×

Selectively performing man in the middle decryption

  • US 9,021,575 B2
  • Filed: 05/08/2013
  • Issued: 04/28/2015
  • Est. Priority Date: 05/08/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by data processing apparatus, the method comprising:

  • receiving, by an agent on a device within a network, a request to access a resource outside the network;

    determining that the resource is not on a whitelist that lists resources for which man-in-the-middle analysis should not amply;

    establishing a first encrypted connection having endpoints at the device and the agent;

    establishing, after the first encrypted connection is established, a second encrypted connection having endpoints at the agent and the resource, wherein the first encrypted connection and the second encrypted connection facilitate encrypted communication traffic between the device and the resource and wherein the first encrypted connection and the second encrypted connection are in different formats;

    sending, by the agent in response to receiving the request to access the resource, a policy request to a network appliance within the network, the request specifying the resource, wherein the network appliance is different than the device;

    receiving, by the agent and from the network appliance, a policy response indicating that the resource is associated with one or more security policies of the network, wherein the security policies of the network include instructions for actions for the agent to apply to the encrypted communication traffic passing between the device and the resource, wherein the security policies of the network are policies designed to apply to traffic associated with a class of resources outside of the network; and

    decrypting and inspecting at least some of the encrypted communication traffic passing between the device and the resource.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×