Patents by Inventor Narinder Paul
Narinder Paul has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200084241Abstract: Mobile device security, device management, and policy enforcement are described in a cloud based system where the “cloud” is used to pervasively enforce security and policy and perform device management regardless of device type, platform, location, etc. A cloud based method includes monitoring traffic between a mobile device and an external network in a cloud based system separate from the mobile device and the external network; enforcing policy with respect to the traffic from the mobile device to the external network to determine whether to block or allow the traffic from the mobile device to the external network; and inspecting content associated with the traffic from the external network to the mobile device to determine whether to block or allow the traffic from the external network to the mobile device.Type: ApplicationFiled: November 12, 2019Publication date: March 12, 2020Inventors: Amit Sinha, Narinder Paul, Srikanth Devarajan
-
Patent number: 10523710Abstract: Mobile device security, device management, and policy enforcement are described in a cloud based system where the “cloud” is used to pervasively enforce security and policy and perform device management regardless of device type, platform, location, etc. A cloud based method for mobile device security, device management, and policy enforcement includes, responsive to configuring the mobile device for connectivity to the cloud system, monitoring data between the mobile device and the external network, wherein the cloud system connects to the mobile device independent of a type, platform, or operating system associated with the mobile device; analyzing the data in real-time in the cloud system thereby not impacting performance of the mobile device; and controlling exchange of the data, in the cloud system, between the mobile device and the external network based on the analyzing.Type: GrantFiled: May 13, 2016Date of Patent: December 31, 2019Assignee: Zscaler, Inc.Inventors: Amit Sinha, Narinder Paul, Srikanth Devarajan
-
Patent number: 9609015Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: GrantFiled: July 10, 2015Date of Patent: March 28, 2017Assignee: Zscaler, Inc.Inventors: Sriram Natarajan, Narinder Paul, Julien Sobrier, Karthikeyan Thamilarasu, Balakrishna Bayar, Michael Andrew William Sutton
-
Patent number: 9473537Abstract: The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.Type: GrantFiled: May 14, 2015Date of Patent: October 18, 2016Assignee: Zscaler, Inc.Inventors: Amit Sinha, Narinder Paul, Srikanth Devarajan
-
Publication number: 20160255117Abstract: Mobile device security, device management, and policy enforcement are described in a cloud based system where the “cloud” is used to pervasively enforce security and policy and perform device management regardless of device type, platform, location, etc. A cloud based method for mobile device security, device management, and policy enforcement includes, responsive to configuring the mobile device for connectivity to the cloud system, monitoring data between the mobile device and the external network, wherein the cloud system connects to the mobile device independent of a type, platform, or operating system associated with the mobile device; analyzing the data in real-time in the cloud system thereby not impacting performance of the mobile device; and controlling exchange of the data, in the cloud system, between the mobile device and the external network based on the analyzing.Type: ApplicationFiled: May 13, 2016Publication date: September 1, 2016Applicant: Zscaler, Inc.Inventors: Amit SINHA, Narinder PAUL, Srikanth DEVARAJAN
-
Patent number: 9369433Abstract: Cloud based social networking policy and compliance systems and methods use the “cloud” to pervasively enforce security and policy on websites such as Web 2.0 social networking sites. The cloud based systems and methods provide a cloud based social networking policy enforcement and compliance system that gives enterprises full control and visibility into what their employees are seeing and posting to various websites. In particular, the cloud based systems and methods provide an enterprise to have granular policy-based Web 2.0 control and detailed compliance reports. Unique, customized policies may be applied to groups and/or individuals. Polices may be customized based on application. Data leakage may be avoided by prevention of file uploads and the like. Additionally, the cloud based systems and methods may provide advanced policies requiring administrator approval for user generated content to be posted to Web 2.0 sites.Type: GrantFiled: December 8, 2011Date of Patent: June 14, 2016Assignee: Zscaler, Inc.Inventors: Narinder Paul, Srikanth Devarajan, Amit Sinha
-
Publication number: 20150319182Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: ApplicationFiled: July 10, 2015Publication date: November 5, 2015Applicant: ZSCALER, INC.Inventors: Sriram NATARAJAN, Narinder PAUL, Julien SOBRIER, Karthikeyan THAMILARASU, Balakrishna BAYAR, Michael Andrew William SUTTON
-
Patent number: 9152789Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: GrantFiled: March 26, 2014Date of Patent: October 6, 2015Assignee: Zscaler, Inc.Inventors: Sriram Natarajan, Narinder Paul, Julien Sobrier, Karthikeyan Thamilarasu, Balakrishna Bayar, Michael Andrew William Sutton
-
Patent number: 9154475Abstract: Methods, systems, and apparatus, including computer program products, for distributed security system authorization. Client device authentication instructions are executed on a client device to determine if authentication data accessible by the client device authentication instructions are stored at the client device. If the authentication data are stored at the client device, the client device authentication instructions generate authenticated user data and store the authenticated user data at the client device. If the authentication data are not stored at the client device, the client device authentication instructions generate a login environment that allows a user of the client device to input login data. The login data are provided to a verification process that in response to verification provide the authentication data to the client device.Type: GrantFiled: January 16, 2009Date of Patent: October 6, 2015Assignee: Zscaler, Inc.Inventors: Kailash Kailash, Jeff Forristal, Narinder Paul, Sivaprasad Udupa
-
Publication number: 20150244741Abstract: The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.Type: ApplicationFiled: May 14, 2015Publication date: August 27, 2015Applicant: ZSCALER, INC.Inventors: Amit SINHA, Narinder PAUL, Srikanth DEVARAJAN
-
Patent number: 9060239Abstract: The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.Type: GrantFiled: August 9, 2011Date of Patent: June 16, 2015Assignee: Zscaler, Inc.Inventors: Amit Sinha, Narinder Paul, Srikanth Devarajan
-
Patent number: 8887249Abstract: Guard tables including absence information are used in a security system to protect a network service from a denial of service attack. A login key corresponding to a login request is hashed and the output of the hash is a bit position in a guard table. The bit value at the bit position in the guard table can be checked to determine if login information corresponding to the key is present. Further processing of the login request can be based on the indicated presence or absence of the information.Type: GrantFiled: May 28, 2008Date of Patent: November 11, 2014Assignee: Zscaler, Inc.Inventors: Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
-
Patent number: 8869259Abstract: A cloud based system that facilitates inspection of secure content and inexpensively detects the presence of a Man-in-the-Middle attack in a client-server communication is disclosed. Through inspection of the server certificate, no Man-in-the-Middle attack between server and the system is ensured; through inspection and designation of the client certificate, absence of a Man-in-the-Middle attack between the cloud based system and the client is ensured. In this way, the cloud based system can perform its usual policy enforcement functions with respect to secure content while avoiding Man-in-the-Middle attacks.Type: GrantFiled: May 19, 2011Date of Patent: October 21, 2014Assignee: Zscaler, Inc.Inventors: Sivaprasad Udupa, Narinder Paul, Jose Raphel, Kailash Kailash
-
Publication number: 20140208426Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: ApplicationFiled: March 26, 2014Publication date: July 24, 2014Applicant: ZSCALER, INC.Inventors: Sriram NATARAJAN, Narinder PAUL, Julien SOBRIER, Karthikeyan THAMILARASU, Balakrishna BAYAR, Michael Andrew William SUTTON
-
Patent number: 8429111Abstract: Methods, systems, and apparatus, including computer program products, for generating or using augmentation queries. In one aspect, statistical model of statistical data is used to support lossless predictive compression. Data instances are identified in statistical data and classified into one of a plurality of data types. Each data type is associated with a corresponding compression process that is used to compress data instances of that type.Type: GrantFiled: August 4, 2008Date of Patent: April 23, 2013Assignee: Zscaler, Inc.Inventors: Kailash Kailash, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul
-
Patent number: 8185510Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.Type: GrantFiled: January 28, 2011Date of Patent: May 22, 2012Assignee: Zscaler, Inc.Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
-
Publication number: 20110138468Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.Type: ApplicationFiled: January 28, 2011Publication date: June 9, 2011Applicant: ZSCALER, INC.Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
-
Patent number: 7899849Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.Type: GrantFiled: May 28, 2008Date of Patent: March 1, 2011Assignee: Zscaler, Inc.Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash
-
Publication number: 20090300045Abstract: Systems, methods and apparatus for a distributed security that provides security processing external to a network edge. The system can include many distributed processing nodes and one or more authority nodes that provide security policy data, threat data, and other security data to the processing nodes. The processing nodes detect and stop the distribution of malware, spyware and other undesirable content before such content reaches the destination network and computing systems.Type: ApplicationFiled: May 28, 2008Publication date: December 3, 2009Applicant: SAFE CHANNEL INC.Inventors: Jay Chaudhry, Arcady V. Schekochikhin, Srikanth Devarajan, Narinder Paul, Kailash Kailash