×

Encrypted network traffic interception and inspection

  • US 9,118,700 B2
  • Filed: 10/01/2013
  • Issued: 08/25/2015
  • Est. Priority Date: 06/18/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating a computer comprising at least one processor, the method comprising:

  • with the at least one processor;

    receiving at least one request from an application at a first component, wherein the application directed the request to a second component configured to encrypt unencrypted data, and wherein the application is unaware of the receipt by the first component;

    receiving encrypted data generated by the second component upon the second component encrypting the unencrypted data in response to the request of the application;

    sending the encrypted data to a data inspection facility; and

    sending the unencrypted data to the data inspection facility,wherein the data inspection facility determines whether portions of the encrypted data correspond with portions of the unencrypted data, and wherein the data inspection facility determines whether to allow through-pass of the received encrypted data over a network based on, at least in part, a result of the determination of correspondence.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×