Zscaler, Inc.
Protecting PII data from man-in-the-middle attacks in a network

Last updated:

Abstract:

Systems and methods include receiving a request from a client with the request including an authentication token as a request header, wherein the authentication token includes a first encryption key, a second encryption key, and a timestamp; decrypting the authentication token with a private key of the server to obtain the first encryption key, the second encryption key, and the timestamp; and validating the request based on the first encryption key and the timestamp, and, if valid, decrypting payload of the request with the second encryption key.

Status:
Grant
Type:

Utility

Filling date:

11 Sep 2019

Issue date:

26 Jan 2021