US 12,355,767 B2
Securing local network traffic using cloud computing
Abhinav Bansal, San Jose, CA (US); and Rohit Goyal, Mohali (IN)
Assigned to Zscaler, Inc., San Jose, CA (US)
Filed by Zscaler, Inc., San Jose, CA (US)
Filed on Apr. 15, 2021, as Appl. No. 17/231,060.
Application 17/231,060 is a continuation in part of application No. 16/922,353, filed on Jul. 7, 2020, granted, now 11,533,307.
Application 16/922,353 is a continuation in part of application No. 15/900,951, filed on Feb. 21, 2018, granted, now 10,986,094.
Application 15/900,951 is a continuation of application No. 15/153,108, filed on May 12, 2016, granted, now 9,935,955, issued on Apr. 3, 2018.
Claims priority of application No. 201611010521 (IN), filed on Mar. 28, 2016; and application No. 202111008924 (IN), filed on Mar. 3, 2021.
Prior Publication US 2021/0234860 A1, Jul. 29, 2021
Int. Cl. H04L 9/40 (2022.01); H04L 61/4511 (2022.01); H04L 67/02 (2022.01); H04L 67/10 (2022.01); H04L 67/1001 (2022.01); H04L 67/125 (2022.01); H04L 67/51 (2022.01); H04L 67/56 (2022.01); H04L 67/563 (2022.01); H04L 67/564 (2022.01); H04L 69/16 (2022.01); H04L 101/663 (2022.01)
CPC H04L 63/0884 (2013.01) [H04L 61/4511 (2022.05); H04L 63/0272 (2013.01); H04L 63/0281 (2013.01); H04L 67/02 (2013.01); H04L 67/10 (2013.01); H04L 67/1001 (2022.05); H04L 67/125 (2013.01); H04L 67/51 (2022.05); H04L 67/56 (2022.05); H04L 67/563 (2022.05); H04L 67/564 (2022.05); H04L 69/162 (2013.01); H04L 2101/663 (2022.05)] 17 Claims
OG exemplary drawing
 
1. A non-transitory computer-readable medium configured to store executable instructions enabling a processor of a user device to perform the steps of:
intercepting network packets originating from one or more source applications operating on the user device,
discovering an origin source application of the one or more source applications associated with the network packets bound for a private address space,
recording a tuple associated with the discovered origin source application, the tuple defining a sequenced list related to the source application comprising any of an application name and a network type,
sending the tuple regarding the discovered origin source application to a cloud server to request an analysis of the tuple,
upon receiving an allow instruction from the cloud server, allowing the network packets to flow normally to a destination associated with the private address space, and
upon receiving a deny instruction from the cloud server, dropping the network packets, wherein upon receiving a caution instruction from the cloud server, the executable instructions further enable the processor to allow the network packets to flow normally and redirect a copy of the network packets and additional network transaction information to the cloud server for further analysis of the tuple.