Patents by Inventor J Mohan Rao Arisankala
J Mohan Rao Arisankala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11792174Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: GrantFiled: May 17, 2021Date of Patent: October 17, 2023Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Patent number: 11716314Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection.Type: GrantFiled: May 4, 2021Date of Patent: August 1, 2023Inventors: J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah, Karthick Srivatsan
-
Patent number: 11647005Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.Type: GrantFiled: October 14, 2021Date of Patent: May 9, 2023Inventors: Abhishek Chauhan, Karthick Srivatsan, J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah
-
Publication number: 20220070151Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.Type: ApplicationFiled: October 14, 2021Publication date: March 3, 2022Applicant: Citrix Systems, Inc.Inventors: Abhishek Chauhan, Karthick Srivatsan, J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah
-
Patent number: 11153285Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.Type: GrantFiled: November 7, 2018Date of Patent: October 19, 2021Assignee: Citrix Systems, Inc.Inventors: Abhishek Chauhan, Karthick Srivatsan, J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah
-
Publication number: 20210281551Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection.Type: ApplicationFiled: May 4, 2021Publication date: September 9, 2021Applicant: Citrix Systems, Inc.Inventors: J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah, Karthick Srivatsan
-
Publication number: 20210273927Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: ApplicationFiled: May 17, 2021Publication date: September 2, 2021Applicant: Citrix Systems, Inc.Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Patent number: 11025601Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection.Type: GrantFiled: December 4, 2018Date of Patent: June 1, 2021Assignee: Citrix Systems, Inc.Inventors: J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah, Karthick Srivatsan
-
Patent number: 11012429Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: GrantFiled: December 5, 2018Date of Patent: May 18, 2021Assignee: Citrix Systems, Inc.Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Publication number: 20200186507Abstract: Described embodiments provide systems and methods for remapping connections to tunnels selected based on a security level of the communications. A first network device may be in communication with a second network device via a plurality of communication tunnels. The plurality of communication tunnels may include an encrypted communication tunnel and an unencrypted communication tunnel. The first network device may receive a packet, the packet including header information and a payload. The first network device may determine whether the received packet is encrypted to meet a threshold level of security. The first network device may, responsive to determining that the packet is to meet the threshold level of security, communicate an identifier of the payload and the header information to the second network device via the encrypted communication tunnel, and communicate the payload to the second network device via the unencrypted communication tunnel.Type: ApplicationFiled: December 5, 2018Publication date: June 11, 2020Inventors: Praveen Raja Dhanabalan, Surya Prakash Patel, J Mohan Rao Arisankala
-
Publication number: 20200177564Abstract: Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection.Type: ApplicationFiled: December 4, 2018Publication date: June 4, 2020Inventors: J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah, Karthick Srivatsan
-
Publication number: 20200145385Abstract: Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.Type: ApplicationFiled: November 7, 2018Publication date: May 7, 2020Inventors: Abhishek Chauhan, Karthick Srivatsan, J Mohan Rao Arisankala, Chaitra Maraliga Ramaiah