Patents by Inventor Clifford Kahn

Clifford Kahn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12341809
    Abstract: Systems and methods for defending against volumetric attacks, implemented in a cloud-based system. Embodiments include steps of, monitoring flows and a rate of requests to a Data Center (DC); receiving a request from an address to the DC, the request being for a service in a cloud-based system; determining if the address has been successfully authenticated within a past predetermined time period; responsive to the address not having been successfully authenticated within the past time period, and one of (i) the rate of requests being above a threshold or (ii) the number of flows being above a threshold, placing the address in a penalty box for a predetermined amount of time; and blocking requests from the address in the penalty box for the predetermined amount of time.
    Type: Grant
    Filed: November 16, 2022
    Date of Patent: June 24, 2025
    Assignee: Zscaler, Inc.
    Inventors: Clifford Kahn, Jian Liu, Victor Pavlov, Srinivas Kavuri, John A. Chanak
  • Publication number: 20240388606
    Abstract: Systems and methods for policy based privileged remote access in zero trust private networks. Various embodiments include receiving a request to an end system; determining available end systems based on one or more criteria associated with the request, wherein the one or more criteria are analyzed based on policy; and providing access to the end system based on the one or more criteria, wherein the access includes remote pixel rendering protocols integrated with a zero trust architecture.
    Type: Application
    Filed: May 16, 2023
    Publication date: November 21, 2024
    Inventors: Dejan Mihajlovic, Clifford Kahn, Abhijeet Malik, Sandip Davara, Sunita Darbarwar, Srinivas Sannapareddy, Gana Ramachandra, William Fehring, Jian Liu, John A. Chanak, Sunil Menon
  • Publication number: 20240364704
    Abstract: Systems and methods for time bound session management for Operational Technology (OT) applications using Cron expression policies over zero trust. Various embodiments include receiving a request to an end system from a user; determining that the request requires a time-based approval; performing one or more time-based policy checks associated with the request; and allowing or denying the request based on the one or more time-based policy checks. The steps can further include monitoring an active session between the user and the end system; and timing out the active session based on time-based policy checks.
    Type: Application
    Filed: June 16, 2023
    Publication date: October 31, 2024
    Inventors: Sunita Darbarwar, Dejan Mihajlovic, Maneesh Sahu, Abhijeet Malik, Sandip Davara, Monica Bhaskaran, Rakesh Adepu, Clifford Kahn, Sunil Menon, Deepak Patel
  • Publication number: 20240163308
    Abstract: Systems and methods for defending against volumetric attacks, implemented in a cloud-based system. Embodiments include steps of, monitoring flows and a rate of requests to a Data Center (DC); receiving a request from an address to the DC, the request being for a service in a cloud-based system; determining if the address has been successfully authenticated within a past predetermined time period; responsive to the address not having been successfully authenticated within the past time period, and one of (i) the rate of requests being above a threshold or (ii) the number of flows being above a threshold, placing the address in a penalty box for a predetermined amount of time; and blocking requests from the address in the penalty box for the predetermined amount of time.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 16, 2024
    Inventors: Clifford Kahn, Jian Liu, Victor Pavlov, Srinivas Kavuri, John A. Chanak
  • Publication number: 20220353244
    Abstract: Systems and methods for privileged remote access to Operational Technology (OT)/Internet of Things (IOT)/Industrial IOT (IIOT)/Industrial Control System (ICS) infrastructure, implemented in a cloud-based system. The method includes steps of, responsive to determining a user can access an application associated with the OT/IOT/IIOT/ICS infrastructure, determining the user's security and access policies and creating a session for the user; establishing a secure connection to the application via a lightweight connector connected to the application; and brokering a connection between the user's device and the application through the lightweight connector, enabling the user to interact with the application for the OT/IOT/IIOT/ICS infrastructure, based on the user's security and access policies.
    Type: Application
    Filed: July 13, 2022
    Publication date: November 3, 2022
    Inventors: Clifford Kahn, William Fehring, Maneesh Sahu, Deepak Patel, Sunil Menon, Dejan Mihajlovic
  • Publication number: 20050097354
    Abstract: A method for executing trusted commands, in which a trusted command is first received from a user at a user terminal and parsed by untrusted code; then passed to a trusted computing base for execution. The trusted computing base displays some indication of what is to be done back to the user for confirmation. Confirmation of the commands prevents unauthorized modification of the commands and increases system confidence. A randomly (or pseudo-randomly) generated process identifier is employed to verify the existence of a trusted path.
    Type: Application
    Filed: November 30, 2004
    Publication date: May 5, 2005
    Inventors: Mary Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, Leslie Kendall, Steven Lipner
  • Publication number: 20040111531
    Abstract: The methods and systems described herein provide for the detection of a software worm in a computer network, such as the Internet, and/or a limitation of the rate of infection of a software worm within a computer network. In a preferred embodiment, a worm detector software module observes the behavior of, and optionally inspects the electronic messages sent from, a particular computer system, network address, virtual machine, and/or cluster. A worm screen software program edits the flow of traffic from the network address when a possibility of a worm infection achieves a certain level. This editing may include the discarding or rerouting for storage or analysis of messages prepared for transmission by a particular computer system, network address, virtual machine, and/or cluster monitored by the worm screen. The worm screen may be co-located with the worm detector, or comprised within a same software program.
    Type: Application
    Filed: December 6, 2002
    Publication date: June 10, 2004
    Inventors: Stuart Staniford, Clifford Kahn, Nicholas C. Weaver, Christopher Jason Coit, Roel Jonkman