501476
申请日:2021-10-14
Applicant: Citrix Systems, Inc.
IPC: H04L29/06 , H04L29/08 , G06F16/957 , H04L9/08
Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.
-
公开(公告)号:US20210281551A1
公开(公告)日:2021-09-09
申请号:US17307634
申请日:2021-05-04
Applicant: Citrix Systems, Inc.
Inventor: J Mohan Rao Arisankala , Chaitra Maraliga Ramaiah , Karthick Srivatsan
Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.
-
公开(公告)号:US11025601B2
公开(公告)日:2021-06-01
申请号:US16209070
申请日:2018-12-04
Applicant: Citrix Systems, Inc.
Inventor: J Mohan Rao Arisankala , Chaitra Maraliga Ramaiah , Karthick Srivatsan
Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.
-
-
-
-
-
-
-
-
-