Patents Assigned to Zscaler, Inc.
  • Patent number: 8365259
    Abstract: Systems, methods and apparatus for handling security messages in a distributed security system. Requests, replies, and/or updates have varying time constraints. Processing node managers and authority node managers determine the best transmission times and/or the ignoring of such data to maximize information value.
    Type: Grant
    Filed: May 28, 2008
    Date of Patent: January 29, 2013
    Assignee: Zscaler, Inc.
    Inventors: Jay Chaudhry, Jose Raphel, Kailash Kailash, Sivprasad Udupa
  • Patent number: 8341415
    Abstract: Methods, systems, and apparatus, including computer program products, for generating or using augmentation queries. In one aspect, a set of phrase terms of a phrase are received in first ordinal positions, and a set of first hashes for each of the phrase terms. Concatenated hashes from the set of first hashes are generated. Hashes of content terms for received content are compared to the concatenated hashes to determine if a phrase is detected in the content.
    Type: Grant
    Filed: August 4, 2008
    Date of Patent: December 25, 2012
    Assignee: Zscaler, Inc.
    Inventors: Jose Raphel, Kailash Kailash, Narasimha Datta Nataraja
  • Patent number: 8286220
    Abstract: Systems, methods and apparatus for a distributed security that monitors communications to manage client browser network access based upon the browser configuration of the client browser by use of a configuration script executed in the browser environment. Such management can reduce the exposure of potentially vulnerable client browsers to domains associated with malicious activity.
    Type: Grant
    Filed: September 23, 2008
    Date of Patent: October 9, 2012
    Assignee: Zscaler, Inc.
    Inventor: Jeff Forristal
  • Patent number: 8286239
    Abstract: Systems, methods and apparatus for identifying web risks use a web risk service external to network edges of at least one system. The web risk service receives a web request from a computer within the at least one system, the web request identifying at least one network address. The web risk service determines a web risk index score for the at least one network address, and compares the determined web risk index score to at least one threshold value. Based on the comparison, the service determines how to handle the web request, e.g., by forwarding, blocking, and/or logging the web request.
    Type: Grant
    Filed: July 24, 2008
    Date of Patent: October 9, 2012
    Assignee: Zscaler, Inc.
    Inventor: Michael Sutton
  • Patent number: 8259571
    Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. A multi-tenant cloud-based security system that can distinguish between client computing devices with overlapping private IP addresses is disclosed. Client devices communicate through a processing node to which a tunnel is established. The processing node is able to detect the client devices and apply security policies to the device.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: September 4, 2012
    Assignee: Zscaler, Inc.
    Inventors: Jose Raphel, Kailash Kailash, Srikanth Devarajan
  • Patent number: 8230506
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can identify requests, such as HTTP requests, and can identify embedded resource request identifiers, such as embedded URLs. The embedded resource request identifiers can be classified and appropriate security measures can be initiated based on the classifications.
    Type: Grant
    Filed: July 15, 2008
    Date of Patent: July 24, 2012
    Assignee: Zscaler, Inc.
    Inventor: Jeff Forristal
  • Patent number: 8185510
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.
    Type: Grant
    Filed: January 28, 2011
    Date of Patent: May 22, 2012
    Assignee: Zscaler, Inc.
    Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
  • Patent number: 8055767
    Abstract: Systems, methods and apparatus for a distributed security that detects proxied resource requests. The system can identify proxy strings, each of the proxy strings being indicative of a proper substring in a string of data constituting a proxy communication, the proxy communications being communications that are generated by processing systems executing a plurality of proxy applications. The proxy strings can be store and access to the stored proxy strings can be provided to facilitate detection of proxy communications for the one or more proxy applications in resource requests.
    Type: Grant
    Filed: July 15, 2008
    Date of Patent: November 8, 2011
    Assignee: Zscaler, Inc.
    Inventor: Jeff Forristal
  • Patent number: 8024782
    Abstract: Login credit is monitored over a credit time period. Continuous invalid login attempts decrease the login credit for the duration of the credit time period. Login credit accumulates with time. If the login credit is less than a credit threshold, login processing is precluded. A common invalid login notification for presentation to a user is generated if login processing is precluded or if login processing indicates that the login credentials are invalid.
    Type: Grant
    Filed: April 9, 2008
    Date of Patent: September 20, 2011
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Jose Raphel
  • Patent number: 8010085
    Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing nodes for a security service is facilitate by the use of virtual gateway nodes and migration failover to minimize traffic impacts when a tunnel is migrated from one processing node to another processing node.
    Type: Grant
    Filed: November 19, 2008
    Date of Patent: August 30, 2011
    Assignee: Zscaler, Inc.
    Inventors: Manoj Apte, Sivprasad Udupa, Alex Motyashov, Srikanth Devarajan
  • Patent number: 8010526
    Abstract: In one general aspect, entity instances are monitored during a first interval, each entity instance being one of several types of entity instances. A first ranked list of entity instances is determined from the entity instances monitored during the first interval. The types of entity instances are ranked in the first list according to the number of times each type of entity instance occurred during the first interval and the first ranked list has a first cardinality of types of entity instances. Entity instances are monitored during a second interval. A second ranked list of entity instances is determined. The second ranked list has the first cardinality of types of entity instances. The first ranked list and the second ranked list are merged into a third ranked list of entities instances. The third ranked list has a second cardinality that is less than or equal to the first cardinality.
    Type: Grant
    Filed: July 30, 2008
    Date of Patent: August 30, 2011
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Jose Raphel
  • Patent number: 7984102
    Abstract: Methods, systems, and apparatus, including computer program products, for selective presence notification are provided. In one general aspect, a plurality of presence notification messages are monitored. Each presence notification message may include address information identifying at least one of a recipient or a sender of the presence notification message. Based on the address information a determination is made as to whether a presence notification message is allowable. If it is determined that the presence notification message is allowable, the transmission of the presence notification message is allowed.
    Type: Grant
    Filed: July 22, 2008
    Date of Patent: July 19, 2011
    Assignee: Zscaler, Inc.
    Inventors: Jose Raphel, Kailash Kailash, Balakrishna Bhat Bayar, Arcady V. Schekochikhin, Jay Chaudhry, Narasimha Datta Nataraja
  • Publication number: 20110167474
    Abstract: The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate.
    Type: Application
    Filed: March 18, 2011
    Publication date: July 7, 2011
    Applicant: ZSCALER, INC.
    Inventors: Amit SINHA, Michael Andrew William SUTTON, Srikanth DEVARAJAN
  • Publication number: 20110138468
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.
    Type: Application
    Filed: January 28, 2011
    Publication date: June 9, 2011
    Applicant: ZSCALER, INC.
    Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
  • Patent number: 7921089
    Abstract: Methods, systems, and apparatus, including computer program products, for data structure locking. In one aspect, a proper subset of variables of a set of variables in a data structure are received. An access privilege to modify variables in the data structure to administrator accounts is assigned. A first administrator access request to modify a variable in the proper subset of variables is received, and the access privilege to modify the variable in the proper subset of variables for the first administrator account. A second administrator access request to modify the variable in the proper subset of variables is received, and an access timer that expires after a time period is initiated; the access privilege is disabled for the first administrator account in response to expiration of the access timer; and the access privilege for the second administrator account is enabled in response to expiration of the access timer.
    Type: Grant
    Filed: July 24, 2008
    Date of Patent: April 5, 2011
    Assignee: ZScaler, Inc.
    Inventors: Kailash Kailash, Lakshmaiah Regoti, Hariharan Ganapathy
  • Patent number: 7899849
    Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.
    Type: Grant
    Filed: May 28, 2008
    Date of Patent: March 1, 2011
    Assignee: Zscaler, Inc.
    Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
  • Patent number: 7894350
    Abstract: Systems, methods and apparatus monitor networks to identify when the networks are not operating normally, for instance, because of malware. During a sample interval sample data is collected that corresponds to a plurality of system activities, the sample data collected from a plurality of monitored networks and representing normal operations of the plurality of monitored networks. Subsequent to the sample interval, observed data is collected from the plurality of monitored networks, the observed data corresponding to at least some of the system activities. A determination is made whether the observed data represents the normal operation of the monitored networks, and an alert is generated if the observed data does not represent the normal operation of the monitored networks.
    Type: Grant
    Filed: July 24, 2008
    Date of Patent: February 22, 2011
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Jay Chaudhry
  • Publication number: 20100125903
    Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing nodes for a security service is facilitate by the use of virtual gateway nodes and migration failover to minimize traffic impacts when a tunnel is migrated from one processing node to another processing node.
    Type: Application
    Filed: November 19, 2008
    Publication date: May 20, 2010
    Applicant: Zscaler, Inc.
    Inventors: Srikanth Devarajan, Alex Motyashov, Manoj Apte, Sivaprasad Udupa
  • Publication number: 20100077444
    Abstract: Systems, methods and apparatus for a distributed security that monitors communications to manage client browser network access based upon the browser configuration of the client browser by use of a configuration script executed in the browser environment. Such management can reduce the exposure of potentially vulnerable client browsers to domains associated with malicious activity.
    Type: Application
    Filed: September 23, 2008
    Publication date: March 25, 2010
    Applicant: Zscaler, Inc.
    Inventor: JEFF FORRISTAL