Virtual desktop accelerator with support for dynamic proxy thread management
First Claim
Patent Images
1. A system comprising:
- one or more processors; and
a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to;
establish and maintain a second remote connection associated with a remote desktop protocol session between a client and a server using a second communication protocol that is different from a first communication protocol used by the server to establish a first remote connection with the client, wherein the second communication protocol supports a remote desktop session;
dynamically select a cryptographic context to use to encrypt a data packet of a data flow between the client and the server, wherein a first cryptographic context is used to encrypt or decrypt a first data packet of the data packet during a first point in time during the remote desktop protocol session and a second cryptographic context is used to encrypt or decrypt a second data packet of the data packet during a second point in time during the remote desktop protocol session;
determine one or more active remote connections, wherein the one or more active remote connections comprises the second remote connection;
determine a data flow rate of the one or more active remote connections at a proxy;
compare the data flow rate to a first pre-determined threshold value; and
when the data flow rate exceeds the first pre-determined threshold value, create one or more new processing threads associated with the proxy.
14 Assignments
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes determining a data flow rate of the active connections at a proxy, comparing the data flow rate to a first pre-determined threshold value, and, when the data flow rate exceeds the first pre-determined threshold value, creating one or more new processing threads associated with the proxy.
-
Citations
20 Claims
-
1. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; establish and maintain a second remote connection associated with a remote desktop protocol session between a client and a server using a second communication protocol that is different from a first communication protocol used by the server to establish a first remote connection with the client, wherein the second communication protocol supports a remote desktop session; dynamically select a cryptographic context to use to encrypt a data packet of a data flow between the client and the server, wherein a first cryptographic context is used to encrypt or decrypt a first data packet of the data packet during a first point in time during the remote desktop protocol session and a second cryptographic context is used to encrypt or decrypt a second data packet of the data packet during a second point in time during the remote desktop protocol session; determine one or more active remote connections, wherein the one or more active remote connections comprises the second remote connection; determine a data flow rate of the one or more active remote connections at a proxy; compare the data flow rate to a first pre-determined threshold value; and when the data flow rate exceeds the first pre-determined threshold value, create one or more new processing threads associated with the proxy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
establish and maintain a second remote connection associated with a remote desktop protocol session between a client and a server using a second communication protocol that is different from a first communication protocol used by the server to establish a first remote connection with the client, wherein the second communication protocol supports a remote desktop session; dynamically select a cryptographic context to use to encrypt a data packet of a data flow between the client and the server, wherein a first cryptographic context is used to encrypt or decrypt a first data packet of the data packet during a first point in time during the remote desktop protocol session and a second cryptographic context is used to encrypt or decrypt a second data packet of the data packet during a second point in time during the remote desktop protocol session; determine one or more active remote connections, wherein the one or more active remote connections comprises the second remote connection; determine a data flow rate of the one or more active remote connections at a proxy; compare the data flow rate to a first pre-determined threshold value; and when the data flow rate exceeds the first pre-determined threshold value, create one or more new processing threads associated with the proxy. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
establishing and maintaining a second remote connection associated with a remote desktop protocol session between a client and a server using a second communication protocol that is different from a first communication protocol used by the server to establish a first remote connection with the client, wherein the second communication protocol supports a remote desktop session; dynamically selecting a cryptographic context to use to encrypt a data packet of a data flow between the client and the server, wherein a first cryptographic context is used to encrypt or decrypt a first data packet of the data packet during a first point in time during the remote desktop protocol session and a second cryptographic context is used to encrypt or decrypt a second data packet of the data packet during a second point in time during the remote desktop protocol session; determining one or more active remote connections, wherein the one or more active remote connections comprises the second remote connection; determining a data flow rate of the one or more active remote connections at a proxy; comparing the data flow rate to a first pre-determined threshold value; and when the data flow rate exceeds the first pre-determined threshold value, creating one or more new processing threads associated with the proxy. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification