Citrix Systems, Inc.
SERVER FOR DETECTING A PROXY DEVICE IN A COMMUNICATIONS PATH AND RELATED METHODS

Last updated:

Abstract:

A computing device may include a processor and a memory. The processor may be configured to provide an encrypted second portion of a key to a client device in response to a match between data decrypted from an encrypted first portion of the key and a first portion of the key, the match being indicative of an absence of a proxy device. The processor may be configured to detect a loss in connectivity between the computing device and the client device based upon a mismatch between a decrypted second portion of the key and a second portion of the key, the mismatch being indicative of the proxy device.

Status:
Application
Type:

Utility

Filling date:

14 Apr 2021

Issue date:

29 Jul 2021