SYSTEM AND METHOD FOR DETECTION OF DATA TRAFFIC ON A NETWORK
First Claim
Patent Images
1. A method for detecting and reporting data traffic of a specific type on a network, comprising:
- using a detector connected to said network to identify a set of data packets traveling across said network that conform to at least one signature describing data complying with a voice-over-IP protocol;
using said detector to create a record of data associated with said set of data packets that conform to said signature describing data complying with a voice-over-IP protocol; and
, using said detector to transfer said record to an external computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for detecting data traffic of a specific type, such as voice-over-IP traffic, on a network. A detector connected to the network is used to identify a set of data packets traveling across the network that conform to at least one signature describing data complying with a data transmission protocol. The detector is used to manipulate the set of data packets or create a record of data associated with the set of data packets. Such record can be analyzed or transferred to an external billing system to capture revenue for the transmission of the data.
31 Citations
42 Claims
-
1. A method for detecting and reporting data traffic of a specific type on a network, comprising:
-
using a detector connected to said network to identify a set of data packets traveling across said network that conform to at least one signature describing data complying with a voice-over-IP protocol;
using said detector to create a record of data associated with said set of data packets that conform to said signature describing data complying with a voice-over-IP protocol; and
,using said detector to transfer said record to an external computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for detecting and manipulating data traffic of a specific type on a network, comprising:
-
using a detector connected to said network to identify a set of data packets traveling across said network that conform to at least one signature describing data complying with a voice-over-IP protocol; and
,using said detector to manipulate said set of data packets. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for detecting and reporting data traffic of a specific type on a network, comprising:
-
using a detector connected to said network to identify a set of data packets traveling across said network that conform to at least one signature describing data complying with a data transmission protocol;
using said detector to create a record of data associated with said set of data packets that conform to said signature describing data complying with a data transmission protocol, said record including at least one field selected from the set of fields consisting of;
a field describing an amount of data transmitted, a field describing a duration of data transmission, a field identifying a sender, or a field identifying a recipient; and
,using said detector to transfer said record to an external billing system.
-
-
26. A method for detecting and manipulating data traffic of a specific type on a network, comprising:
-
using a detector connected to said network to identify a set of data packets traveling across said network that conform to at least one signature describing data complying with a data transmission protocol; and
,using said detector to manipulate said set of data packets. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification