System and method for encrypting audit information in network applications
First Claim
1. A method for recording a user session in a computer environment including a client and a server, the user session comprising at least one request and at least one response between the client and the server, the method comprising:
- receiving at least one request from the client at the server;
capturing at the server the at least one request and first environmental data associated with the computer environment;
capturing at the server at least one response to the at least one request sent from the server to the client and second environmental data associated with the computer environment; and
encrypting the user session based on a client key and a server key such that neither the client nor the server can decrypt the user session without the consent of the other.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for auditing network applications captures transmissions during a user session between a client and a server. An auditor capture filter captures each request from the client and each response by the server to each request. An auditor encryption module encrypts the captured requests and the captured responses with an encryption key and stores them in an auditor storage. The auditor encryption module also distributes portions of the encryption key to the client and the server. An auditor decryption module collects the portions of the encryption key from the client and the server and decrypts the encrypted requests and the encrypted responses. An auditor analyzer may then use the decrypted requests and the decrypted responses to recreate the user session to thereby analyze what transpired during the user session. In addition, the analyzer may also verify that a particular event occurred during the user session.
130 Citations
13 Claims
-
1. A method for recording a user session in a computer environment including a client and a server, the user session comprising at least one request and at least one response between the client and the server, the method comprising:
-
receiving at least one request from the client at the server;
capturing at the server the at least one request and first environmental data associated with the computer environment;
capturing at the server at least one response to the at least one request sent from the server to the client and second environmental data associated with the computer environment; and
encrypting the user session based on a client key and a server key such that neither the client nor the server can decrypt the user session without the consent of the other. - View Dependent Claims (2, 3)
verifying that the user session has not been tampered with.
-
-
3. The method of claim 2, further comprising:
-
decrypting the user session based on the client key and the server key; and
recreating the user session at the server.
-
-
4. A method for recording a user session in a computer environment including multiple clients and a server, the user session comprising requests and responses between the clients and the server, the method comprising:
-
receiving requests from the clients at the server;
capturing at the server the requests and first environmental data associated with the computer environment;
capturing at the server responses to the requests sent from the server to the clients and second environmental data associated with the computer environment;
encrypting the user session based on a key;
separating the key into key parts; and
distributing to each client and the server a different key part, such that the user session cannot be decrypted without the participation of all clients and the server. - View Dependent Claims (5, 6, 7)
providing each client and the server with identifying information for locating each client and the server.
-
-
6. The method of claim 5, further comprising:
verifying that the user session has not been tampered with.
-
7. The method of claim 5, further comprising:
-
collecting the different key parts from the clients and the server;
decrypting the user session based on the client key and the server key; and
recreating the user session at the server.
-
-
8. A system for recording a user session in a computer environment including a client and a server comprising:
-
a communication link between the client and the server, a memory, and an auditor capture filter capable of receiving at least one request from the client at the server;
capturing at the server the at least one request and first environmental data associated with the computer environment;
capturing at the server at least one response to the at least one request sent from the server to the client and second environmental data associated with the computer environment; and
encrypting the user session based on a client key and a server key such that neither the client nor the server can decrypt the user session without the consent of the other. - View Dependent Claims (9, 10)
verifying that the user session has not been tampered with.
-
-
10. The system of claim 8, wherein the auditor capture filter is further capable of:
-
decrypting the user session based on the client key and the server key; and
recreating the user session at the server.
-
-
11. A system for recording a user session in a computer environment including a client and a server comprising:
-
a communication link between the client and the server, a memory, and an auditor capture filter capable of receiving requests from the clients at the server;
capturing at the server the requests and first environmental data associated with the computer environment;
capturing at the server responses to the requests sent from the server to the clients and second environmental data associated with the computer environment;
encrypting the user session based on a key;
separating the key into key parts; and
distributing to each client and the server a different key part, such that the user session cannot be decrypted without the participation of all clients and the server. - View Dependent Claims (12, 13)
providing each client and the server with identifying information for locating each client and the server.
-
-
13. The system of claim 11, wherein the auditor capture filter is further capable of:
verifying that the user session has not been tampered with.
Specification