US 12,088,607 B2
Endpoint-assisted inspection of encrypted network traffic
Martin Rehak, Prague (CZ); David McGrew, Poolesville, MD (US); Blake Harrell Anderson, Chapel Hill, NC (US); and Scott William Dunlop, Des Moines, WA (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, MA (US)
Filed on Feb. 29, 2024, as Appl. No. 18/592,137.
Application 18/592,137 is a continuation of application No. 18/416,439, filed on Jan. 18, 2024.
Application 18/416,439 is a continuation of application No. 17/722,131, filed on Apr. 15, 2022, granted, now 11,916,932, issued on Feb. 27, 2024.
Application 17/722,131 is a continuation of application No. 16/100,361, filed on Aug. 10, 2018, granted, now 11,310,246, issued on Apr. 19, 2022.
Prior Publication US 2024/0205244 A1, Jun. 20, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1416 (2013.01) [H04L 63/02 (2013.01); H04L 63/0428 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); H04L 63/20 (2013.01); H04L 63/166 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
monitoring, by a monitoring agent executing on an endpoint device, a memory space of the endpoint device associated with an application or a dedicated process hosted by the endpoint device;
detecting from the memory space, by the monitoring agent, a handshake initiated between an application hosted on the endpoint device and a remote entity, the handshake initiated to establish an encrypted traffic session between the application and the remote entity;
capturing from the memory space of the endpoint device, by the monitoring agent, session key information for the encrypted traffic session between the endpoint device and the remote entity, wherein session keys are established during the handshake and are obtained after the encrypted traffic session is formed;
transmitting the session key information to a traffic inspection service hosted on an intermediary device located between the endpoint device and the remote entity over a secure connection;
using, by the traffic inspection service, the session key information to decrypt encrypted traffic from the encrypted traffic session, resulting in decrypted traffic;
applying, by the traffic inspection service and based on the decrypted traffic comprising cleartext from the encrypted traffic session, a policy to the encrypted traffic session between the endpoint device and the remote entity to determine whether the decrypted traffic is malicious or against the policy; and
performing, by the traffic inspection service, a mitigation action in response to a determination that the decrypted traffic is malicious or against the policy.