Zscaler, Inc.
Protecting PII data from man-in-the-middle attacks in a network
Last updated:
Abstract:
Systems and methods include receiving a request from a client with the request including an authentication token as a request header, wherein the authentication token includes a first encryption key, a second encryption key, and a timestamp; decrypting the authentication token with a private key of the server to obtain the first encryption key, the second encryption key, and the timestamp; and validating the request based on the first encryption key and the timestamp, and, if valid, decrypting payload of the request with the second encryption key.
Status:
Grant
Type:
Utility
Filling date:
11 Sep 2019
Issue date:
26 Jan 2021