×

Encrypted network traffic interception and inspection

  • US 8,578,486 B2
  • Filed: 06/18/2010
  • Issued: 11/05/2013
  • Est. Priority Date: 06/18/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating a computer comprising at least one processor, the method comprising:

  • with the at least one processor;

    intercepting a request from an application to encrypt unencrypted data by an encryption component;

    acquiring encrypted data generated by the encryption component by encrypting the unencrypted data in response to the request;

    providing the encrypted data to a data inspection facility; and

    forwarding the unencrypted data and an identifier of the encrypted data to the data inspection facility, wherein the data inspection facility establishes a correspondence between the encrypted data and the unencrypted data using the identifier of the encrypted data, wherein the data inspection facility determines whether to allow transmission of the provided encrypted data over a network based on an inspection of the corresponding unencrypted data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×