Movatterモバイル変換


[0]ホーム

URL:


US20230048038A1 - Systems and methods for traffic accounting for saas usage - Google Patents

Systems and methods for traffic accounting for saas usage
Download PDF

Info

Publication number
US20230048038A1
US20230048038A1US17/955,475US202217955475AUS2023048038A1US 20230048038 A1US20230048038 A1US 20230048038A1US 202217955475 AUS202217955475 AUS 202217955475AUS 2023048038 A1US2023048038 A1US 2023048038A1
Authority
US
United States
Prior art keywords
enterprise
application
data
server
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/955,475
Inventor
Abhishek Chauhan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citrix Systems Inc
Original Assignee
Citrix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citrix Systems IncfiledCriticalCitrix Systems Inc
Priority to US17/955,475priorityCriticalpatent/US20230048038A1/en
Assigned to CITRIX SYSTEMS, INC.reassignmentCITRIX SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CHAUHAN, ABHISHEK
Publication of US20230048038A1publicationCriticalpatent/US20230048038A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A client application installed on a client device may monitor communications flows between embedded browsers of the client application and one or more servers, including enterprise servers and non-enterprise servers, at upper layers of a network stack of the client device including the application layer, session layer, and presentation layer. Communications to different endpoints may be classified as enterprise or non-enterprise, measured, and aggregated to provide disambiguation of enterprise and non-enterprise communications of the device transiting a single communications link (e.g. cellular data connection). Server and network policies may be applied in accordance with the measurements with higher accuracy than policies based on total bandwidth utilized by the device without regard to its classification. These policies may include load balancing, communication pooling, multiplexing, buffering, pre-fetching or edge caching of data, instantiating or halting execution of virtual machines in a cloud environment, or other such functions.

Description

Claims (20)

We claim:
1. A method comprising:
monitoring, by a usage monitor of a client device configured for both enterprise and non-enterprise communications, data in a traffic flow comprising both enterprise and non-enterprise communications, the usage monitor configured to distinguish between enterprise and non-enterprise communications of a traffic flow;
tracking, by the client device based at least on metadata of a first plurality of plackets of the traffic flow providing enterprise communications, a first amount of data of enterprise communications over a first time period, the first amount of data being encrypted and communication to a server of the enterprise via a first connection;
tracking, by the client device based at least on metadata of a second plurality of plackets of the traffic flow providing non-enterprise communications, a second amount of data of non-enterprise communications over the first time period, the second amount of data being communicated to a non-enterprise server; and
communicating, by the client device to another server of the enterprise, identification of the first amount of the data and the second amount of the data, the first amount of the data and the second amount of the data determined using the metadata of the first plurality of packets and the second plurality of packets of the traffic flow.
2. The method ofclaim 1, further comprising establishing, by a client application on the client device, communications between the client device and the server of the enterprise via the first connection.
3. The method ofclaim 2, further comprising establishing, by a browser of the client application via the first connection, one or more sessions with one or more applications on one or more non-enterprise servers.
4. The method ofclaim 1, wherein the second amount of data being encrypted to the server of the enterprise via the first connection and redirected by the server of the enterprise via a second connection to the non-enterprise server.
5. The method ofclaim 1, further comprising communicating, by the client device, the identification of the first amount of the data and the second amount of the data to the another server of the enterprise via a third connection.
6. The method ofclaim 1, further comprising communicating a name or type of application being used in the first amount of data.
7. The method ofclaim 1, further comprising communicating a name or type of application being used in the second amount of data.
8. A client device comprising:
a usage monitor configured for both enterprise and non-enterprise communication and to monitor data in a traffic flow comprising both enterprise and non-enterprise communications, the usage monitor configured to distinguish between enterprise and non-enterprise communications of a traffic flow;
wherein the client device is configured to:
track, based at least on metadata of a first plurality of plackets of the traffic flow providing enterprise communications, a first amount of data of enterprise communications over a first time period, the first amount of data being encrypted and communication to a server of the enterprise via a first connection;
track, based at least on metadata of a second plurality of plackets of the traffic flow providing non-enterprise communications, a second amount of data of non-enterprise communications over the first time period, the second amount of data being communicated to a non-enterprise server; and
communicate to another server of the enterprise, identification of the first amount of the data and the second amount of the data, the first amount of the data and the second amount of the data determined using the metadata of the first plurality of packets and the second plurality of packets of the traffic flow.
9. The client device ofclaim 8, further comprising a client application configured to establish communications between the client device and the server of the enterprise via the first connection.
10. The client device ofclaim 9, further comprising a browser of the client application configured to establish via the first connection, one or more sessions with one or more applications on one or more non-enterprise servers.
11. The client device ofclaim 8, wherein the second amount of data being encrypted to the server of the enterprise via the first connection and redirected by the server of the enterprise via a second connection to the non-enterprise server.
12. The client device ofclaim 8, further configured to communicate the identification of the first amount of the data and the second amount of the data to the another server of the enterprise via a third connection.
13. The client device ofclaim 8, further configured to communicate a name or type of application being used in the first amount of data.
14. The client device ofclaim 8, further configured to communicate a name or type of application being used in the second amount of data.
15. A non-transitory computer readable medium storing program instructions for causing one or more processors to:
monitor, using a usage monitor configured for both enterprise and non-enterprise communications, data in a traffic flow comprising both enterprise and non-enterprise communications, the usage monitor configured to distinguish between enterprise and non-enterprise communications of a traffic flow;
track, based at least on metadata of a first plurality of plackets of the traffic flow providing enterprise communications, a first amount of data of enterprise communications over a first time period, the first amount of data being encrypted and communication to a server of the enterprise via a first connection;
track, based at least on metadata of a second plurality of plackets of the traffic flow providing non-enterprise communications, a second amount of data of non-enterprise communications over the first time period, the second amount of data being communicated to a non-enterprise server; and
communicate to another server of the enterprise, identification of the first amount of the data and the second amount of the data, the first amount of the data and the second amount of the data determined using the metadata of the first plurality of packets and the second plurality of packets of the traffic flow.
16. The non-transitory computer readable medium ofclaim 15, wherein the program instructions further cause the one or more processors to establish communications between the client device and the server of the enterprise via the first connection.
17. The non-transitory computer readable medium ofclaim 15, wherein the second amount of data being encrypted to the server of the enterprise via the first connection and redirected by the server of the enterprise via a second connection to the non-enterprise server.
18. The non-transitory computer readable medium ofclaim 15, wherein the program instructions further cause the one or more processors to communicate the identification of the first amount of the data and the second amount of the data to the another server of the enterprise via a third connection.
19. The non-transitory computer readable medium ofclaim 15, wherein the program instructions further cause the one or more processors to communicate a name or type of application being used in the first amount of data.
20. The non-transitory computer readable medium ofclaim 15, wherein the program instructions further cause the one or more processors to communicate a name or type of application being used in the second amount of data
US17/955,4752018-11-132022-09-28Systems and methods for traffic accounting for saas usageAbandonedUS20230048038A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/955,475US20230048038A1 (en)2018-11-132022-09-28Systems and methods for traffic accounting for saas usage

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US16/188,454US11469979B2 (en)2018-11-132018-11-13Systems and methods for traffic accounting for SaaS usage
US17/955,475US20230048038A1 (en)2018-11-132022-09-28Systems and methods for traffic accounting for saas usage

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/188,454ContinuationUS11469979B2 (en)2018-11-132018-11-13Systems and methods for traffic accounting for SaaS usage

Publications (1)

Publication NumberPublication Date
US20230048038A1true US20230048038A1 (en)2023-02-16

Family

ID=70550881

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US16/188,454Active2038-11-29US11469979B2 (en)2018-11-132018-11-13Systems and methods for traffic accounting for SaaS usage
US17/955,475AbandonedUS20230048038A1 (en)2018-11-132022-09-28Systems and methods for traffic accounting for saas usage

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US16/188,454Active2038-11-29US11469979B2 (en)2018-11-132018-11-13Systems and methods for traffic accounting for SaaS usage

Country Status (1)

CountryLink
US (2)US11469979B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20240250960A1 (en)*2023-01-192024-07-25Zscaler, Inc.Access Key Abuse Detection

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11140190B2 (en)2018-10-232021-10-05Forcepoint, LLCAutomated user module assessment
US11048611B2 (en)*2018-11-292021-06-29Forcepoint, LLCWeb extension JavaScript execution control by service/daemon
US10798183B2 (en)*2018-12-132020-10-06Sap SeTunneling protcol and gateway for distributed computing environments
US11132973B2 (en)2019-02-012021-09-28Forcepoint, LLCSystem for capturing images from applications rendering video to a native platform with a graphics rendering library
US11343292B2 (en)*2019-11-292022-05-24Ricoh Company, Ltd.Information processing apparatus, information processing system, and remote sharing method
US11190493B2 (en)*2019-12-162021-11-30Vmware, Inc.Concealing internal applications that are accessed over a network
US11431743B2 (en)2020-02-032022-08-30Forcepoint, LLCCross domain dynamic data protection intermediary message transform platform
US12335132B2 (en)*2020-05-152025-06-17Equinix, Inc.Virtual gateways in a cloud exchange
US12003623B2 (en)*2020-12-182024-06-04Dell Products, L.P.Multilayer encryption for user privacy compliance and corporate confidentiality
EP4309062A1 (en)*2021-04-222024-01-24Talon Cyber Security Ltd.Cybersecurity system
US11601363B2 (en)*2021-05-142023-03-07Comcast Cable Communications, LlcIntelligent internet traffic routing
CN113630383B (en)*2021-07-082023-03-28杨妍茜Edge cloud cooperation method and device
US12169577B2 (en)*2022-10-262024-12-17Salesforce, Inc.Securely executing client code in a shared infrastructure

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120084184A1 (en)*2008-06-052012-04-05Raleigh Gregory GEnterprise Access Control and Accounting Allocation for Access Networks
US20160072904A1 (en)*2014-09-052016-03-10Openpeak Inc.Method and system for enabling data usage accounting for unreliable transport communication

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8266266B2 (en)*1998-12-082012-09-11Nomadix, Inc.Systems and methods for providing dynamic network authorization, authentication and accounting
US8775631B2 (en)*2012-07-132014-07-08Seven Networks, Inc.Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120084184A1 (en)*2008-06-052012-04-05Raleigh Gregory GEnterprise Access Control and Accounting Allocation for Access Networks
US20160072904A1 (en)*2014-09-052016-03-10Openpeak Inc.Method and system for enabling data usage accounting for unreliable transport communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20240250960A1 (en)*2023-01-192024-07-25Zscaler, Inc.Access Key Abuse Detection
US12341789B2 (en)*2023-01-192025-06-24Zscaler, Inc.Access key abuse detection

Also Published As

Publication numberPublication date
US20200153719A1 (en)2020-05-14
US11469979B2 (en)2022-10-11

Similar Documents

PublicationPublication DateTitle
US12028338B2 (en)Systems and methods for secure SAAS redirection from native applications
US20230048038A1 (en)Systems and methods for traffic accounting for saas usage
US11558484B2 (en)Systems and methods for secure peer-to-peer caching
US10862998B2 (en)Systems and methods for managing downloads from an embedded browser
US11647025B2 (en)Systems and methods for continuous authentication
AU2019339453B2 (en)Systems and methods for integrated service discovery for network applications
US20220046044A1 (en)Systems and methods for an embedded browser
US20200099738A1 (en)Systems and methods for bridge protocol between diverse applications
US20220121333A1 (en)Systems and methods for live tiles for saas
US20210397397A1 (en)Systems and methods for saas application presentation mode on multiple displays
US11228583B2 (en)Systems and methods for slogan based sharing of living SaaS objects

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CITRIX SYSTEMS, INC., FLORIDA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHAUHAN, ABHISHEK;REEL/FRAME:061248/0830

Effective date:20181206

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp