Patents by Inventor SANTHOSH KRISHNAMURTHY

SANTHOSH KRISHNAMURTHY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140330891
    Abstract: In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first pre-determined threshold value, and, when the data flow rate exceeds the first pre-determined threshold value, creating one or more new processing threads associated with the proxy.
    Type: Application
    Filed: September 13, 2013
    Publication date: November 6, 2014
    Inventors: KHADER BASHA P.R., SANTHOSH KRISHNAMURTHY, RAGHUNANDAN HANUMANTHARAYAPPA
  • Publication number: 20140331054
    Abstract: In particular embodiments, a method includes receiving a request for a signature verification. In response to the request, signature data is encrypted. A first data size associated with the signature data is determined. A second data size associated with data of a data packet is determined. The method includes comparing the sum of the first data size and the second data size to a pre-determined data size. When the sum is less than or equal to the pre-determined data size, the encrypted signature data is included in the data packet; and the data packet is transmitted over a network.
    Type: Application
    Filed: September 13, 2013
    Publication date: November 6, 2014
    Inventors: RAGHUNANDAN HANUMANTHARAYAPPA, KHADER BASHA P.R., SANTHOSH KRISHNAMURTHY
  • Publication number: 20140331046
    Abstract: In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop connection request. A first connection with a server is initiated via the network gateway using a first communication protocol. A plurality of cryptographic contexts are exchanged with the server. A token encrypted using one of the plurality of cryptographic contexts is received from the server. The token is sent from a client device to the server or a proxy to authenticate the client device, and a second connection is initiated with the server, via the proxy, using a second communication protocol.
    Type: Application
    Filed: September 13, 2013
    Publication date: November 6, 2014
    Inventors: SANTHOSH KRISHNAMURTHY, RAGHUNANDAN HANUMANTHARAYAPPA, KHADER BASHA P.R.