US 12,438,732 B2
Systems and methods for automatic secure sockets layer (SSL) bypass
Lidor Pergament, San Mateo, CA (US); Srikanth Devarajan, Cupertino, CA (US); and Akshat Maheshwari, Bangalore (IN)
Assigned to Zscaler, Inc., San Jose, CA (US)
Filed by Zscaler, Inc., San Jose, CA (US)
Filed on May 16, 2023, as Appl. No. 18/318,496.
Application 18/318,496 is a continuation in part of application No. 17/715,137, filed on Apr. 7, 2022, granted, now 11,750,405.
Application 17/715,137 is a continuation of application No. 16/863,475, filed on Apr. 30, 2020, granted, now 11,394,563, issued on Jul. 19, 2022.
Claims priority of application No. 202311023890 (IN), filed on Mar. 30, 2023.
Prior Publication US 2023/0308293 A1, Sep. 28, 2023
Int. Cl. H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3263 (2013.01) [H04L 63/0428 (2013.01); H04L 63/1416 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising steps of:
detecting a first failed client Secure Sockets Layer (SSL) connection based on a client SSL handshake error;
creating a cache entry including a traffic fingerprint derived from handshake metadata of the first failed client SSL connection; and
bypassing SSL inspection for subsequent connections matching the cached fingerprint of the first failed client SSL connection, without performing content-type determination or using destination-based bypass lists.