Patents by Inventor RAGHUNANDAN HANUMANTHARAYAPPA

RAGHUNANDAN HANUMANTHARAYAPPA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9660961
    Abstract: In particular embodiments, a method includes receiving a request for a signature verification. In response to the request, signature data is encrypted. A first data size associated with the signature data is determined. A second data size associated with data of a data packet is determined. The method includes comparing the sum of the first data size and the second data size to a pre-determined data size. When the sum is less than or equal to the pre-determined data size, the encrypted signature data is included in the data packet; and the data packet is transmitted over a network.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: May 23, 2017
    Assignee: Dell Products L.P.
    Inventors: Raghunandan Hanumantharayappa, Khader Basha P.R., SAnthosh Krishnamurthy
  • Patent number: 9553847
    Abstract: In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop connection request. A first connection with a server is initiated via the network gateway using a first communication protocol. A plurality of cryptographic contexts are exchanged with the server. A token encrypted using one of the plurality of cryptographic contexts is received from the server. The token is sent from a client device to the server or a proxy to authenticate the client device, and a second connection is initiated with the server, via the proxy, using a second communication protocol.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: January 24, 2017
    Assignee: Dell Products L.P.
    Inventors: Santhosh Krishnamurthy, Raghunandan Hanumantharayappa, Khader Basha P.R.
  • Patent number: 9552203
    Abstract: In one embodiment, during runtime use of a configurable application that is used by multiple service requesters, a configuration dependency manager is integrated in the configurable application to check a set of features for one of the service requesters. The method receives a service requester configuration for the set of features. A configuration dependency manager determines a set of dependencies for the set of features that have been configured by the service requester configuration and determines a developer's configuration for a plurality of features for the configurable application. Then, the configuration dependency manager analyzes the set of dependencies with corresponding dependencies in the developer's configuration to determine when an issue exists with the service requester configuration and provides a visualization of the set of features based on the analyzing the set of dependencies, wherein the issue is shown on the visualization.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: January 24, 2017
    Assignee: SUCCESSFACTORS, INC.
    Inventors: Raghunandan Hanumantharayappa, Aditya Tewari, Anand Gokulchandran
  • Patent number: 9485220
    Abstract: In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first pre-determined threshold value, and, when the data flow rate exceeds the first pre-determined threshold value, creating one or more new processing threads associated with the proxy.
    Type: Grant
    Filed: March 3, 2016
    Date of Patent: November 1, 2016
    Assignee: Dell Products L.P.
    Inventors: Khader Basha P. R., Santhosh Krishnamurthy, Raghunandan Hanumantharayappa
  • Publication number: 20160191468
    Abstract: In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first pre-determined threshold value, and, when the data flow rate exceeds the first pre-determined threshold value, creating one or more new processing threads associated with the proxy.
    Type: Application
    Filed: March 3, 2016
    Publication date: June 30, 2016
    Inventors: Khader Basha P.R., Santhosh Krishnamurthy, Raghunandan Hanumantharayappa
  • Publication number: 20160156744
    Abstract: In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop connection request. A first connection with a server is initiated via the network gateway using a first communication protocol. A plurality of cryptographic contexts are exchanged with the server. A token encrypted using one of the plurality of cryptographic contexts is received from the server. The token is sent from a client device to the server or a proxy to authenticate the client device, and a second connection is initiated with the server, via the proxy, using a second communication protocol.
    Type: Application
    Filed: February 8, 2016
    Publication date: June 2, 2016
    Inventors: Santhosh Krishnamurthy, Raghunandan Hanumantharayappa, Khader Basha P.R.
  • Patent number: 9313297
    Abstract: In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first pre-determined threshold value, and, when the data flow rate exceeds the first pre-determined threshold value, creating one or more new processing threads associated with the proxy.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: April 12, 2016
    Assignee: Dell Products L.P.
    Inventors: Khader Basha P.R., Santhosh Krishnamurthy, Raghunandan Hanumantharayappa
  • Patent number: 9300762
    Abstract: In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop connection request. A first connection with a server is initiated via the network gateway using a first communication protocol. A plurality of cryptographic contexts are exchanged with the server. A token encrypted using one of the plurality of cryptographic contexts is received from the server. The token is sent from a client device to the server or a proxy to authenticate the client device, and a second connection is initiated with the server, via the proxy, using a second communication protocol.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: March 29, 2016
    Assignee: Dell Products L.P.
    Inventors: Santhosh Krishnamurthy, Raghunandan Hanumantharayappa, Khader Basha P. R.
  • Publication number: 20140331046
    Abstract: In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop connection request. A first connection with a server is initiated via the network gateway using a first communication protocol. A plurality of cryptographic contexts are exchanged with the server. A token encrypted using one of the plurality of cryptographic contexts is received from the server. The token is sent from a client device to the server or a proxy to authenticate the client device, and a second connection is initiated with the server, via the proxy, using a second communication protocol.
    Type: Application
    Filed: September 13, 2013
    Publication date: November 6, 2014
    Inventors: SANTHOSH KRISHNAMURTHY, RAGHUNANDAN HANUMANTHARAYAPPA, KHADER BASHA P.R.
  • Publication number: 20140330891
    Abstract: In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first pre-determined threshold value, and, when the data flow rate exceeds the first pre-determined threshold value, creating one or more new processing threads associated with the proxy.
    Type: Application
    Filed: September 13, 2013
    Publication date: November 6, 2014
    Inventors: KHADER BASHA P.R., SANTHOSH KRISHNAMURTHY, RAGHUNANDAN HANUMANTHARAYAPPA
  • Publication number: 20140331054
    Abstract: In particular embodiments, a method includes receiving a request for a signature verification. In response to the request, signature data is encrypted. A first data size associated with the signature data is determined. A second data size associated with data of a data packet is determined. The method includes comparing the sum of the first data size and the second data size to a pre-determined data size. When the sum is less than or equal to the pre-determined data size, the encrypted signature data is included in the data packet; and the data packet is transmitted over a network.
    Type: Application
    Filed: September 13, 2013
    Publication date: November 6, 2014
    Inventors: RAGHUNANDAN HANUMANTHARAYAPPA, KHADER BASHA P.R., SANTHOSH KRISHNAMURTHY