-
1.
公开(公告)号:US20180103018A1
公开(公告)日:2018-04-12
申请号:US15289472
申请日:2016-10-10
Applicant: Citrix Systems, Inc.
Inventor: Abhishek Chauhan , Tushar Kanekar , Ritesh Patani , Robert Kidd , Sergey Golubev , Harpreet Singh
CPC classification number: F16K37/0091 , F15B5/006 , F15B19/005 , F15B20/00 , F15B20/008 , F15B2211/6306 , F15B2211/6313 , F15B2211/6658 , F15B2211/857 , F15B2211/8613 , F15B2211/8636 , F15B2211/8755 , G06F21/602 , H04L63/0281 , H04L63/0471 , H04L63/0485 , H04L63/166 , H04L63/168 , H04L2209/12
Abstract: The present disclosure is directed towards systems and methods for executing cryptographic operations across different types of processing hardware. An intermediary device may identify a cryptographic function to be performed at the device, according to a message from a client or a server. The device may identify a sequence of cryptographic operations to be executed for performing the cryptographic function. The device may determine subsets of the cryptographic operations to be executed on across different types of processing hardware. The different types of processing hardware may reside on the device. Each of the types of processing hardware may execute, responsive to the determination, the respective subset of the cryptographic operations, according to the sequence of the cryptographic operations.
-
公开(公告)号:US10520110B2
公开(公告)日:2019-12-31
申请号:US15289472
申请日:2016-10-10
Applicant: Citrix Systems, Inc.
Inventor: Abhishek Chauhan , Tushar Kanekar , Ritesh Patani , Robert Kidd , Sergey Golubev , Harpreet Singh
Abstract: The present disclosure is directed towards systems and methods for executing cryptographic operations across different types of processing hardware. An intermediary device may identify a cryptographic function to be performed at the device, according to a message from a client or a server. The device may identify a sequence of cryptographic operations to be executed for performing the cryptographic function. The device may determine subsets of the cryptographic operations to be executed on across different types of processing hardware. The different types of processing hardware may reside on the device. Each of the types of processing hardware may execute, responsive to the determination, the respective subset of the cryptographic operations, according to the sequence of the cryptographic operations.
-