Patents by Inventor William FEHRING
William FEHRING has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12238070Abstract: Systems and methods include, responsive to determining a user can access an application via a cloud-based system, wherein the application is in one of a public cloud, a private cloud, and an enterprise network, and wherein the user is remote over the Internet, obtaining a predetermined inspection profile for the user with the inspection profile including a plurality of rules evaluated in an order; performing inspection of the access using the plurality of rules in the order; and responsive to results of any of the plurality of rules, one or more of monitoring, allowing, blocking, and redirecting the access, via the cloud-based system.Type: GrantFiled: July 6, 2021Date of Patent: February 25, 2025Assignee: Zscaler, Inc.Inventors: Pooja Deshmukh, Leslie Smith, William Fehring, Kanti Varanasi, John A. Chanak
-
Publication number: 20240422198Abstract: Systems and methods for providing zero trust access to source applications, implemented in a cloud-based system. The method includes steps of, intercepting client application information; identifying if the application is a known application based on an application catalog, and collecting known information of the application from the application catalog; sending the application information to an enforcement node of a cloud-based system in a first packet; and sending only an application Identification (ID) in subsequent packets, wherein the application ID is used for policy enforcement.Type: ApplicationFiled: June 19, 2023Publication date: December 19, 2024Inventors: Sreedhar Pampati, Babu Katchapalayam, Srikanth Devarajan, Lidor Pergament, David Creedy, William Fehring
-
Publication number: 20240388606Abstract: Systems and methods for policy based privileged remote access in zero trust private networks. Various embodiments include receiving a request to an end system; determining available end systems based on one or more criteria associated with the request, wherein the one or more criteria are analyzed based on policy; and providing access to the end system based on the one or more criteria, wherein the access includes remote pixel rendering protocols integrated with a zero trust architecture.Type: ApplicationFiled: May 16, 2023Publication date: November 21, 2024Inventors: Dejan Mihajlovic, Clifford Kahn, Abhijeet Malik, Sandip Davara, Sunita Darbarwar, Srinivas Sannapareddy, Gana Ramachandra, William Fehring, Jian Liu, John A. Chanak, Sunil Menon
-
Patent number: 12107891Abstract: The present disclosure includes, responsive to a request from a user device, performing a security check based on policy associated with the user device, wherein the policy includes setting related to content filtering and security; responsive to the security check, performing one of: directly allowing the request to the Internet based on the security check determining the request is allowed by the settings; directly blocking the request based on the security check determining the request is disallowed by the settings; and forwarding the request to a system for inline inspection based on the security check determining the request includes suspicious content, wherein responsive to the inline inspection, the request is one of allowed and blocked.Type: GrantFiled: July 28, 2020Date of Patent: October 1, 2024Assignee: Zscaler, Inc.Inventors: Patrick Foxhoven, John Chanak, William Fehring
-
Publication number: 20240323189Abstract: Systems and methods for policy based seamless authentication for PRA systems through zero trust private networks. The various systems and methods described herein include steps of receiving a request to access a Privileged Remote Access (PRA) system; determining if any credential rules apply to a console associated with the request; retrieving credentials associated with any of a user and the console from a database, thereby avoiding the user being required to provide credentials; and providing access to the requested PRA system based on the retrieved credentials.Type: ApplicationFiled: May 4, 2023Publication date: September 26, 2024Inventors: Dejan Mihajlovic, Deepika Dwivedi, Anurag Raghuvanshi, Rakesh Adepu, Mithun A S, Sandip Davara, Abhijeet Malik, Kanti Varanasi, William Fehring, John A. Chanak, Sunil Menon
-
Patent number: 11838271Abstract: Systems and methods include, responsive to a request from a user for one or more Business-to-Business (B2B) applications, redirecting the request, by a cloud-based system, to an identity provider to authorize the user; displaying the one or more B2B applications that the user is authorized to access; responsive to a selection of a B2B application of the one or more B2B applications, creating a first tunnel from the B2B application to the cloud-based system; and stitching the first tunnel between the B2B application and the cloud-based system with a second tunnel between the user and the cloud-based system. The systems and methods further include, responsive to the user being unauthorized for any of the one or more B2B applications, omitting the one or more B2B applications from the displaying, such that the one or more B2B applications are invisible to the user.Type: GrantFiled: October 30, 2020Date of Patent: December 5, 2023Assignee: Zscaler, Inc.Inventors: Patrick Foxhoven, John A. Chanak, William Fehring, Manoj Apte, Kunal Shah, Dhawal Sharma
-
Patent number: 11811855Abstract: Systems and methods for policy based agentless file transfer in zero trust private networks. Various systems and methods include receiving a request for a file transfer; determining a file transfer protocol; evaluating one or more criteria associated with the request, the criteria being associated with any of an end user and the contents of the file; and allowing or denying the file transfer based on the evaluating. Responsive to an end user's policy including a requirement for file inspection, the steps can further include sending the file to a sandbox for inspection, and receiving a result of the inspection from the sandbox.Type: GrantFiled: May 1, 2023Date of Patent: November 7, 2023Assignee: Zscaler, Inc.Inventors: Dejan Mihajlovic, Monica Bhaskaran, Mithun A S, Sunita Darbarwar, Rakesh Adepu, Sandip Davara, Abhijeet Malik, Mahesh Krishna Kumar, Kanti Varanasi, William Fehring, John A. Chanak, Sunil Menon
-
Publication number: 20230269137Abstract: Systems and methods include receiving one or more disaster recovery configurations via a cloud-based system; storing the one or more received disaster recovery configurations in one or more components of the cloud-based system; identifying activation of a disaster recovery mode; and providing private application access based on one or more disaster recovery configurations.Type: ApplicationFiled: April 26, 2023Publication date: August 24, 2023Inventors: William Fehring, John A. Chanak, Ale A. Mansoor, Vikas Mahajan
-
Publication number: 20230247003Abstract: Systems and methods include, receiving a request from a user to access an application; determining if the user meets one or more requirements, wherein responsive to the user meeting the one or more requirements, presenting the user with a login page; validating credentials of the user with one or more additional sources; responsive to successful validation of the users' credentials, authenticating the user and evaluating one or more access policies for the user; and initiating a connection between the user and the application based on the one or more access policies.Type: ApplicationFiled: January 27, 2023Publication date: August 3, 2023Inventors: John A. Chanak, William Fehring, Richard Miles, Shujaat Jaffrey, Jose Padin, Matthew Moulton
-
Patent number: 11652797Abstract: Systems and methods, in a lightweight connector including a processor communicatively coupled to a network interface, include connecting to a cloud-based system, via the network interface; connecting to one or more of a file share and an application, via the network interface; and providing access to a user device to the one or more of the file share and the application via a stitched connection between the network interface and the user device through the cloud-based system. The systems and methods can further include receiving a query for discovery; and responding to the query based on the one or more of the file share and the application connected thereto.Type: GrantFiled: February 25, 2020Date of Patent: May 16, 2023Assignee: Zscaler, Inc.Inventors: John A. Chanak, Patrick Foxhoven, William Fehring, Denzil Wessels, Kunal Shah, Subramanian Srinivasan
-
Publication number: 20230115982Abstract: Systems and methods include obtaining log data for a plurality of users of an enterprise where the log data relates to usage of a plurality of applications by the plurality of users; determining i) app-segments that are groupings of application of the plurality of applications and ii) user-groups that are groupings of users of the plurality of users; and providing access policy of the plurality of applications based on the user-groups and the app-segments. The steps can further include monitoring the access policy over time based on ongoing log data, manual verification of the access policy, and incidents where users are prevented from accessing any application; and adjusting the determined based on the monitoring.Type: ApplicationFiled: October 13, 2021Publication date: April 13, 2023Inventors: Dianhuan Lin, Raimi Shah, Rex Shang, Loc Bui, Subramanian Srinivasan, William Fehring, Arvind Nadendla, John A. Chanak, Shudong Zhou, Howie Xu
-
Publication number: 20230019448Abstract: Systems and methods include, responsive to security research identifying a zero-day Common Vulnerabilities and Exposure (CVE), receiving the associated signatures of the zero-day CVE; responsive to determining a user can access an application via a cloud-based system, wherein the application is in one of a public cloud, a private cloud, and an enterprise network, and wherein the user is remote over the Internet, obtaining an inspection profile for the user with the inspection profile including a plurality of rules; performing inspection of transactions after the access using the plurality of rules including a rule for identifying the zero-day CVE; and responsive to results of any of the plurality of rules, one or more of monitoring, allowing, blocking, and redirecting the access, via the cloud-based system.Type: ApplicationFiled: June 20, 2022Publication date: January 19, 2023Inventors: Pooja Deshmukh, Amit Banker, Kanti Varanasi, John A. Chanak, William Fehring, Nishant Gupta
-
Publication number: 20220353244Abstract: Systems and methods for privileged remote access to Operational Technology (OT)/Internet of Things (IOT)/Industrial IOT (IIOT)/Industrial Control System (ICS) infrastructure, implemented in a cloud-based system. The method includes steps of, responsive to determining a user can access an application associated with the OT/IOT/IIOT/ICS infrastructure, determining the user's security and access policies and creating a session for the user; establishing a secure connection to the application via a lightweight connector connected to the application; and brokering a connection between the user's device and the application through the lightweight connector, enabling the user to interact with the application for the OT/IOT/IIOT/ICS infrastructure, based on the user's security and access policies.Type: ApplicationFiled: July 13, 2022Publication date: November 3, 2022Inventors: Clifford Kahn, William Fehring, Maneesh Sahu, Deepak Patel, Sunil Menon, Dejan Mihajlovic
-
Patent number: 11425097Abstract: Systems and methods include receiving a request, in a cloud system from a user device, to access an application, wherein the application is in one of a public cloud, a private cloud, and an enterprise network, and wherein the user device is remote over the Internet; determining if the user device is permitted to access the application; if the user device is not permitted to access the application, notifying the user device the application does not exist; and if the user device is permitted to access the application, stitching together connections between the cloud system, the application, and the user device to provide access to the application.Type: GrantFiled: August 1, 2019Date of Patent: August 23, 2022Assignee: Zscaler, Inc.Inventors: Patrick Foxhoven, John A. Chanak, William Fehring, Denzil Wessels, Purvi Desai, Manoj Apte, Sudhindra P. Herle
-
Publication number: 20210336934Abstract: Systems and methods include, responsive to determining a user can access an application via a cloud-based system, wherein the application is in one of a public cloud, a private cloud, and an enterprise network, and wherein the user is remote over the Internet, obtaining a predetermined inspection profile for the user with the inspection profile including a plurality of rules evaluated in an order; performing inspection of the access using the plurality of rules in the order; and responsive to results of any of the plurality of rules, one or more of monitoring, allowing, blocking, and redirecting the access, via the cloud-based system.Type: ApplicationFiled: July 6, 2021Publication date: October 28, 2021Inventors: Pooja Deshmukh, Leslie Smith, William Fehring, Kanti Varanasi, John A. Chanak
-
Publication number: 20210314301Abstract: Systems and methods include, connecting to a first service edge node in a cloud-based system and obtaining one or more addresses each for one or more service edge nodes in the cloud-based system, wherein the one or more service edge nodes include public service edge nodes and private service edge nodes; connecting to a second service edge node of the one or more service edge nodes using the corresponding address; providing a request for an application to the second service edge node; and responsive to policy and accessibility determined via the cloud-based system, receiving access to the application via a connector adjacent to the application.Type: ApplicationFiled: June 21, 2021Publication date: October 7, 2021Inventors: John A. Chanak, Ale A. Mansoor, Maxim Perepelitsyn, Deepak Khungar, William Fehring
-
Patent number: 11023378Abstract: A Dynamic Name Server (DNS) surrogation method, a DNS system, and a DNS server provide DNS surrogation which is the idea that if a user device sends a DNS resolution request to a given DNS server that server does not need to actually perform the recursion itself. A policy can be defined telling the server that first received the request to take other factors into account and “relay” or “surrogate” that request to another node. This additional node is called a “surrogate” and it actually performs the recursion therefore allowing the resolving party to perform proper localization, optimization, or any other form of differentiated resolution. This surrogation also distributes the job of actually performing resolution, which adds scalability to the DNS server or service itself. A network of “surrogate” resolvers is possible as well as the concept of every client needing DNS resolution can also become a surrogate.Type: GrantFiled: December 14, 2017Date of Patent: June 1, 2021Assignee: Zscaler, Inc.Inventors: Patrick Foxhoven, John Chanak, William Fehring
-
Publication number: 20210136041Abstract: Systems and methods include, responsive to a request from a user for one or more Business-to-Business (B2B) applications, redirecting the request, by a cloud-based system, to an identity provider to authorize the user; displaying the one or more B2B applications that the user is authorized to access; responsive to a selection of a B2B application of the one or more B2B applications, creating a first tunnel from the B2B application to the cloud-based system; and stitching the first tunnel between the B2B application and the cloud-based system with a second tunnel between the user and the cloud-based system. The systems and methods further include, responsive to the user being unauthorized for any of the one or more B2B applications, omitting the one or more B2B applications from the displaying, such that the one or more B2B applications are invisible to the user.Type: ApplicationFiled: October 30, 2020Publication date: May 6, 2021Inventors: Patrick Foxhoven, John A. Chanak, William Fehring, Manoj Apte, Kunal Shah, Dhawal Sharma
-
Publication number: 20200358827Abstract: The present disclosure includes, responsive to a request from a user device, performing a security check based on policy associated with the user device, wherein the policy includes setting related to content filtering and security; responsive to the security check, performing one of: directly allowing the request to the Internet based on the security check determining the request is allowed by the settings; directly blocking the request based on the security check determining the request is disallowed by the settings; and forwarding the request to a system for inline inspection based on the security check determining the request includes suspicious content, wherein responsive to the inline inspection, the request is one of allowed and blocked.Type: ApplicationFiled: July 28, 2020Publication date: November 12, 2020Inventors: Patrick Foxhoven, John Chanak, William Fehring
-
Patent number: 10728287Abstract: A cloud-based security method using Domain Name System (DNS) includes receiving a request from a user device at a DNS server; performing a security check on the request based on a policy look up associated with the user device; responsive to the policy look up, performing a DNS security check on the request; and responsive to the DNS security check, performing one of allowing the request to the Internet; blocking the request based on the policy; and providing the request to inline inspection based on the policy, wherein the request is one of allowed to the Internet or blocked based on the inline inspection.Type: GrantFiled: July 10, 2017Date of Patent: July 28, 2020Assignee: Zscaler, Inc.Inventors: Patrick Foxhoven, John Chanak, William Fehring