Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Zscaler Inc patents


Recent patent applications related to Zscaler Inc. Zscaler Inc is listed as an Agent/Assignee. Note: Zscaler Inc may have other listings under different names/spellings. We're not affiliated with Zscaler Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "Z" | Zscaler Inc-related inventors


Clientless connection setup for cloud-based virtual private access systems and methods

Virtual private access systems and methods implemented in a clientless manner on a user device include receiving a request to access resources from a web browser on the user device at an exporter in a cloud system, wherein the resources are located in one of a public cloud and an enterprise network and the user device is remote therefrom on the internet; performing a series of connections between the exporter and i) the web browser and ii) centralized components including a crypto service, database, cookie store, and security assertion markup language (saml) service provider (sp) component to authenticate a user of the user device for the resources; and, subsequent to authentication, exchanging data between the web browser and the resources through the exporter, wherein the exporter has a first secure tunnel to the web browser and a second secure tunnel to the resources.. . ... Zscaler Inc

Service driven split tunneling of mobile network traffic

Systems and methods implemented by an application executed on a mobile device for service driven split tunneling include receiving and configuring the application on the mobile device; responsive to a set of rules, opening one or more tunnels to one or more host concentrators in the cloud; and intercepting packets being transmitted from the mobile device and one of forwarding the packets over the one or more tunnels and forwarding the packets directly based on the set of rules.. . ... Zscaler Inc

Systems and methods for cloud-based service function chaining using security assertion markup language (saml) assertion

A cloud-based method of service function chaining using security assertion markup language (saml) assertions includes receiving configuration information related to any of users, services, and correspondence between the users and the services; responsive to a request from a user, generating a saml assertion for the request and attaching a stack of service tags with the saml assertion, wherein the stack of service tags defines a service chain for the user and for the request; and providing the saml assertion with the stack of service tags to the user in response to the request. The method can further include providing the saml assertion by the user to one or more services, wherein each of the services creates a context based on the stack of service tags. ... Zscaler Inc

Systems and methods for cloud based unified service discovery and secure availability

Systems and methods implemented by an application executed on a user device for service discovery and connectivity include discovering one or more cloud services for a user associated with the user device; creating and operating an interface on the user device; and intercepting traffic at the interface from one or more client applications on the user device and splitting the traffic based on configuration to the one or more cloud services. The method can further include authenticating the user into the one or more cloud services prior to the splitting.. ... Zscaler Inc

Distributed cloud-based security systems and methods

A distributed security method is implemented in a processing node of a distributed security system comprising one or more processing nodes and one or more authority nodes, wherein the distributed security system is located external to a network edge of an enterprise and external from one of a computer device and a mobile device associated with a user. The distributed security method includes monitoring a content item sent from or requested by an external system which is external from a network edge of the external system; and responsive to a security policy associated with the external system, performing one of allowing the content item through the processing node; precluding the content item at the processing node; and threat detecting the content item at the processing node and one of allowing or precluding the content item based on the threat detecting.. ... Zscaler Inc

Systems and methods for blocking targeted attacks using domain squatting

Systems and methods for identifying and addressing domains suspected as malicious domains used for targeted attacks in a cloud-based system include receiving valid domains; receiving an unidentified domain; comparing the unidentified domain to the valid domains to derive a distance calculation of the unidentified domain to each of the valid domains; determining whether the unidentified domain is a cybersquatting attempt of one of the valid domains based on the comparing; and, responsive to the determining the unidentified domain is a cybersquatting attempt, one of notifying an operator/user and blocking the unidentified domain in the cloud-based system.. . ... Zscaler Inc

Cloud-based malware detection

Systems, methods and apparatus for malware detection detect and stop the distribution of malware and other undesirable content before such content reaches computing systems. A cloud-based malware detection method includes receiving a signature from a computer, wherein the signature which identifies a file and the signature is smaller in size than the file; determining whether the file is trusted, untrusted, or unknown for malware based on the signature; and transmitting whether the file is trusted, untrusted, or unknown for malware to the computer based on the determining, wherein the computer is precluded from distribution of the file responsive to the file being untrusted.. ... Zscaler Inc

Systems and methods for improving https security

Systems and methods for hypertext transfer protocol (http) http strict transport (hsts), are implemented by one or more servers associated with a gateway in a cloud based proxy. A method includes managing a preloaded list of http security (https) support of a plurality of domains; receiving a domain request from an hsts application executed on a user device, wherein the hsts application is configured to detect the domain request from a browser or application executed on the user device; and transmitting a response to the user device with header information related to support of https the domain.. ... Zscaler Inc

Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups

Systems and method implemented through a distributed security system for determining and addressing risk of users, groups of users, locations, and/or companies include obtaining log data from the distributed security system; analyzing the log data to obtain a risk score for an entity associated with the distributed security system, wherein the entity comprises one of a user, a group of users, a location, and a company, and wherein the risk score is a weighted combination of pre-infection behavior, post-infection behavior, and suspicious behavior; performing one or more remedial actions for the entity; and subsequently obtaining updated log data and analyzing the updated log data to obtain an updated risk score to determine efficacy of the one or more remedial actions.. . ... Zscaler Inc

Cloud based systems and methods for determining security risks of users and groups

Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including users or groups of users associated with the cloud-based security system and optimizing remediation based thereon. The method includes maintaining logs of transactions through the cloud-based security system; obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions; performing empirical scoring on normalizing the plurality of attributes for ranking risky entities; identifying the risky entities based on one of the empirical scoring and analytics; and updating policies and/or monitoring in the cloud-based system based on the identifying. ... Zscaler Inc

Multidimensional risk profiling for network access control of mobile devices through a cloud based security system

Systems and methods implemented in a cloud node in a cloud based security system for network access control of a mobile device based on multidimensional risk profiling thereof include receiving posture data from the mobile device; determining a device fingerprint and a risk index of the mobile device based on the posture data; and, responsive to a request by the mobile device for network resources through the cloud based security system, performing a multidimensional risk analysis based on the device fingerprint and the risk index and allowing or denying the request based on the multidimensional risk analysis.. . ... Zscaler Inc

In-channel event processing for network agnostic mobile applications in cloud based security systems

Systems and methods in a mobile device communicatively coupled to a cloud based security system, the method for detecting and processing in-channel events associated with a network agnostic mobile application, the method includes intercepting outgoing data from the network agnostic mobile application at a tunnel interface on the mobile device; monitoring the outgoing data for network transactions from the network agnostic mobile application to maintain a context of the network transactions and intended responses for every request; transmitting the outgoing data from the tunnel interface to the cloud based security system; and receiving a response from the cloud based security system responsive to the outgoing data and processing any deviation from the intended responses.. . ... Zscaler Inc

Cloud based security using dns

A cloud-based security method using domain name system (dns) includes receiving a request from a user device at a dns server; performing a security check on the request based on a policy look up associated with the user device; responsive to the policy look up, performing a dns security check on the request; and responsive to the dns security check, performing one of allowing the request to the internet; blocking the request based on the policy; and providing the request to inline inspection based on the policy, wherein the request is one of allowed to the internet or blocked based on the inline inspection.. . ... Zscaler Inc

Systems and methods for cloud based unified service discovery and secure availability

Systems and methods implemented by a unified agent application executed on a mobile device, for unified service discovery and secure availability include authenticating a user into a plurality of cloud services including a proxy service and a virtual private network (vpn) service, wherein the proxy service is utilized for internet traffic and the vpn service is for intranet traffic; creating and operating a link local network at the mobile device with a virtual network interface and multiple listening sockets; and intercepting traffic at the virtual network interface from one or more client applications on the mobile device and splitting the traffic between the proxy service, the vpn service, and the internet based on a type of the traffic, a destination, and the one or more client applications.. . ... Zscaler Inc

08/03/17 / #20170223029

Content delivery network protection from malware and data leakage

Content delivery network (cdn) protection systems and methods, performed by a cloud node in a distributed security system include receiving traffic between one or more origin servers and the cdn; monitoring the traffic based on policy; detecting one or more of malware and data leakage in the traffic based on the policy; and blocking the traffic responsive to the detecting the one or more of the malware and the data leakage in the traffic, prior to the traffic entering the cdn.. . ... Zscaler Inc

08/03/17 / #20170223024

Client application based access control in cloud security systems for mobile devices

Systems and methods, implemented by one or more nodes in a cloud-based security system, for enforcing application-based control of network resources include receiving a request from a user device for the network resources; evaluating the request through the cloud-based security system and determining an application on the user device performing the request; and performing one of (1) denying the request if the application is unauthorized to access the network resources, (2) redirecting the request to an authorized application on the user device if the application is legitimate but unauthorized to access the network resources, and (3) allowing the request if the application is authorized to access the network resources.. . ... Zscaler Inc

05/18/17 / #20170142068

Multi-tenant cloud-based firewall systems and methods

A multi-tenant cloud-based firewall method from a client, performed by a cloud node, includes receiving a packet from the client, wherein the client is located externally from the cloud node; checking if a firewall session exists for the packet, and if so, processing the packet on a fast path where a lookup is performed to find the firewall session; if no firewall session exists, creating the firewall session; and processing the packet according to the firewall session and one or more rules. The cloud node can perform the method without a corresponding appliance or hardware on premises, at a location associated with the client, for providing a firewall.. ... Zscaler Inc

03/30/17 / #20170090760

Systems and methods for a memory model for sparsely updated statistics

Systems and methods for managing sparsely updated counters in memory include, for a given interval of time and n counters associated with the given interval, managing a first set of the n counters in a first level of storage in the memory, wherein the first level of storage utilizes a hash table to store a counter identifier and a value for each of the first set; and responsive to filling up the first level of storage for a given user in the given interval, managing the first set and a second set of the n counters in a second level of storage in the memory, wherein the set utilizes memory buckets to incrementally store the first set and the second set.. . ... Zscaler Inc

01/12/17 / #20170011079

Systems and methods for tracking and auditing changes in a multi-tenant cloud system

Systems and methods for tracking and auditing changes in one or more cloud-based systems include, at a web application, intercepting requests between one or more users and the web application associated with the one or more cloud-based systems and creating log messages based on the intercepted requests; at a log forwarder in the logging system, forwarding the log messages to a log indexer; at the log indexer in the logging system, receiving the forwarded log messages and indexing the forwarded log messages in a centralized storage; and, at the logging system, responsive to a query, forwarding responsive indexed data from the centralized storage, based on the query.. . ... Zscaler Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Zscaler Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Zscaler Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###