Citrix Systems, Inc.
SERVER FOR DETECTING A PROXY DEVICE IN A COMMUNICATIONS PATH AND RELATED METHODS
Last updated:
Abstract:
A computing device may include a processor and a memory. The processor may be configured to provide an encrypted second portion of a key to a client device in response to a match between data decrypted from an encrypted first portion of the key and a first portion of the key, the match being indicative of an absence of a proxy device. The processor may be configured to detect a loss in connectivity between the computing device and the client device based upon a mismatch between a decrypted second portion of the key and a second portion of the key, the mismatch being indicative of the proxy device.
Status:
Application
Type:
Utility
Filling date:
14 Apr 2021
Issue date:
29 Jul 2021