Verifying Captured Objects Before Presentation
11 Assignments
0 Petitions
Accused Products
Abstract
Objects can be extracted from data flows captured by a capture device. Each captured object can then be classified according to content. Meta-data about captured objects can be stored in a tag. In one embodiment, the present invention includes receiving a request to present a previously captured object to a user, accessing a tag associated with the requested object, the tag containing metadata related to the object, the metadata including an object signature, and verifying that the object has not been altered since capture using the object signature before presenting the object to the user.
-
Citations
46 Claims
-
1-26. -26. (canceled)
-
27. A method, comprising:
-
receiving a request to present a previously captured object to a user, wherein the captured object was intercepted by a capture system configured to intercept packets from data streams, and store network transmitted objects from the data streams according to a capture rule that defines which objects are to be captured by the capture system; accessing a tag associated with the object being requested, the tag containing metadata related to the object; verifying that the object has not been altered since capture using an object signature in the tag associated with the object; and presenting the object if the object and the tag are verified, and wherein if the object is not verified, then an alert is generated to indicate whether the object or the tag has been compromised. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34)
-
-
35. A capture system, comprising:
-
a memory element and a processor, the capture system being configured for; receiving a request to present a previously captured object to a user, wherein the captured object was intercepted by the capture system configured to intercept packets from data streams, and store network transmitted objects from the data streams according to a capture rule that defines which objects are to be captured by the capture system; accessing a tag associated with the object being requested, the tag containing metadata related to the object; verifying that the object has not been altered since capture using an object signature in the tag associated with the object; and presenting the object if the object and the tag are verified, and wherein if the object is not verified, then an alert is generated to indicate whether the object or the tag has been compromised. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
-
42. Logic encoded in one or more tangible media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
receiving a request to present a previously captured object to a user, wherein the captured object was intercepted by a capture system configured to intercept packets from data streams, and store network transmitted objects from the data streams according to a capture rule that defines which objects are to be captured by the capture system; accessing a tag associated with the object being requested, the tag containing metadata related to the object; verifying that the object has not been altered since capture using an object signature in the tag associated with the object; and presenting the object if the object and the tag are verified, and wherein if the object is not verified, then an alert is generated to indicate whether the object or the tag has been compromised. - View Dependent Claims (43, 44, 45, 46)
-
Specification