US 11,991,177 B2
Node security with intermediate devices
Seth K. Keith, Scotts Valley, CA (US); Saravanakumar Annamalaisami, Pleasanton, CA (US); Krishna Khanal, San Jose, CA (US); and Ratnesh Singh Thakur, San Jose, CA (US)
Filed by Citrix Systems, Inc., Fort Lauderdale, FL (US)
Filed on Jun. 7, 2021, as Appl. No. 17/340,494.
Prior Publication US 2022/0394034 A1, Dec. 8, 2022
Int. Cl. H04L 29/06 (2006.01); G06F 9/54 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/10 (2013.01) [G06F 9/547 (2013.01); H04L 63/1408 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, by a device intermediary to a client and a server, a message from the client with a plurality of fields to execute one or more routines on the server remote from the client;
identifying, by the device, duplicate fields in the plurality of fields of the message from the client that, upon execution, reduce server performance;
modifying, by the device instead of the server, the plurality of fields of the message to improve the server performance based at least on the identification of the duplicate fields; and
forwarding, by the device, the modified message to the server.