Methods and systems for non-intrusive analysis of secure communications
First Claim
1. A method for non-intrusive real-time analysis of secure communications between at least one first application and at least one second application, wherein the first and second applications communicate through a communication channel, comprising:
- non-intrusively and securely capturing a plurality of secure communications between the at least one first application and the at least one second application;
processing the plurality of communications to process communications from at least one physical layer to at least one network layer;
grouping the plurality of communications into a plurality of streams and adding connection meta information to each stream, wherein each stream represents a single network connection;
creating a plurality of transactions from the communications included in the plurality of streams, wherein at least one stream within the plurality of streams is encrypted; and
decrypting the at least one encrypted stream.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods and Systems for non-intrusive real-time analysis of secure communications between a first application and a second application, wherein the first and second applications communicate through a communication channel. A plurality of secure communications between the first application and the second application is non-intrusively and securely captured. The plurality of communications is processed to process communications from a physical layer to a network layer. The plurality of communications is grouped into a plurality of streams and connection meta information is added to each stream, wherein each stream represents a single network connection. A plurality of transactions is created from the communications included in the plurality of streams, wherein a stream within the plurality of streams is encrypted, and the encrypted stream is decrypted.
-
Citations
12 Claims
-
1. A method for non-intrusive real-time analysis of secure communications between at least one first application and at least one second application, wherein the first and second applications communicate through a communication channel, comprising:
-
non-intrusively and securely capturing a plurality of secure communications between the at least one first application and the at least one second application; processing the plurality of communications to process communications from at least one physical layer to at least one network layer; grouping the plurality of communications into a plurality of streams and adding connection meta information to each stream, wherein each stream represents a single network connection; creating a plurality of transactions from the communications included in the plurality of streams, wherein at least one stream within the plurality of streams is encrypted; and decrypting the at least one encrypted stream. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for non-intrusive real-time analysis of secure communications between a first application and a second application, wherein the first and second applications communicate through a communication channel, comprising:
-
a processor configured for; non-intrusively and securely capturing a plurality of secure communications between at least one first application and at least one second application; processing the plurality of communications to process communications from at least one physical layer to at least one network layer; grouping the plurality of communications into a plurality of streams and adding connection meta information to each stream, wherein each stream represents a single network connection; creating a plurality of transactions from the communications included in the plurality of streams, wherein at least one stream within the plurality of streams is encrypted; and decrypting the at least one encrypted stream. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification