Patents by Inventor Pooja Deshmukh

Pooja Deshmukh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11973873
    Abstract: Systems and methods of Exact Data Matching (EDM) include receiving customer specific sensitive data for a customer, wherein the customer specific sensitive data are converted into a plurality of tokens; receiving a configuration for exact data matching of the plurality of tokens; performing inline monitoring of a user associated with the customer; detecting a presence of one or more tokens of the plurality of tokens based on the inline monitoring; and, responsive to the detecting, performing an action based on the configuration.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: April 30, 2024
    Assignee: Zscaler, Inc.
    Inventors: Pooja Deshmukh, Siva Udupa
  • Patent number: 11863674
    Abstract: Systems and methods of Exact Data Matching (EDM) for identifying related tokens in data content using structured signature data implemented in a cloud-based system receiving data sets and customer configuration from a customer, wherein the data sets include customer specific sensitive data from a structured data source with each token represented by a hash value and the customer configuration includes one or more primary keys for a plurality of records in the data sets; distributing the data sets and the customer configuration to a plurality of nodes in the cloud-based system; performing monitoring of content between a client of the customer and an external network; detecting a presence of a plurality of tokens associated with a record in the customer specific sensitive data based on the monitoring; and performing a policy-based action in the cloud-based system based on the detecting.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: January 2, 2024
    Assignee: Zscaler, Inc.
    Inventors: Balakrishna Bayar, Arun Bhallamudi, Srikanth Devarajan, Siva Udupa, Pooja Deshmukh
  • Publication number: 20230231884
    Abstract: Systems and methods for browser fingerprinting and control for private application protection include monitoring access to one or more private applications; performing one or more compliance checks on any of the user and the browser used to access the one or more private applications; and performing one or more actions based on a result of the one or more compliance checks. These steps are performed in order to prevent users from accessing private applications via compromised or vulnerable browsers.
    Type: Application
    Filed: March 24, 2023
    Publication date: July 20, 2023
    Inventors: Pooja Deshmukh, Kanti Varanasi, Apoorva Pasrija, Nikhil Bhatia, Sumit Guha
  • Patent number: 11671433
    Abstract: A cloud-based security system includes a plurality of enforcement nodes connected to one another; a central authority connected to the plurality of enforcement nodes; and a Data Loss Prevention (DLP) service executed between the plurality of enforcement nodes, wherein the DLP service includes one or more DLP rules based on one or more DLP engines for a tenant, and wherein, for the DLP service, a first enforcement node is configured to monitor traffic of a user of the tenant, detect a DLP rule violation based on the one or more DLP rules, and forward DLP incident information to a second enforcement node, and the second enforcement node is configured to transmit the DLP incident information to a server for the tenant, including both DLP triggering content that cause the DLP rule violation and DLP scan metadata.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: June 6, 2023
    Assignee: Zscaler, Inc.
    Inventors: Narinder Paul, Arun Bhallamudi, James Tan, Frank Zhang, Pooja Deshmukh
  • Publication number: 20230019448
    Abstract: Systems and methods include, responsive to security research identifying a zero-day Common Vulnerabilities and Exposure (CVE), receiving the associated signatures of the zero-day CVE; responsive to determining a user can access an application via a cloud-based system, wherein the application is in one of a public cloud, a private cloud, and an enterprise network, and wherein the user is remote over the Internet, obtaining an inspection profile for the user with the inspection profile including a plurality of rules; performing inspection of transactions after the access using the plurality of rules including a rule for identifying the zero-day CVE; and responsive to results of any of the plurality of rules, one or more of monitoring, allowing, blocking, and redirecting the access, via the cloud-based system.
    Type: Application
    Filed: June 20, 2022
    Publication date: January 19, 2023
    Inventors: Pooja Deshmukh, Amit Banker, Kanti Varanasi, John A. Chanak, William Fehring, Nishant Gupta
  • Publication number: 20230018809
    Abstract: Systems and methods include, providing a UI for a tenant to input one or more malware and DLP rules, and trusted user exceptions; responsive to a scan by the CASB system of a plurality of users associated with a tenant in a SaaS application where the scan includes identifying malware in content in the SaaS application and performing DLP in the content in the SaaS application based on the one or more malware and DLP rules and trusted user exceptions, maintaining records associated with a plurality of incidents for the malware and the DLP; and providing the UI for the tenant including an analytics view with a plurality of summary tiles including visualizations of the plurality of incidents for the malware and DLP for the tenant and a table listing any of the plurality of incidents for the malware and the DLP for the tenant.
    Type: Application
    Filed: September 21, 2022
    Publication date: January 19, 2023
    Inventor: Pooja Deshmukh
  • Publication number: 20220374599
    Abstract: Systems and methods of Exact Data Matching (EDM) include receiving customer specific sensitive data for a customer, wherein the customer specific sensitive data are converted into a plurality of tokens; receiving a configuration for exact data matching of the plurality of tokens; performing inline monitoring of a user associated with the customer; detecting a presence of one or more tokens of the plurality of tokens based on the inline monitoring; and, responsive to the detecting, performing an action based on the configuration.
    Type: Application
    Filed: July 29, 2022
    Publication date: November 24, 2022
    Inventors: Pooja Deshmukh, Siva Udupa
  • Patent number: 11455407
    Abstract: Systems and methods include obtaining an expression for a Data Loss Prevention (DLP) engine, wherein the expression includes one or more DLP dictionaries that evaluate to a score for comparison with a corresponding threshold and one or more logical operators used to combine an evaluation of the one or more DLP dictionaries; storing the expression in a database associated with a DLP service; monitoring traffic from one or more users; evaluating the traffic using the DLP engine and the expression; and determining a DLP trigger based on a result of the expression that is a logical TRUE.
    Type: Grant
    Filed: August 19, 2020
    Date of Patent: September 27, 2022
    Assignee: Zscaler, Inc.
    Inventors: Zhifeng Zhang, Arun Bhallamudi, Pooja Deshmukh
  • Publication number: 20220198055
    Abstract: Systems and methods include receiving an index of data for exact data matching, wherein the index includes Personally Identifiable Information (PII); receiving policy related to actions to perform for any violations associated with the exact data matching; loading the index and the policy into memory; monitoring traffic for violations, wherein the violations include detection of any values in the index in the traffic; and performing an action responsive to any violations and associated policy. The action can be one of reporting the violation, blocking the traffic associated with the violation, reporting the violation and allowing the traffic associated with the violation when the violation is based on authenticated PII, allowing the traffic associated with the violation when the violation is based on authenticated PII, and a combination thereof.
    Type: Application
    Filed: December 30, 2021
    Publication date: June 23, 2022
    Inventor: Pooja Deshmukh
  • Publication number: 20220116397
    Abstract: Systems and methods include obtaining a profile for an application, wherein the profile includes one or more tenants, rules for use of the application by the one or more tenants, and users for the rules; monitoring a user of a tenant of the one or more tenants inline via a node in a cloud-based system; identifying an application of the one or more applications based on the monitoring and associated rules for the user; and enforcing the associated rules for the user for the application.
    Type: Application
    Filed: November 24, 2020
    Publication date: April 14, 2022
    Inventors: Pooja Deshmukh, Narinder Paul, Naresh Kumar, Santhosh Kumar, Sravani Manukonda, Vijay Bulusu
  • Publication number: 20220109696
    Abstract: Systems and methods include, responsive to a scan by the CASB system of a plurality of users associated with a tenant in a Software-as-a-Service (SaaS) application where the scan includes identifying malware in content in the SaaS application and performing Data Loss Prevention (DLP) in the content in the SaaS application, maintaining records associated with a plurality of incidents for the malware and the DLP; providing a User Interface (UI) for the tenant including an analytics view with a plurality of summary tiles including visualizations of the plurality of incidents for the malware and the DLP for the tenant; and providing the UI for the tenant including a table listing any of the plurality of incidents for the malware and the DLP for the tenant, including any of unique data objects, unique users internal to the tenant, and unique external entities, associated with the plurality of incidents.
    Type: Application
    Filed: November 17, 2020
    Publication date: April 7, 2022
    Inventors: Pooja Deshmukh, Iris Gao, Jasbir S. Kaushal, Sarthak Saxena
  • Publication number: 20210336934
    Abstract: Systems and methods include, responsive to determining a user can access an application via a cloud-based system, wherein the application is in one of a public cloud, a private cloud, and an enterprise network, and wherein the user is remote over the Internet, obtaining a predetermined inspection profile for the user with the inspection profile including a plurality of rules evaluated in an order; performing inspection of the access using the plurality of rules in the order; and responsive to results of any of the plurality of rules, one or more of monitoring, allowing, blocking, and redirecting the access, via the cloud-based system.
    Type: Application
    Filed: July 6, 2021
    Publication date: October 28, 2021
    Inventors: Pooja Deshmukh, Leslie Smith, William Fehring, Kanti Varanasi, John A. Chanak
  • Publication number: 20210326460
    Abstract: Systems and methods include obtaining an expression for a Data Loss Prevention (DLP) engine, wherein the expression includes one or more DLP dictionaries that evaluate to a score for comparison with a corresponding threshold and one or more logical operators used to combine an evaluation of the one or more DLP dictionaries; storing the expression in a database associated with a DLP service; monitoring traffic from one or more users; evaluating the traffic using the DLP engine and the expression; and determining a DLP trigger based on a result of the expression that is a logical TRUE.
    Type: Application
    Filed: August 19, 2020
    Publication date: October 21, 2021
    Inventors: Zhifeng Zhang, Arun Bhallamudi, Pooja Deshmukh