Invention Grant
US09176838B2 Encrypted data inspection in a network environment 有权
在网络环境中加密数据检查

Encrypted data inspection in a network environment
Abstract:
Technologies are provided in example embodiments for analyzing an encrypted network flow. The technologies include monitoring the encrypted network flow between a first node and a second node, the network flow initiated from the first node; duplicating the encrypted network flow to form a copy of the encrypted network flow; decrypting the copy of the encrypted network flow using a shared secret, the shared secret associated with the first node and the second node; and scanning the network flow copy for targeted data.
Public/Granted literature
Information query
Patent Agency Ranking
0/0