Verifying captured objects before presentation
First Claim
Patent Images
1. A method, comprising:
- receiving a request to present a previously captured object to a user, wherein the captured object was intercepted by a capture system configured to intercept packets from data streams, and store network transmitted objects from the data streams according to a capture rule that defines which objects are to be captured by the capture system;
accessing a tag associated with the object being requested, the tag containing metadata related to the object, wherein the metadata includes an object signature;
verifying the tag has not been altered using a tag signature, wherein the tag signature is generated using at least a portion of the metadata, wherein the portion of the metadata used to generate the tag signature contains the object signature;
verifying that the object has not been altered since capture using the object signature in the tag associated with the object; and
presenting the object if the object and the tag are verified, and wherein if either the object or the tag is not verified, then an alert is generated to indicate whether the object or the tag has been compromised.
11 Assignments
0 Petitions
Accused Products
Abstract
Objects can be extracted from data flows captured by a capture device. Each captured object can then be classified according to content. Meta-data about captured objects can be stored in a tag. In one embodiment, the present invention includes receiving a request to present a previously captured object to a user, accessing a tag associated with the requested object, the tag containing metadata related to the object, the metadata including an object signature, and verifying that the object has not been altered since capture using the object signature before presenting the object to the user.
-
Citations
17 Claims
-
1. A method, comprising:
-
receiving a request to present a previously captured object to a user, wherein the captured object was intercepted by a capture system configured to intercept packets from data streams, and store network transmitted objects from the data streams according to a capture rule that defines which objects are to be captured by the capture system; accessing a tag associated with the object being requested, the tag containing metadata related to the object, wherein the metadata includes an object signature; verifying the tag has not been altered using a tag signature, wherein the tag signature is generated using at least a portion of the metadata, wherein the portion of the metadata used to generate the tag signature contains the object signature; verifying that the object has not been altered since capture using the object signature in the tag associated with the object; and presenting the object if the object and the tag are verified, and wherein if either the object or the tag is not verified, then an alert is generated to indicate whether the object or the tag has been compromised. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A capture system, comprising:
-
a memory element and a processor, the capture system being configured for; receiving a request to present a previously captured object to a user, wherein the captured object was intercepted by the capture system configured to intercept packets from data streams, and store network transmitted objects from the data streams according to a capture rule that defines which objects are to be captured by the capture system; accessing a tag associated with the object being requested, the tag containing metadata related to the object, wherein the metadata includes an object signature; verifying the tag has not been altered using a tag signature, wherein the tag signature is generated using at least a portion of the metadata, wherein the portion of the metadata used to generate the tag signature contains the object signature; verifying that the object has not been altered since capture using the object signature in the tag associated with the object; and presenting the object if the object and the tag are verified, and wherein if either the object or the tag is not verified, then an alert is generated to indicate whether the object or the tag has been compromised. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. Logic encoded in one or more non-transitory tangible media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
receiving a request to present a previously captured object to a user, wherein the captured object was intercepted by a capture system configured to intercept packets from data streams, and store network transmitted objects from the data streams according to a capture rule that defines which objects are to be captured by the capture system; accessing a tag associated with the object being requested, the tag containing metadata related to the object, wherein the metadata includes an object signature; verifying the tag has not been altered using a tag signature, wherein the tag signature is generated using at least a portion of the metadata, wherein the portion of the metadata used to generate the tag signature contains the object signature; verifying that the object has not been altered since capture using the object signature in the tag associated with the object; and presenting the object if the object and the tag are verified, and wherein if either the object or the tag is not verified, then an alert is generated to indicate whether the object or the tag has been compromised. - View Dependent Claims (15, 16, 17)
-
Specification