US 11,750,405 B2
Encrypted traffic inspection in a cloud-based security system
Srikanth Devarajan, Cupertino, CA (US); Vijay Bulusu, Fremont, CA (US); and Leslie McCutcheon, Fremont, CA (US)
Assigned to Zscaler, Inc., San Jose, CA (US)
Filed by Zscaler, Inc., San Jose, CA (US)
Filed on Apr. 7, 2022, as Appl. No. 17/715,137.
Application 17/715,137 is a continuation of application No. 16/863,475, filed on Apr. 30, 2020, granted, now 11,394,563.
Prior Publication US 2022/0231864 A1, Jul. 21, 2022
Int. Cl. H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3263 (2013.01) [H04L 63/0428 (2013.01); H04L 63/1416 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method implemented as a node configured as any of a proxy, a Secure Web Gateway, and a Secure Internet Gateway, the method comprising steps of:
establishing a connection with a user device having a user associated with a tenant;
obtaining policy for the user;
monitoring traffic between the user device and the Internet including snooping session keys for any encrypted traffic;
analyzing the traffic based on the policy including utilizing the session keys on the encrypted traffic to decrypt the traffic for inspection thereof, wherein the analyzing is performed at a middle location of the connection with encrypted traffic and the analyzing includes checking for malicious traffic and Data Loss Prevention (DLP) for the tenant; and
one of allowing, blocking, or limiting the traffic based on the analyzing.