×

Selectively performing man in the middle decryption

  • US 9,781,082 B2
  • Filed: 03/10/2016
  • Issued: 10/03/2017
  • Est. Priority Date: 05/08/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a network hosting a policy manager and a first plurality of clients each of the first plurality of client comprising an agent; and

    a second plurality of clients, each of the second plurality of clients external to the network and communicably coupled with the policy manager, wherein each of the second plurality of clients comprises an agent;

    the policy manager configured to;

    receive, from each of the agents of the first plurality of clients and from each of the agents of the second plurality of clients, policy requests; and

    return, responsive to receiving the policy, a corresponding policy response indicating a policy;

    wherein the agents are configured to;

    receive, from the agent'"'"'s client, a resource request;

    responsive to receiving the resource request, send to the policy manager the policy requests;

    receive, from the policy manager, the corresponding policy responses; and

    apply, to the agent'"'"'s client, the policy indicated by the corresponding policy response to the resource request;

    wherein to apply the policy indicated by the corresponding policy response to the resource request, the agent is further configured to;

    receive first encrypted communication traffic from a first encrypted connection;

    decrypt the first encrypted communication traffic into first decrypted communication traffic;

    inspect the first decrypted communication traffic;

    encrypt the first decrypted communication traffic into second encrypted communication traffic;

    transmit, to the agent'"'"'s client, the second encrypted communication traffic on a second encrypted connection;

    receive third encrypted communication traffic from the agent'"'"'s client on the second encrypted connection;

    decrypt the third encrypted communication traffic into second decrypted communication traffic;

    inspect the second decrypted communication traffic;

    encrypt the second decrypted communication traffic into fourth encrypted communication traffic; and

    send the fourth encrypted communication traffic on the first encrypted connection.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×