发明名称 |
Methods and systems for non-intrusive analysis of secure communications |
摘要 |
Methods and Systems for non-intrusive real-time analysis of secure communications between a first application and a second application, wherein the first and second applications communicate through a communication channel. A plurality of secure communications between the first application and the second application is non-intrusively and securely captured. The plurality of communications is processed to process communications from a physical layer to a network layer. The plurality of communications is grouped into a plurality of streams and connection meta information is added to each stream, wherein each stream represents a single network connection. A plurality of transactions is created from the communications included in the plurality of streams, wherein a stream within the plurality of streams is encrypted, and the encrypted stream is decrypted. |
申请公布号 |
US9137215(B2) |
申请公布日期 |
2015.09.15 |
申请号 |
US201113330225 |
申请日期 |
2011.12.19 |
申请人 |
BORLAND SOFTWARE CORPORATION |
发明人 |
Greifeneder Bernd;Reichl Bernhard;Spiegl Helmut;Schwarzbauer Gunter |
分类号 |
G06F15/16;H04L29/06 |
主分类号 |
G06F15/16 |
代理机构 |
DLA Piper LLP (US) |
代理人 |
DLA Piper LLP (US) |
主权项 |
1. A method for non-intrusive real-time analysis of secure communications between at least one first application and at least one second application, wherein the first and second applications communicate through a communication channel, comprising:
non-intrusively and securely capturing a plurality of secure communications between the at least one first application and the at least one second application; processing the plurality of communications to process communications from at least one physical layer to at least one network layer; grouping the plurality of communications into a plurality of streams and adding connection meta information to each stream, wherein each stream represents a single network connection; creating a plurality of transactions from the communications included in the plurality of streams, wherein at least one stream within the plurality of streams is encrypted; and decrypting the at least one encrypted stream. |
地址 |
Austin TX US |