Claims
- 1. An encrypted packet inspection (EPI) method, comprising:
noninvasively receiving, as an authorized third party, an encrypted packet, the packet being sent in a cryptographic session from a first computing device and addressed to a second computing device; and decrypting the encrypted packet, whereby a plaintext packet results.
- 2. The method of claim 1, further comprising sending the plaintext packet responsively to a request from a third computing device.
- 3. The method of claim 1, further comprising sending the plaintext packet automatically to a third computing device.
- 4. The method of claim 1, further comprising monitoring the first and second computing devices' cryptographic handshaking information as an authorized third party to ascertain symmetric keys to be used for bulk encryption, whereby the cryptographic session is created.
- 5. The method of claim 4, wherein the receiving, the decrypting, and the monitoring are performed within the context of a firewall.
- 6. The method of claim 5, further comprising applying layer 5-7 intrusion detection tools to the plaintext.
- 7. The method of claim 5, further comprising applying URL blocking to the plaintext.
- 8. The method of claim 5, further comprising applying URL tracking to the plaintext.
- 9. The method of claim 4, wherein the receiving, the decrypting, and the monitoring are performed within the context of a load balancer.
- 10. The method of claim 9, further comprising making load balancing decisions based on the plaintext.
- 11. The method of claim 10, wherein the plaintext includes cookie information.
- 12. The method of claim 10, wherein the plaintext includes URL information.
- 13. The method of claim 4, wherein the receiving, the decrypting, and the monitoring are performed within the context of a local network caching system.
- 14. The method of claim 13, further comprising monitoring the cryptographic session for content cache hits without terminating the cryptographic session.
- 15. The method of claim 4, further comprising transmitting new content in the middle of the cryptographic session without awareness by either the first computing device or the second computing device.
- 16. The method of claim 4, wherein the cryptographic handshaking is SSL/TLS handshaking and wherein the cryptographic session is a SSL/TLS session.
- 17. The method of claim 4, wherein the cryptographic handshaking is IPSec handshaking and wherein the cryptographic session is an IPSec session.
- 18. An encrypted packet inspection (EPI) system comprising:
an EPI device; a system application circuitry; a first computing device; a second computing device; wherein the first and second computing devices are configured to establish a cryptographic session and to send and receive encrypted information over the cryptographic session; wherein the cryptographic session passes through the system application circuitry; wherein the EPI device is configured to receive communications of the cryptographic session; wherein the EPI device is configured to decrypt encrypted communications of the cryptographic session, producing plaintext; and wherein the EPI device sends the plaintext to the system application circuitry.
- 19. The system of claim 18, wherein the EPI device operates within a firewall.
- 20. The system of claim 18, wherein the EPI device operates within a load balancer.
- 21. The system of claim 18, wherein the EPI device operates within a local network caching system.
- 22. The system of claim 18, wherein the cryptographic session includes an SSL/TLS session.
- 23. An encrypted packet inspection (EPI) system comprising:
a first computing device; a second computing device; an EPI device; a system application circuitry including a content cache configured to provide cache inserted content; wherein the first computing device and the second computing device are configured to establish an cryptographic session; wherein the EPI device is configured to intermediate the cryptographic session; wherein the EPI device is configured to decrypt encrypted packets communicated in the cryptographic session, producing plaintext; wherein the EPI device is configured to send the plaintext to the system application circuitry; and wherein the system application circuitry is configured to send the plaintext and cache inserted text to the EPI device.
- 24. The system of claim 23, further comprising:
a table configured to hold the first computing device's and the second computing device's private keys; wherein the EPI device is configured to access the table to decrypt incoming packets with the appropriate symmetric key to stay in sync; and wherein the EPI device is further configured to encrypt outgoing packets with the appropriate symmetric key to stay in sync.
- 25. The system of claim 24, wherein the EPI device operates within a firewall.
- 26. The system of claim 24, wherein the EPI device operates within a load balancer.
- 27. The system of claim 24, wherein the EPI device operates within a local network caching system.
- 28. The system of claim 24, wherein the cryptographic session includes an SSL/TLS session.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of the following U.S. Provisional Applications, all of which are hereby incorporated by reference:
1COMMONLY OWNED AND PREVIOUSLY FILEDU.S. PROVISIONAL PATENT APPLICATIONSAtty. Dkt. #Ser. No.TitleFiling Date501143.00001160/300,955Add-Drop Layer 3 Ethernet Ring SwitchJun. 26, 2001501431.00001460/326,266Application Specific Information ProcessingOct. 1, 2001System501143.00002660/357,243Encrypted Packet InspectionFeb. 15, 2002
[0002] The current application may share some specification and figures with the following commonly owned and previously filed application, which is hereby incorporated by reference:
2COMMONLY OWNED AND PREVIOUSLY FILEDU.S. NONPROVISIONAL PATENT APPLICATIONSAtty. Dkt. #Ser. No.TitleFiling Date501143.00001910/068,295Application-Specific Information-ProcessingFeb. 5, 2002Method, System, and Apparatus
[0003] The benefit of 35 U.S.C. §120 is claimed to the maximum extent allowable by law for all of the above referenced commonly owned applications. The contents of the applications referenced in the tables above are not necessarily identical to the contents of this application.
[0004] All references cited hereafter are incorporated by reference to the maximum extent allowable by law. To the extent a reference may not be fully incorporated herein, it is incorporated by reference for background purposes and indicative of the knowledge of one of ordinary skill in the art.
Provisional Applications (3)
|
Number |
Date |
Country |
|
60300955 |
Jun 2001 |
US |
|
60326266 |
Oct 2001 |
US |
|
60357243 |
Feb 2002 |
US |