×

Auditing and controlling encrypted communications

  • US 20130191630A1
  • Filed: 01/24/2013
  • Published: 07/25/2013
  • Est. Priority Date: 01/24/2012
  • Status: Abandoned Application
First Claim
Patent Images

1. A method comprising:

  • causing intercepting by a first computing device an encrypted communication between a first endpoint and a second endpoint;

    causing performing a man-in-the-middle attack on the encrypted communication, the man-in-the-middle attack establishing a first set of encryption keys between the first endpoint and the first computing device and a second set of encryption keys between the first computing device and the second endpoint and providing access to at least a part of the plaintext of the encrypted communication; and

    causing transmitting information obtained using the man-in-the-middle attack to an audit server distinct from the first computing device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×