Systems, methods, and computer program products for passively transforming internet protocol (IP) network traffic
First Claim
Patent Images
1. A method for passively transforming Internet protocol (IP) network traffic, the method comprising:
- (a) identifying one of an application protocol event and a business-level event in IP network traffic;
(b) transforming data associated with the identified event into a usable format; and
(c) feeding the transformed data in real-time to a backend system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products for passively transforming IP network traffic are disclosed. According to one aspect, a method includes identifying one of an application protocol event and a business-level event in IP network traffic. Data associated with the identified event can be transformed into a usable format. Further, the transformed data can be fed in real-time to a backend system.
62 Citations
60 Claims
-
1. A method for passively transforming Internet protocol (IP) network traffic, the method comprising:
-
(a) identifying one of an application protocol event and a business-level event in IP network traffic; (b) transforming data associated with the identified event into a usable format; and (c) feeding the transformed data in real-time to a backend system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for passively transforming Internet protocol (IP) network traffic, the system comprising:
-
(a) a capture engine configured to identify one of an application protocol event and a business-level event in IP network traffic; (b) a transformation engine configured to transform data associated with the identified event into a usable format; and (c) a feed engine configured to feed the transformed data in real-time to a backend system. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A computer program product comprising computer-executable instructions embodied in a computer-readable medium for performing steps comprising:
-
(a) identifying one of an application protocol event and a business-level event in IP network traffic; (b) transforming data associated with the identified event into a usable format; and (c) feeding the transformed data in real-time to a backend system. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
Specification