Patents by Inventor Srikanth Devarajan

Srikanth Devarajan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8458786
    Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. In an aspect, tunnel session data describing authentication and unauthenticated sessions, and location data describing tunnel identifiers for tunnels, locations, and security policies specific to the locations are accessed. Tunnel packets are received, and for each tunnel packet it is determined, from the tunnel identifier associated with the packet, whether a session entry in the session data exists for the tunnel identified by the tunnel identifier. In response to determining that a session entry does not exist in the session data, then a session entry is created for the tunnel identifier, an authentication process to determine a location to be associated with the session entry is performed, and an entry in the location data for the location is associated with the session entry.
    Type: Grant
    Filed: August 13, 2010
    Date of Patent: June 4, 2013
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Jose Raphel, Srikanth Devarajan
  • Patent number: 8429111
    Abstract: Methods, systems, and apparatus, including computer program products, for generating or using augmentation queries. In one aspect, statistical model of statistical data is used to support lossless predictive compression. Data instances are identified in statistical data and classified into one of a plurality of data types. Each data type is associated with a corresponding compression process that is used to compress data instances of that type.
    Type: Grant
    Filed: August 4, 2008
    Date of Patent: April 23, 2013
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul
  • Patent number: 8259571
    Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. A multi-tenant cloud-based security system that can distinguish between client computing devices with overlapping private IP addresses is disclosed. Client devices communicate through a processing node to which a tunnel is established. The processing node is able to detect the client devices and apply security policies to the device.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: September 4, 2012
    Assignee: Zscaler, Inc.
    Inventors: Jose Raphel, Kailash Kailash, Srikanth Devarajan
  • Patent number: 8185510
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.
    Type: Grant
    Filed: January 28, 2011
    Date of Patent: May 22, 2012
    Assignee: Zscaler, Inc.
    Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
  • Patent number: 8010085
    Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing nodes for a security service is facilitate by the use of virtual gateway nodes and migration failover to minimize traffic impacts when a tunnel is migrated from one processing node to another processing node.
    Type: Grant
    Filed: November 19, 2008
    Date of Patent: August 30, 2011
    Assignee: Zscaler, Inc.
    Inventors: Manoj Apte, Sivprasad Udupa, Alex Motyashov, Srikanth Devarajan
  • Publication number: 20110167474
    Abstract: The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate.
    Type: Application
    Filed: March 18, 2011
    Publication date: July 7, 2011
    Applicant: ZSCALER, INC.
    Inventors: Amit SINHA, Michael Andrew William SUTTON, Srikanth DEVARAJAN
  • Publication number: 20110138468
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.
    Type: Application
    Filed: January 28, 2011
    Publication date: June 9, 2011
    Applicant: ZSCALER, INC.
    Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
  • Patent number: 7899849
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.
    Type: Grant
    Filed: May 28, 2008
    Date of Patent: March 1, 2011
    Assignee: Zscaler, Inc.
    Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
  • Publication number: 20100235374
    Abstract: Systems and methods for reducing file sizes for files delivered over a network are disclosed. A method comprises receiving a first file comprising sequences of data; creating a hash table having entries corresponding to overlapping sequences of data; receiving a second file comprising sequences of data; comparing each of the sequences of data in the second file to the sequences of data in the hash table to determine sequences of data present in both the first and second files; and creating a third file comprising sequences of data from the second file and representations of locations and lengths of said sequences of data present in both the first and second files.
    Type: Application
    Filed: May 28, 2010
    Publication date: September 16, 2010
    Inventors: Henk Bots, Srikanth Devarajan, Saravana Annamalaisami
  • Patent number: 7756826
    Abstract: Systems and methods for reducing file sizes for files delivered over a network are disclosed. A method comprises receiving a first file comprising sequences of data; creating a hash table having entries corresponding to overlapping sequences of data; receiving a second file comprising sequences of data; comparing each of the sequences of data in the second file to the sequences of data in the hash table to determine sequences of data present in both the first and second files; and creating a third file comprising sequences of data from the second file and representations of locations and lengths of said sequences of data present in both the first and second files.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: July 13, 2010
    Assignee: Citrix Systems, Inc.
    Inventors: Henk Bots, Srikanth Devarajan, Saravana Annamalaisami
  • Publication number: 20100125903
    Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing nodes for a security service is facilitate by the use of virtual gateway nodes and migration failover to minimize traffic impacts when a tunnel is migrated from one processing node to another processing node.
    Type: Application
    Filed: November 19, 2008
    Publication date: May 20, 2010
    Applicant: Zscaler, Inc.
    Inventors: Srikanth Devarajan, Alex Motyashov, Manoj Apte, Sivaprasad Udupa
  • Publication number: 20090300045
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.
    Type: Application
    Filed: May 28, 2008
    Publication date: December 3, 2009
    Applicant: SAFE CHANNEL INC.
    Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
  • Publication number: 20080005203
    Abstract: Systems and methods for reducing file sizes for files delivered over a network are disclosed. A method comprises receiving a first file comprising sequences of data; creating a hash table having entries corresponding to overlapping sequences of data; receiving a second file comprising sequences of data; comparing each of the sequences of data in the second file to the sequences of data in the hash table to determine sequences of data present in both the first and second files; and creating a third file comprising sequences of data from the second file and representations of locations and lengths of said sequences of data present in both the first and second files.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: Henk Bots, Srikanth Devarajan, Saravana Annamalaisami