Secure data flow open information analytics
First Claim
1. A system for processing a secure data flow, the system comprising:
- a servicing node comprising at least one processor, wherein the servicing node is operable to;
receive a data packet;
determine that the data packet is associated with the secure data flow;
obtain subscriber data associated with the data packet; and
relay the unsecure data to a network controller for behavioral analysis; and
an analyzing unit comprising at least one processor, wherein the analyzing unit is operable to;
analyze the data packet, wherein the analyzing of the data packet includes analyzing unsecure data associated with the data packet;
based on the analysis, classify the secure data flow; and
process the secure data flow based on the subscriber data and based on the classification of the secure data flow.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are methods and systems for processing a secure data flow. An example method for processing a secure data flow includes receiving a data packet, determining network conditions associated with the data traffic, and determining that the data packet is associated with the secure data flow. Upon determination that the data packet is associated with the secure data flow, the data packet is analyzed. Thereafter, the method proceeds to classify the secure data flow based on the analysis. Subscriber data associated with the data packet may be obtained. The method can then process the secure data flow based on the subscriber data and the classification of the secure data flow.
-
Citations
20 Claims
-
1. A system for processing a secure data flow, the system comprising:
-
a servicing node comprising at least one processor, wherein the servicing node is operable to; receive a data packet; determine that the data packet is associated with the secure data flow; obtain subscriber data associated with the data packet; and relay the unsecure data to a network controller for behavioral analysis; and an analyzing unit comprising at least one processor, wherein the analyzing unit is operable to; analyze the data packet, wherein the analyzing of the data packet includes analyzing unsecure data associated with the data packet; based on the analysis, classify the secure data flow; and process the secure data flow based on the subscriber data and based on the classification of the secure data flow. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for processing a secure data flow, the method comprising:
-
receiving, by a servicing node, a data packet; determining that the data packet is associated with the secure data flow; analyzing the data packet; based on the analyzing, classifying the secure data flow; obtaining subscriber data associated with the data packet; and processing the secure data flow based on the subscriber data and based on the classification of the secure data flow, wherein the processing of the secure data flow includes one or more of the following;
providing a security policy associated with the secure data flow to a further servicing node and providing a relay policy associated with the secure data flow to the further servicing node. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for processing a secure data flow, the system comprising:
-
a servicing node comprising at least one processor, wherein the servicing node is operable to; receive a data packet; determine that the data packet is associated with the secure data flow, wherein the determining that the data packet is associated with the secure data flow includes determining that a payload associated with the data packet is encrypted; obtain subscriber data associated with the data packet, wherein the obtaining of the subscriber data includes; obtaining host data associated with the data packet; and matching the host data to a subscriber in a database; and relay unsecure data to a network controller for behavioral analysis; and an analyzing unit comprising at least one processor, wherein the analyzing unit is operable to; analyze the data packet, wherein the analyzing of the data packet includes analyzing of the unsecure data associated with the data packet; based on the analyzing, classify the secure data flow; and process the secure data flow based on the subscriber data and based on the classifying of the secure data flow. - View Dependent Claims (18, 19, 20)
-
Specification