Patents by Inventor Balasubramanian Swaminathan
Balasubramanian Swaminathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240028098Abstract: According to one aspect of the disclosure, a method comprises: receiving, by a first computing device, information about one or more applications running on a second computing device, the second computing device being one of a plurality of computing devices managed by the first computing device; determining, by the first computing device, whether to power down the second computing device based at least on an analysis of the information about the one or more applications; and responsive to a determination to shutdown the second computing device, sending, by the first computing device, a command to shutdown the second computing device, wherein the second computing device is configured to save state of the one or more applications to a storage device accessible to the plurality of computing devices.Type: ApplicationFiled: July 21, 2022Publication date: January 25, 2024Inventors: Yuri Kolesnikov, Adith Jayakar Hegde, Nitin Mehta, William Thomas George Charnell, Leo C. Singleton, IV, Balasubramanian Swaminathan
-
Patent number: 11726858Abstract: A computer system configured to identify errors in a session launch initiated by a client application is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive one or more events from one or more applications or devices involved in the session launch, wherein an event of the one or more events comprises information from an application or device call (e.g., an application programming interface (API) call) communicated during the session launch, the information comprising destination information; build a primary Directed Acyclic Graph (DAG) based on the information from the API call; determine an error identifier based on the primary DAG; retrieve a troubleshooting recommendation from a library based on the error identifier; and send the troubleshooting recommendation to the client application.Type: GrantFiled: January 20, 2022Date of Patent: August 15, 2023Assignee: Citrix Systems, Inc.Inventors: Himanshu Agarwal, Vikramjeet Singh Sandhu, Mukesh Garg, Kenneth Bell, Leo C. Singleton, IV, Balasubramanian Swaminathan, Vivek Koni Raghuveer, Aditya Ranjan
-
Publication number: 20230229547Abstract: A computer system configured to identify errors in a session launch initiated by a client application is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive one or more events from one or more applications or devices involved in the session launch, wherein an event of the one or more events comprises information from an application or device call (e.g., an application programming interface (API) call) communicated during the session launch, the information comprising destination information; build a primary Directed Acyclic Graph (DAG) based on the information from the API call; determine an error identifier based on the primary DAG; retrieve a troubleshooting recommendation from a library based on the error identifier; and send the troubleshooting recommendation to the client application.Type: ApplicationFiled: January 20, 2022Publication date: July 20, 2023Applicant: Citrix Systems, Inc.Inventors: Himanshu Agarwal, Vikramjeet Singh Sandhu, Mukesh Garg, Kenneth Bell, Leo C. Singleton, IV, Balasubramanian Swaminathan, Vivek Koni Raghuveer, Aditya Ranjan
-
Patent number: 11630682Abstract: A computing system includes a virtual server to provide a virtual computing session, and a client device to access the virtual computing session via a communications network. The virtual computing session includes a remote browser, and the client device includes a local browser to access user credential information. The remote browser is used to navigate to a website requiring user authentication, receive a user credential challenge from the website, and request the user credential information from the client device to satisfy the user credential challenge. The client device provides the user credential information to the remote browser for user authentication via the local browser, so as to satisfy the user credential challenge of the website.Type: GrantFiled: April 10, 2020Date of Patent: April 18, 2023Inventors: Balasubramanian Swaminathan, Kireeti Valicherla, Sam Arun Seeniraj
-
Publication number: 20220050706Abstract: A computing system may be in communication with client computing devices. The computing system may include a cloud infrastructure, an offline cache, and a VDA configured to concurrently have a first registration with the cloud infrastructure, and a second registration with the offline cache, and provide corresponding virtual desktop instances for the client computing devices based upon either the first registration or the second registration. The offline cache may be configured to broker local resources for the virtual desktop instances when the cloud infrastructure is unavailable. The VDA may be configured to transition, with no transition delay, to the offline cache using the second registration when the cloud infrastructure is unavailable.Type: ApplicationFiled: October 28, 2021Publication date: February 17, 2022Inventors: LEO C. SINGLETON, IV, MUKUND INGALE, GEORGY MOMCHILOV, BALASUBRAMANIAN SWAMINATHAN
-
Patent number: 11188372Abstract: A computing system may be in communication with client computing devices. The computing system may include a cloud infrastructure, an offline cache, and a VDA configured to concurrently have a first registration with the cloud infrastructure, and a second registration with the offline cache, and provide corresponding virtual desktop instances for the client computing devices based upon either the first registration or the second registration. The offline cache may be configured to broker local resources for the virtual desktop instances when the cloud infrastructure is unavailable. The VDA may be configured to transition to the offline cache using the second registration when the cloud infrastructure is unavailable.Type: GrantFiled: April 29, 2019Date of Patent: November 30, 2021Assignee: CITRIX SYSTEMS, INC.Inventors: Leo C. Singleton, IV, Mukund Ingale, Georgy Momchilov, Balasubramanian Swaminathan
-
Publication number: 20210318894Abstract: A computing system includes a virtual server to provide a virtual computing session, and a client device to access the virtual computing session via a communications network. The virtual computing session includes a remote browser, and the client device includes a local browser to access user credential information. The remote browser is used to navigate to a website requiring user authentication, receive a user credential challenge from the website, and request the user credential information from the client device to satisfy the user credential challenge. The client device provides the user credential information to the remote browser for user authentication via the local browser, so as to satisfy the user credential challenge of the website.Type: ApplicationFiled: April 10, 2020Publication date: October 14, 2021Inventors: BALASUBRAMANIAN SWAMINATHAN, KIREETI VALICHERLA, SAM ARUN SEENIRAJ
-
Publication number: 20200341795Abstract: A computing system may be in communication with client computing devices. The computing system may include a cloud infrastructure, an offline cache, and a VDA configured to concurrently have a first registration with the cloud infrastructure, and a second registration with the offline cache, and provide corresponding virtual desktop instances for the client computing devices based upon either the first registration or the second registration. The offline cache may be configured to broker local resources for the virtual desktop instances when the cloud infrastructure is unavailable. The VDA may be configured to transition to the offline cache using the second registration when the cloud infrastructure is unavailable.Type: ApplicationFiled: April 29, 2019Publication date: October 29, 2020Inventors: LEO C. SINGLETON, IV, MUKUND INGALE, GEORGY MOMCHILOV, BALASUBRAMANIAN SWAMINATHAN
-
Patent number: 8745750Abstract: The use of a marker in a file to assist in the signing and/or verification of the file. The marker is recognized by the signing authority. The marker has a certain execution transparent context that reduces or eliminates the impact of the marker on execution. A signing authority accesses the file, finds the marker within the file, and identifies the execution transparent context system. The signing authority then uses the execution transparent context system to insert a signature with the same execution transparent context. A verification system finds the marker, identifies the execution transparent context of the marker, identify the execution transparent signature, and uses the execution transparent context system to then extract the signature from the execution transparent signature. That signature may then be used to verify that the file has not changed since it was signed.Type: GrantFiled: April 21, 2011Date of Patent: June 3, 2014Assignee: Microsoft CorporationInventor: Balasubramanian Swaminathan
-
Patent number: 8402530Abstract: Authentication requests are redistributed among a plurality of authentication servers and to centrally managing authentication affinities among distributed servers using a secure channels affinity service. A computer system instantiates a secure channel management service configured to manage secure channel connections. The secure channel management service receives state inputs from currently deployed authentication servers. The authentication servers may be configured to queue authentication requests for transmission to authentication servers. The computer system determines that, based on the received state input, at least one of the secure channels is to be remapped to a different authentication server. The computer system also remaps the determined secure channels to distribute future authentication requests among the authentication servers.Type: GrantFiled: July 30, 2010Date of Patent: March 19, 2013Assignee: Microsoft CorporationInventors: Odin J. Anderson, Stephen M. Patrick, Nasko Oskov, Konstantin E. Ryvkin, Guruprakash Bangalore Rao, Balasubramanian Swaminathan
-
Publication number: 20120272323Abstract: The use of a marker in a file to assist in the signing and/or verification of the file. The marker is recognized by the signing authority. The marker has a certain execution transparent context that reduces or eliminates the impact of the marker on execution. A signing authority accesses the file, finds the marker within the file, and identifies the execution transparent context system. The signing authority then uses the execution transparent context system to insert a signature with the same execution transparent context. A verification system finds the marker, identifies the execution transparent context of the marker, identify the execution transparent signature, and uses the execution transparent context system to then extract the signature from the execution transparent signature. That signature may then be used to verify that the file has not changed since it was signed.Type: ApplicationFiled: April 21, 2011Publication date: October 25, 2012Applicant: Microsoft CorporationInventor: Balasubramanian Swaminathan
-
Publication number: 20120030749Abstract: Embodiments are directed to redistributing authentication requests among a plurality of authentication servers and to centrally managing authentication affinities among distributed servers using a secure channels affinity service. A computer system instantiates a secure channel management service configured to manage secure channel connections. The secure channel management service receives state inputs from currently deployed authentication servers. The authentication servers may be configured to queue authentication requests for transmission to authentication servers. The computer system determines that, based on the received state input, at least one of the secure channels is to be remapped to a different authentication server. The computer system also remaps the determined secure channels to distribute future authentication requests among the authentication servers.Type: ApplicationFiled: July 30, 2010Publication date: February 2, 2012Applicant: MICROSOFT CORPORATIONInventors: Odin J. Anderson, Stephen M. Patrick, Nasko Oskov, Konstantin E. Ryvkin, Guruprakash Bangalore Rao, Balasubramanian Swaminathan