SYSTEM AND METHOD OF ANALYZING CONTENT OF ENCRYPTED NETWORK TRAFFIC Russian patent published in 2019 - IPC G06F21/00 

Abstract RU 2706894 C1

FIELD: information technology.

SUBSTANCE: present invention is intended to obtain access to encrypted data within a secure network connection between processes. A method of analyzing content of encrypted traffic between processes, according to which: storing a list of function addresses, which is characterized by that it returns a session encryption key generated when establishing a secure connection between processes; addresses of said function correspond to different applications and versions thereof; process is an application; introducing a program module into the address space of one process using an agent; redirecting traffic between processes through a proxy server using an agent; detecting, using a proxy server, a secure connection between processes; using a software module embedded in the address space of the process, obtaining a session encryption key by calling a function at an address corresponding to the version of the application from said list; antivirus protection means analyze traffic between processes decrypted by means of said session encryption key.

EFFECT: wider range of means for realizing the purpose of the claimed invention.

10 cl, 3 dwg

Similar patents RU2706894C1

Title Year Author Number
SAFE AUTHENTICATION WITH LOGIN AND PASSWORD IN INTERNET NETWORK USING ADDITIONAL TWO-FACTOR AUTHENTICATION 2016
  • Petrovichev Dmitrij Leonidovich
  • Baranov Artem Olegovich
  • Goncharov Evgenij Viktorovich
RU2635276C1
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS 2010
  • Zajtsev Oleg Vladimirovich
  • Denisov Vitalij Igorevich
RU2446459C1
SYSTEM AND METHOD FOR ENCRYPTION DURING WEBPAGE TRANSMITTING TO THE USER APPLICATION 2015
  • Kupreev Oleg Viktorovich
  • Kuskov Vladimir Anatolevich
  • Samuleenkov Aleksej Andreevich
RU2614928C1
CLOUD SERVICE SECURITY BROKER AND PROXY 2014
  • Koem Aviram
  • Mojsi Liran
  • Lyuttvak Ami
  • Reznik Roj
  • Vishnepolski Greg
RU2679549C2
INTELLIGENT BOTS DETECTION AND PROTECTION SYSTEM AND METHOD 2020
  • Krylov Pavel Vladimirovich
  • Batenev Aleksandr Viktorovich
RU2738337C1
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS 2012
  • Zajtsev Oleg Vladimirovich
RU2514137C1
SYSTEM AND METHOD OF PROVIDING SAFETY OF ONLINE TRANSACTIONS 2013
  • Monastyrskij Aleksej Vladimirovich
  • Golovanov Sergej Yurevich
  • Martynenko Vladislav Valerevich
  • Rusakov Vyacheslav Evgenevich
RU2587423C2
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC SECURITY AS SERVICE 2014
  • Klausen Mark A.
  • Gatri Kristofer
  • Rou Tomas Artur Ml.
  • Leffler Brajan
  • Kosuri Vivek
RU2630751C2
IMPLEMENTING SECURE INFORMATION EXCHANGE IN RUNTIME SYSTEM 2012
  • Rot Gregori B.
  • Krakhen Erik D.
  • Ber Grem D.
  • Brenduajn Erik Dzh.
  • Fitch Natan R.
RU2584570C2
MULTI-TUNNEL ADAPTER OF VIRTUAL COMPUTER NETWORK 2015
  • Glazemakers, Kurt
  • Allansson, Per Johan
RU2675147C1

RU 2 706 894 C1

Authors

Kogan Sergej Volfovich

Rodionov Denis Vyacheslavovich

Makarov Aleksandr Nikolaevich

Totmakov Aleksej Sergeevich

Kolmakov Petr Yurevich

Dates

2019-11-21Published

2018-06-29Filed