Enhanced server to client session inspection
First Claim
Patent Images
1. A method comprising:
- receiving, by an inspection device positioned in a network between a client and a server, a request from the client for response data from the server, the request including a specification of one or more forms of transforming the response data sent by the server in response to the request, wherein the one or more forms of transforming comprise at least one of encrypting the response data or compressing the response data;
modifying, by the inspection device, the request in a manner designed to prevent the server from transforming the response data in accordance with the specification;
sending, by the inspection device, the modified request to the server;
receiving, by the inspection device, the response data from the server;
determining, by the inspection device, if the response data is transformed in accordance with the specification despite the modification of the request;
if the response data is not transformed in accordance with the specification, inspecting, by the inspection device, the response data for malicious content; and
if the response data is transformed in accordance with the specification, concluding, by the inspection device, the server is untrustworthy and taking one or more predetermined actions.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a technique for enhancing the inspection of data sent from a server is provided. By modifying a client request in an effort to prevent the transformation (e.g., encoding and/or compression) of data by the server, unencoded data may be received, which can be inspected without the overhead associated with first decoding the data. Further, in the event the data is encoded despite modifying the client request to prevent such encoding, the server may be untrustworthy and one or more appropriate actions may be taken.
39 Citations
12 Claims
-
1. A method comprising:
-
receiving, by an inspection device positioned in a network between a client and a server, a request from the client for response data from the server, the request including a specification of one or more forms of transforming the response data sent by the server in response to the request, wherein the one or more forms of transforming comprise at least one of encrypting the response data or compressing the response data; modifying, by the inspection device, the request in a manner designed to prevent the server from transforming the response data in accordance with the specification; sending, by the inspection device, the modified request to the server; receiving, by the inspection device, the response data from the server; determining, by the inspection device, if the response data is transformed in accordance with the specification despite the modification of the request; if the response data is not transformed in accordance with the specification, inspecting, by the inspection device, the response data for malicious content; and if the response data is transformed in accordance with the specification, concluding, by the inspection device, the server is untrustworthy and taking one or more predetermined actions. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving, by an inspection device positioned in a network between a client and a server, a request from the client, the request including a specification of one or more forms of transforming response data sent by the server in response to the request, wherein the one or more forms of transforming comprise at least one of encrypting the response data or compressing the response data; modifying, by the inspection device, the request to remove at least one of the forms of transforming from the specification; sending, by the inspection device, the modified request to the server; determining, by the inspection device, if the response data is transformed in accordance with the specification despite the modification of the request; inspecting, by the inspection device, the response data from the server for malicious content if the response data is not transformed or is transformed using a form of transforming specified in the modified request; and concluding, by the inspection device, the server is untrustworthy and taking one or more predetermined actions if the response data is transformed using a form of transforming that is not specified in the modified request. - View Dependent Claims (9, 10, 11, 12)
-
Specification