×

Cryptographic policy enforcement

  • US 8,307,206 B2
  • Filed: 03/14/2011
  • Issued: 11/06/2012
  • Est. Priority Date: 01/22/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • capturing packets in a network environment;

    assembling an object from the captured packets;

    determining whether the object is encrypted;

    assigning a cryptographic status to the object; and

    determining whether the object violated a cryptographic policy, wherein the cryptographic policy comprises a set of cryptographic rules differentiating between transmissions that are required to be encrypted, transmissions that are required to be unencrypted, and transmissions that are allowed, but not required, to be encrypted.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×