US 12,218,961 B2
Techniques for securing computing interfaces
Shay Levi, Tel Aviv (IL); Oz Golan, Ramat Gan (IL); Hila Zigman, Hod Hasharon (IL); Oren Shpigel, Tel Aviv (IL); Netanel Maman, Mazkeret Batia (IL); and Yuval Alkalai Tavori, Ramat Gan (IL)
Assigned to Noname Gate Ltd., Tel Aviv (IL)
Filed by NONAME GATE LTD., Tel Aviv-Jaffa (IL)
Filed on Jan. 21, 2021, as Appl. No. 17/154,764.
Prior Publication US 2022/0232023 A1, Jul. 21, 2022
Int. Cl. H04L 9/40 (2022.01); G06F 16/25 (2019.01); H04L 41/0866 (2022.01); H04L 43/16 (2022.01); H04L 67/14 (2022.01)
CPC H04L 63/1425 (2013.01) [G06F 16/258 (2019.01); H04L 41/0866 (2013.01); H04L 43/16 (2013.01); H04L 63/1416 (2013.01); H04L 67/14 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for identifying computing interface calls using communications protocols, comprising:
extracting data from a communications session involving communication between a first computing interface and a second computing interface, wherein the communication between the first computing interface and the second computing interface is implemented via a plurality of communication protocol layers, wherein extracting the data from the communications session further comprises building at least one layer of the plurality of communication protocol layers based on a portion of the data extracted from at least one other layer of the plurality of communication protocol layers;
duplicating traffic for the communications session based on the extracted data to produce duplicated traffic, wherein duplicating the traffic includes converting the extracted data into a unified data modeling format that at least in part is protocol-agnostic such that at least some of the duplicated traffic is protocol-agnostic; and
identifying at least one computing interface call based at least in part on the protocol-agnostic duplicated traffic.