Third-party platform for tokenization and detokenization of network packet data
First Claim
1. A computer implemented method for identifying and obfuscating private data in network packet, the method comprising:
- receiving, by a computer system, a network packet for analysis;
determining, by the computer system, to examine the network packet for private data;
identifying, by the computer system, private data in payload of the packet;
encrypting the private data;
storing the encrypted private data in a location separate from the payload; and
obfuscating the private data by adding a reference to the location of the encrypted private data in the payload; and
generating a new packet based on the network packet, the new packet including the reference.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for securing data. One of the methods includes receiving, by a computer system, a network packet for analysis. The method includes determining, by the computer system, to examine the network packet for private data. The method includes identifying, by the computer system, private data in payload of the packet. The method includes encrypting the private data. The method includes storing the encrypted private data in a location separate from the payload. The method also includes obfuscating the private data by adding a reference to the location of the encrypted private data in the payload.
-
Citations
21 Claims
-
1. A computer implemented method for identifying and obfuscating private data in network packet, the method comprising:
-
receiving, by a computer system, a network packet for analysis; determining, by the computer system, to examine the network packet for private data; identifying, by the computer system, private data in payload of the packet; encrypting the private data; storing the encrypted private data in a location separate from the payload; and obfuscating the private data by adding a reference to the location of the encrypted private data in the payload; and generating a new packet based on the network packet, the new packet including the reference. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer implemented method for identifying and obfuscating private data in network packet, the method comprising:
-
receiving, by a computer system, a network packet for analysis; determining, by the computer system, to examine the network packet for references to private data; identifying, by the computer system, at least one reference to private data in payload of the packet; obtaining encrypted private data based on the at least one reference to private data; decrypting the private data; replacing the tag with the private data in the payload. - View Dependent Claims (7)
-
-
8. A non-transitory computer storage medium encoded with computer program instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
-
receiving a network packet for analysis; determining to examine the network packet for private data; identifying private data in payload of the packet; encrypting the private data; storing the encrypted private data in a location separate from the payload; and obfuscating the private data by adding a reference to the location of the encrypted private data in the payload; and generating a new packet based on the network packet, the new packet including the reference. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computer storage medium for identifying and obfuscating private data in network packet, the non-transitory computer storage medium comprising:
-
receiving a network packet for analysis; determining to examine the network packet for references to private data; identifying at least one reference to private data in payload of the packet; obtaining encrypted private data based on the at least one reference to private data; decrypting the private data; replacing the tag with the private data in the payload; and generating a new packet based on the network packet, the new packet including the reference. - View Dependent Claims (14)
-
-
15. A system comprising:
-
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; receiving a network packet for analysis; determining to examine the network packet for private data; identifying private data in payload of the packet; encrypting the private data; storing the encrypted private data in a location separate from the payload; and obfuscating the private data by adding a reference to the location of the encrypted private data in the payload; and generating a new packet based on the network packet, the new packet including the reference. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer implemented system for identifying and obfuscating private data in network packet, the system comprising:
-
receiving a network packet for analysis; determining to examine the network packet for references to private data; identifying at least one reference to private data in payload of the packet; obtaining encrypted private data based on the at least one reference to private data; decrypting the private data; replacing the tag with the private data in the payload; and generating a new packet based on the network packet, the new packet including the reference. - View Dependent Claims (21)
-
Specification