Patents by Inventor Kasirao VELUGU

Kasirao VELUGU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11411982
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: August 9, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Thirumoorthi Thangamani, Ganesh Kathiresan
  • Patent number: 11381517
    Abstract: Described embodiments provide systems and methods performing header protection. A device can receive from a client, a request relating to a first resource, for a second resource. The device can determine, using an identifier for the session, whether an address of the first resource has been previously accessed by the client during the session. The device can verify, using an address of the second resource, whether the address of the second resource is mapped to the address of the first resource for the session between the client and the device. The device can determine whether to provide access to the second resource responsive to the address of the first resource being previously accessed by the client during the session and the address of the second resource being mapped to the address of the first resource for the session.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: July 5, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Patent number: 11349812
    Abstract: Described embodiments provide systems and methods for learning across multiple application delivery controllers and updating settings across the application delivery controllers. A profile can be generated based on selection of a set of intermediary devices managed by a device. The set of intermediary devices configured to load balance data of an application hosted in different computing environments. Activity can be identified at the intermediary devices with use of a firewall. The activity having an appearance of a malicious attack on at least one intermediary device of the set. The device can determine if the activity is permissible or a violation based on a comparison of an aggregation of data records for the identified activity and a threshold. The device can provide a notification to at least one intermediary device of the set to configure the at least one intermediary device to allow the activity or prevent the activity.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: May 31, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Gourish K Biradar, Kasirao Velugu, Vamshi Raghav, Ratnesh Singh Thakur, Rama Rao Katta, Srinivasa Reddy Kasu, Kapil Jaisinghani, Satyendra Tiwari
  • Patent number: 11343357
    Abstract: Systems and methods for autonomous program management include a device which may transmit data to a client in response to a first request from the client. The data may include a response to the first request and a copy of data available to the device corresponding to the first request or the client. The device may receive a second request including the copy of data from the client. The device may determine that the second request is from an autonomous program rather than a user of the client based on the copy of data from the second request. The device may block at least one subsequent request from the client in response to the determination that the second request is from an autonomous program.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: May 24, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Publication number: 20220141187
    Abstract: Described embodiments provide systems and methods for learning across multiple application delivery controllers and updating settings across the application delivery controllers. A profile can be generated based on selection of a set of intermediary devices managed by a device. The set of intermediary devices configured to load balance data of an application hosted in different computing environments. Activity can be identified at the intermediary devices with use of a firewall. The activity having an appearance of a malicious attack on at least one intermediary device of the set. The device can determine if the activity is permissible or a violation based on a comparison of an aggregation of data records for the identified activity and a threshold. The device can provide a notification to at least one intermediary device of the set to configure the at least one intermediary device to allow the activity or prevent the activity.
    Type: Application
    Filed: December 10, 2020
    Publication date: May 5, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Gourish K Biradar, Kasirao Velugu, Vamshi Raghav, Ratnesh Singh Thakur, Rama Rao Katta, Srinivasa Reddy Kasu, Kapil Jaisinghani, Satyendra Tiwari
  • Publication number: 20220131813
    Abstract: Described embodiments provide systems and methods performing header protection. A device can receive from a client, a request relating to a first resource, for a second resource. The device can determine, using an identifier for the session, whether an address of the first resource has been previously accessed by the client during the session. The device can verify, using an address of the second resource, whether the address of the second resource is mapped to the address of the first resource for the session between the client and the device. The device can determine whether to provide access to the second resource responsive to the address of the first resource being previously accessed by the client during the session and the address of the second resource being mapped to the address of the first resource for the session.
    Type: Application
    Filed: October 28, 2020
    Publication date: April 28, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Publication number: 20220116481
    Abstract: Systems and methods for autonomous program management include a device which may transmit data to a client in response to a first request from the client. The data may include a response to the first request and a copy of data available to the device corresponding to the first request or the client. The device may receive a second request including the copy of data from the client. The device may determine that the second request is from an autonomous program rather than a user of the client based on the copy of data from the second request. The device may block at least one subsequent request from the client in response to the determination that the second request is from an autonomous program.
    Type: Application
    Filed: November 24, 2020
    Publication date: April 14, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Rama Rao Katta, Kasirao Velugu
  • Publication number: 20220103587
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Thirumoorthi Thangamani, Ganesh Kathiresan
  • Publication number: 20220038447
    Abstract: Systems and methods for autonomous program management include a device which may receive a first request from a client for a server. The device may transmit one or more data packets to the client. The data packet(s) may include a response to the request from the server and an attribute collector script which executes on the client to automatically transmit one or more attributes corresponding to at least one of the client or a browser of the client to the device. The device may receive a second request from the client which includes one or more attributes collected using the attribute collector script. The device may determine whether the client is associated with an autonomous program using the attribute(s). The device may block one or more subsequent requests from the client to the server responsive to determining that the client is associated with an autonomous program.
    Type: Application
    Filed: July 31, 2020
    Publication date: February 3, 2022
    Inventors: Rakesh Kumar Thangellapalli, Rama Rao Katta, Kasirao Velugu, Praveen Dandin, Aman Agrawal, Seth K. Keith, Ratnesh Singh Thakur, Josephine Suganthi Joseph Leo
  • Publication number: 20210350277
    Abstract: A computer system is provided. The computer system includes a memory, a network interface, and a processor coupled to the memory and the network interface. The processor is configured to receive a response to a request to verify whether an ostensible client of a service is actually a client or a bot, the response including an indicator of whether the ostensible client is a client or a bot; receive information descriptive of interoperations between the ostensible client and the service that are indicative of whether the ostensible client is a client or a bot; and train a plurality of machine learning classifiers using the information and the indicator to generate a next generation of the plurality of machine learning classifiers.
    Type: Application
    Filed: June 19, 2020
    Publication date: November 11, 2021
    Inventors: Aman Agrawal, Josephine Suganthi Joseph Leo, Kasirao Velugu, Praveen Dandin, Rama Rao Katta, Ratnesh Singh Thakur, Seth Kenneth Keith, Rakesh Thangellapalli
  • Publication number: 20210281605
    Abstract: Described embodiments provide systems and methods for detecting autonomous programs is provided. A device, intermediary to a plurality of clients and a plurality of servers, can receive a first request from a first client of the plurality of clients to a server of the plurality of servers via a connection between the device and the first client. The device can include, into a response from the server to the first client, a uniform resource locator (URL) comprising one or more randomly generated characters within a predetermined character space. The device can determine that the first client has an autonomous program responsive to receiving a second request from the first client using the URL. The device can terminate, responsive to the determination, the connection to the first client.
    Type: Application
    Filed: March 4, 2020
    Publication date: September 9, 2021
    Inventors: Rakesh Kumar THANGELLAPALLI, Rama Rao KATTA, Kasirao VELUGU, Praveen DANDIN, Aman AGRAWAL, Seth Kenneth KEITH, Ratnesh SINGH THAKUR, Josephine SUGANTHI JOSEPH LEO