Systems and methods for continuing an operation interrupted from a reconnection between a client and server
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-012/16
G06F-015/18
출원번호
US-0157315
(2005-06-20)
등록번호
US-7340772
(2008-03-04)
발명자
/ 주소
Panasyuk,Anatoliy
Kramer,Andre
Pedersen,Bradley Jay
Stone,David Sean
Treder,Terry
출원인 / 주소
Citrix Systems, Inc.
대리인 / 주소
Choate, Hall & Stewart, LLP
인용정보
피인용 횟수 :
161인용 특허 :
185
초록▼
The invention relates to methods and systems for reconnecting a client and providing user authentication across a reliable and persistent communication session. A first protocol that encapsulates a plurality of secondary protocols is used to communicate over a network. A first protocol service, usin
The invention relates to methods and systems for reconnecting a client and providing user authentication across a reliable and persistent communication session. A first protocol that encapsulates a plurality of secondary protocols is used to communicate over a network. A first protocol service, using the first protocol, provides session persistence and a reliable connection between a client and a server. An operation may be executed or transacted between the client and the server. When there is a disruption in the network connection between the client and the server that interrupts the operation, the connection is automatically reestablished and the operation is continued.
대표청구항▼
What is claimed is: 1. A method for continuing an interrupted operation between a client and a server, the method comprising the steps of: (a) providing, by a first protocol service, a first connection between a client and the first protocol service, and a second connection between the first protoc
What is claimed is: 1. A method for continuing an interrupted operation between a client and a server, the method comprising the steps of: (a) providing, by a first protocol service, a first connection between a client and the first protocol service, and a second connection between the first protocol service and a server; (b) initiating, by one of the client or the server, an operation between the client and the server via the first connection and the second connection, the operation comprising one or more network communications via a second protocol between the client and the server; (c) communicating, by the client, to the first protocol service via the second protocol encapsulated in a first protocol, and the first protocol service communicating to the server using the second protocol; (d) detecting, by the first protocol service, a disruption in the first connection that interrupts the operation prior to the last network communication of the operation being transacted between the client and the server; (e) while maintaining the second connection and a state of the operation, re-establishing, by one of the client or the first protocol service, the disrupted first connection via the first protocol; and (f) continuing, by one of the client or the first protocol service, to complete the operation via the second protocol. 2. The method of claim 1, further comprising communicating, by the client, to the server using a network identifier assigned by a computing device to the client, and the server communicating to the client using the network identifier. 3. The method of claim 1, comprising the first protocol service continuing to complete the operation by transmitting one or more second protocol packets to one of the client or the server. 4. The method of claim 2, wherein the computing device comprises one of the server, a network device, or a Dynamic Host Configuration Protocol server. 5. The method of claim 1, comprising maintaining, by at least one of the first protocol service or the server, the second connection via at least the second protocol used for the user session. 6. The method of claim 1, wherein the second protocol comprises a remote display protocol. 7. The method of claim 6, wherein the remote display protocol comprises one of an Independent Computing Architecture protocol or a Remote Desktop Protocol. 8. The method of claim 6, comprising the server executing an application program on behalf of the client, and transmitting display output generated by the application program to the client. 9. The method of claim 1, comprising encrypting the one or more network communications via the second protocol. 10. The method of claim 1, wherein step (e) further comprises re-establishing the disrupted first connection by using a ticket associated with the client. 11. The method of claim 10, wherein step (e) further comprises authenticating the client via the ticket to re-establish the disrupted first connection. 12. The method of claim 1, wherein the first protocol comprises an application-layer transport protocol. 13. The method of claim 1, wherein the first protocol service comprises one of a tunneling or an application-level proxy. 14. The method of claim 1, comprising re-establishing the disrupted first connection transparently to at least one of the following: a transport driver interface and at least a presentation layer of a network communication stack, the second protocol, a user of the client, and an application executing on the client. 15. The method of claim 1, comprising re-establishing the disrupted first connection without one of manipulating a transport driver interface or intercepting a communication at the transport driver interface. 16. The method of claim 1, comprising re-establishing the disrupted first connection transparently to an application of the client by a client agent corresponding to the application. 17. The method of claim 1, wherein the client is a non-mobile client. 18. A system for completing an interrupted operation between a client and a server, the system comprising: a means for providing a first connection between a client and the first protocol service, and a second connection between the first protocol service and a server; a means for initiating by one of the client or the server an operation between the client and the server via the first connection and the second connection, the operation comprising one or more network communications via a second protocol between the client and the server; a means for communicating, by the client, to the first protocol service via the second protocol encapsulated in a first protocol, and the first protocol service communicating to the server using the second protocol; a means for detecting a disruption in the first connection that interrupts the operation prior to the last network communication of the operation being transacted between the client and the server; a means for re-establishing the disrupted first connection via the first protocol while maintaining the second connection and a state of the operation; and a means for continuing to complete the operation via the second protocol. 19. The system of claim 18, comprising a means for communicating, by the client, to the server using a network identifier assigned by a computing device to the client, and the server communicating to the client using the network identifier. 20. The system of claim 18, comprising a means for the first protocol service to continue to complete the operation by transmitting one or more second protocol packets to one of the client or the server. 21. The system of claim 19, wherein the computing device comprises one of the sever, a network device, or a Dynamic Host Configuration Protocol server. 22. The system of claim 18, comprising a means for maintaining the second connection via at least the second protocol used for the user session. 23. The system of claim 18, wherein the second protocol comprises a remote display protocol. 24. The system of claim 23, wherein the remote display protocol comprises one of an Independent Computing Architecture protocol or a Remote Desktop Protocol. 25. The system of claim 18, comprising a means for the server to execute an application program on behalf of the client, and transmit display output generated by the application program to the client. 26. The system of claim 18, comprising a means for encrypting the one or more network communications via the second protocol. 27. The system of claim 18, comprising a means for re-establishing the disrupted first connection by using a ticket associated with the client. 28. The system of claim 27, comprising a means for authenticating the client via the ticket to re-establish the disrupted first connection. 29. The system of claim 18, wherein the first protocol comprises an application-layer transport protocol. 30. The system of claim 18, wherein the first protocol service comprises one of a tunneling or an application-level proxy. 31. The system of claim 18, comprising a means for re-establishing the disrupted first connection transparently to at least one of the following: a transport driver interface and at least a presentation layer of a network communication stack, the second protocol, a user of the client, and an application executing on the client. 32. The system of claim 18, comprising a means for re-establishing the disrupted first connection without one of manipulating a transport driver interface or intercepting a communication at the transport driver interface. 33. The system of claim 18, comprising a means for re-establishing the disrupted first connection transparently to an application of the client by a client agent corresponding to the application. 34. The system of claim 18, wherein the client is a non-mobile client.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (185)
Barzilai Tsipora P. (Millwood NY) Bird Raymond F. (Durham NC) Gray James P. (Chapel Hill NC) Kadaba Bharath K. (Peekskill NY) Kalmbach ; Jr. James B. (Raleigh NC) Knauth Jeffrey G. (Raleigh NC) Pozef, Adaptive session-level pacing.
Bhatia Rajiv ; Stypko Gregory H. ; Zhang Siuling C., Apparatus and methods for use therein for an ISDN LAN modem that displays fault information to local hosts through interception of host DNS request messages.
Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
Gordon, Barry; Baranoff, Keith Andrew; Davies, Keith; Hollows, Robin L., Autonomously established secure and persistent internet connection and autonomously reestablished without user intervention that connection if it lost.
Harwood Jonathan P. ; Kimmeth Thomas ; Nusbaum Kurt, Bifurcated transaction system in which nonsensitive information is exchanged using a public network connection and sensitive information is exchanged after automatically configuring a private network.
Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
Regnier Barbara Ann (Mazeppa MN) Youngers David Nicholas (Rochester MN), Client/server computer systems having control of client-based application programs, and application-program control mean.
Demery David A.,NLX ; Zijderhand Frans,NLX ; Mulder Edwin W.,NLX, Communication system for use with stationary and second entities, via a wireless intermediate network with gateway devic.
Bird Raymond F. (Durham NC) Britton Kathryn H. (Chapel Hill NC) Chung Tein-Yaw D. (Cary NC) Edwards Allan K. (Raleigh NC) Mathew Johny (Chapel Hill NC) Pozefsky Diane P. (Chapel Hill NC) Sarkar Soumi, Compensation for mismatched transport protocols in a data communications network.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
Prestas, Gregory; DeWilde, Mark A.; Goldner, Jeffrey S.; Kelleher, Terence M.; Khezri, Said Rahmani, Creating virtual private connections between end points across a SAN.
Henderson Kenneth R. (Sarasota FL) Koski Robert E. (Sarasota FL) Barlow Christopher R. (Sarasota FL), Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and co.
Bauer Eric (Freehold NJ) Schaffer Russel W. (Ocean Grove NJ), Dynamic binding of network identities to locally-meaningful identities in computer networks.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Carter Matthew ; Costantini Frank ; Kleidermacher Moishe ; McGrogan Ellwood ; Paraggio Ronald, Encryption and authentication methods and apparatus for securing telephone communications.
Peter David Niblett GB; Karen Louise Randell GB, Gateway for converting synchronous client/server protocols into asynchronous messaging protocols and storing session state information at the client.
Wrabetz Joan M. (New Hope MN) Mason ; Jr. D. Dean (Minnetonka MN) Gooderum Mark P. (Bloomington MN), Integrated remote execution system for a heterogenous computer network environment.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
John E. Parsons, Jr. ; Bradley J. Graziadio ; Oshoma Momoh, Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different com.
Kobayashi Naofumi,JPX ; Shikata Kiyotaka,JPX ; Sekihata Osamu,JPX, Means for maintaining connectable access points owing to movement of a mobile station between cells in a wireless LAN s.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Gleeson Bryan J. (Cupertino CA) Altmaier Paulette R. (Cupertino CA), Method and apparatus for connecting a node to a wireless network using a standard protocol.
Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
Hamilton Graham ; Kessler Peter B. ; Nisewanger Jeffrey D. ; Bishop Alan ; Pelegri-Llopart Eduardo, Method and apparatus for generically handling diverse protocol method calls in a client/server computer system.
McKay Douglas B. (Potomac MD) Morten Richard M. (Gaithersburg MD) Marsili Michael P. (Middletown MD), Method and apparatus for linking SNA terminals to an SNA host over a packet switched communications network.
Morten Richard M. (Gaithersburg MD) Smith Ted P. (Frederick MD), Method and apparatus for linking an SNA host to a remote SNA host over a packet switched communications network.
Grube Gary W. (Palatine IL) Markison Timothy W. (Austin TX) Rybicki Mathew A. (Austin TX), Method and apparatus for preventing unauthorized monitoring of wireless data transmissions.
Samadi Behrokh (22 Longview Dr. Holmdel NJ 07733) Sohraby Kazem A. (116 University Dr. Lincroft NJ 07738), Method and apparatus for providing continuation of a communication call across multiple networks.
Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
Watson Colin ; Herron Andrew M., Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a cl.
Bellare Mihir M. (New York NY) Rogaway Phillip W. (Austin TX), Method and apparatus for three-party entity authentication and key distribution using message authentication codes.
Gu, Ke-Qin; Chen, Tsung-Yen (Eric); Han, Ching-Chih (Jason); Lee, Kuo-Chun, Method and apparatus implemented in a firewall for communicating information between programs employing different protocols.
Ahlberg Bjorn G. D. (Falsterbo SEX) Falk Johan (Cary NC) Molne Anders (Cary NC), Method and apparatus of maintaining an open communications channel between a cellular terminal and an associated cellula.
Skopp Peter ; Vitale Benjamin F. ; Marur Vinod R. ; Tse Clifford S.C. ; Dulai Dharmender S., Method and apparatus to determine user identity and limit access to a communications network.
Stephen J. Purpura, Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment.
Hanif Mohammad ; Vierling Michael ; Yanagihara Kazuhisa, Method and system for enabling a file server to service multiple networks of the same network protocol family by invok.
Davidson Thomas J. (Austin TX) Kelley Michael T. (Austin TX), Method and system for implementing remote procedure calls in a distributed computer system.
Want Roy (Mountain View CA) Adams Norman I. (Sunnyvale CA) Goldstein Richard J. (San Francisco CA) Schilit William N. (Palo Alto CA) Tso Michael M. (Beaverton OR), Method and system for maintaining processing continuity to mobile computers in a wireless network.
Blakley ; III George R. (Austin TX) Hickerson L. Brooks (Austin TX) Milman Ivan M. (Austin TX) Gittins Robert S. (Woodland Park CO) Scheer Douglas B. (Boynton Beach FL) Wilson John H. (Austin TX), Method and system for providing a user access to multiple secured subsystems.
Seitz Gregory W. (San Jose CA) Findley Sean J. (Gilroy CA) Beisel Philipp W. (Sunnyvale CA), Method for connecting a mobile computer to a computer network by using an address server.
Obermanns Sebastian (Munich DEX) Schoonhoven Richard (Olching DEX), Method for maintaining virtual connections given an at least partial outage of connecting paths.
Ito Tsutomu (Kanagawa JPX) Hirosawa Toshio (Machida JPX) Ueoka Atsushi (Ome JPX) Kokunishi Motohide (Hachioji JPX) Yamagishi Tadashi (Yokohama JPX) Nakatsu Kouichi (Hadano JPX), Method of assisting server access by use of user authentication information held in one of servers and a method of assis.
Machin Richard C. ; Hyder Jameel, Method, system, and computer program product for creating a raw data channel form an integrating component to a series of kernel mode filters.
Derby Jeffrey H. (Chapel Hill NC) Doeringer Willibald A. (Langnau CHX) Dykeman Harold D. (Rueschlikon NC CHX) Li Liang (Chapel Hill NC) Sandick Haldon J. (Durham NC) Vu Ken V. (Cary NC), Methods and apparatus for interconnecting local area networks with wide area backbone networks.
Inoue Atsushi,JPX ; Ishiyama Masahiro,JPX ; Fukumoto Atsushi,JPX ; Tsuda Yoshiyuki,JPX ; Shimbo Atsushi,JPX ; Okamoto Toshio,JPX, Mobile computer and method of packet encryption and authentication in mobile computing based on security policy of visited network.
Inoue Atsushi,JPX ; Ishiyama Masahiro,JPX ; Fukumoto Atsushi,JPX ; Tsuda Yoshiyuki,JPX ; Shimbo Atsushi,JPX ; Okamoto Toshio,JPX, Mobile computing scheme using encryption and authentication processing based on mobile computer location and network operating policy.
Baker Murray C. (Toronto NY CAX) Bhattacharya Partha P. (Briarcliff Manor NY) Chen Jeane S.-C. (Ossining NY) Cheung Roger Y. M. (Scarborough NY CAX) Krishna Arvind (Briarcliff Manor NY) Reissner Pete, Mobility enabling access point architecture for wireless attachment to source routing networks.
Miner Richard A. (Cambridge MA) Warner William J. (Weston MA) Lovell Anthony M. (Somerville MA) Shienbrood Eric R. (Concord MA) Gabryelski Keith (Cambridge MA) Arnold Kenneth C. R. C. (Lexington MA) , Network based knowledgeable assistant.
Goldsmith Amy M. (Los Gatos CA) Goldsmith David B. (Los Gatos CA) Pettus Christopher E. (San Francisco CA), Object-oriented remote procedure call networking system.
Renouard Julia J. ; Piercy Alan ; Heckt Steve ; Savarese Joe, Providing reliable communication over an unreliable transport layer in a hand-held device using a persistent session.
Zheng, Qin; Willis, Steven R.; Kastenholz, Frank; Crawley, Eric, Quality of service facility in a device for performing IP forwarding and ATM switching.
Mousseau Gary P. (Waterloo CAX) Lazaridis Mihal (Waterloo CAX) Little Herb A. (Waterloo CAX) Barnstijn Michael A. (Waterloo CAX), Remote control of gateway functions in a wireless data communication network.
Sturniolo Emil A. ; Ciotti ; Jr. Frank D. ; Seshadri Krishna P., Seamless roaming among multiple networks including seamless transitioning between multiple devices.
Beall Christopher W. ; Motycka John D. ; Pendleton Samuel S. ; Terpening Brooke E. ; Appelbaum Matthew A. ; Neal Michael R., Search engine for remote access to database management systems.
Parsons ; Jr. John E. ; Graziadio Bradley J. ; Momoh Oshoma, Server operating system for supporting multiple client-server sessions and dynamic reconnection of users to previous sessions using different computers.
Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Lederer Jeffrey H. (Pittsburgh PA) Connell David J. (Coraopolis PA) Pagano Patrick V. (Pittsburgh PA), System and method for multiplexing data transmissions.
Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
Barber Jon H. (Santa Barbara CA) Woodward Ronald A. (Boulder CO) Burkley Richard M. (Boulder CO) Rehme Erwin L. (Longmont CO) Jackson Matthew W. (Boulder CO) Young Douglas M. (Boulder CO), System for controlling the number of concurrent copies of a program in a network based on the number of available licens.
Dawson William P. (Murray UT) Schiller Jay B. (Boulder CO) Schmelzer Richard A. (Boulder CO) Zigmond Daniel J. (Boulder CO), System for distributing video/audio files from central location to a plurality of cable headends.
Aiken, Jr.,John Andrew; Christensen,Alfred Bundgaard; Devine,Wesley McMillan; Herr,David Anthony; McClintock,Mark W., System having a single IP address associated with communication protocol stacks in a cluster of processing systems.
Miller John A. (Wilmette IL) Cleven David R. (Algonquin IL) Wall Robert J. (Highland Park IL), User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the f.
Baldwin John H. (Morristown NJ) Chu Helen (New York NY) Doshi Bharat T. (Holmdel NJ) Dravida Subrahmanyam (Somerset NJ) Nanda Sanjiv (Plainsboro NJ) Treventi Philip A. (Murray Hill NJ), Virtual circuit management in cellular telecommunications.
Narisi Anthony ; Kain Michael T. ; Salamon Gary ; Jennion Susan ; Coyne Lois B., Virtual transport layer interface and messaging subsystem for high-speed communications between heterogeneous computer systems.
Alfano Nicholas P.,CAX ; Wagner Kevin R. ; Upp Steve ; Lin Jyh-Han ; Sivakumaran Sreedhar, Wireless protocol method and apparatus supporting transaction requests with variable length responses.
Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley; Davis, III, Tom; Bloomfield, Marc, Apparatus and method for determining a program neighborhood for a client node in a client-server network.
Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, End user device that secures an association of application to service policy with an application certificate check.
Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Enterprise application store for an orchestration framework for connected devices.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Enterprise application store for an orchestration framework for connected devices.
Zawacki, Jennifer Greenwood; Perrin, Steven Richard; Rutledge, James Stephen; Roper, Matthew; Davis, Mark Charles; Kelso, Scott Edwards, Establishing a remote desktop.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand; James, Justin; Nguyen, Laurent An Minh, Method for child wireless device activation to subscriber account of a master wireless device.
Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices.
Qureshi, Waheed; McGinty, John M.; Andre, Olivier; Abdullah, Shafaq; DeBenning, Thomas H.; Datoo, Ahmed; Roach, Kelly Brian, Secure container for protecting enterprise data on a mobile device.
Qureshi, Waheed; DeBenning, Thomas H.; Datoo, Ahmed; Andre, Olivier; Abdullah, Shafaq; McGinty, John M.; Roach, Kelly Brian, Secure execution of enterprise applications on mobile devices.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Single sign-on access in an orchestration framework for connected devices.
Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for adjusting the maximum transmission unit for encrypted communications.
Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications.
Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with wireless modem power state control policy for background applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.