US 12,452,253 B2
Limiting discovery of a protected resource in a zero trust access model
Sharif Mufid-Sharif Anani, Ann Arbor, MI (US); Omar Abduljaber, Ypsilanti, MI (US); Christopher Carl Cassell, Ann Arbor, MI (US); Marc Neuberger, Ann Arbor, MI (US); David Steven Gross, Cincinnati, OH (US); and Luis Daniel Mendez, Ypsilanti, MI (US)
Assigned to CISCO TECHNOLOGY, INC., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Apr. 25, 2024, as Appl. No. 18/646,095.
Application 18/646,095 is a continuation of application No. 17/506,956, filed on Oct. 21, 2021, granted, now 12,003,512.
Prior Publication US 2024/0275794 A1, Aug. 15, 2024
Int. Cl. H04L 29/00 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/108 (2013.01) [H04L 63/0807 (2013.01); H04L 63/083 (2013.01); H04L 2463/082 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system, the system comprising:
one or more processors; and
one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components of the system to perform operations comprising:
determining that an endpoint device has attempted to execute a reverse-mapping to receive an Internet Protocol (IP) address associated with a protected resource;
communicating a token to the endpoint device based on the endpoint device successfully completing a real-time verification process;
receiving the token from the endpoint device;
determining that the token received by the endpoint device is valid; and
permitting the endpoint device to receive the IP address associated with the protected resource in response to determining that the token received by the endpoint device is valid.