System and Method for Identifying Encrypted Conference Media Traffic
First Claim
1. A method for identifying conference media traffic comprising:
- receiving a plurality of dummy packets;
matching a series of the plurality of dummy packets to a signature key;
extracting a first identification from one or more of the plurality of dummy packets in response to matching a series of the plurality of dummy packets to a signature key;
determining that a second identification associated with one or more encrypted media packets matches the first identification; and
associating one or more encrypted media packets with a conference in response to determining that the first identification matches the second identification.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for identifying conference media traffic includes receiving a plurality of dummy packets and matching a series of the plurality of dummy packets to a signature key. The method also includes extracting a first identification from one or more of the plurality of dummy packets in response to matching a series of the plurality of dummy packets to a signature key and determining that a second identification associated with one or more encrypted media packets matches the first identification. The method also includes associating one or more encrypted media packets with a conference in response to determining that the first identification matches the second identification.
-
Citations
25 Claims
-
1. A method for identifying conference media traffic comprising:
-
receiving a plurality of dummy packets; matching a series of the plurality of dummy packets to a signature key; extracting a first identification from one or more of the plurality of dummy packets in response to matching a series of the plurality of dummy packets to a signature key; determining that a second identification associated with one or more encrypted media packets matches the first identification; and associating one or more encrypted media packets with a conference in response to determining that the first identification matches the second identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A network apparatus comprising:
-
an interface operable to; receive a plurality of dummy packets; and receive one or more encrypted media packets; and a processor coupled to the interface and operable to; match a series of the plurality of dummy packets to a signature key; extract a first identification from one or more of the plurality of dummy packets in response to matching a series of the plurality of dummy packets to a signature key; determine that a second identification associated with one or more of the encrypted media packets matches the first identification; and associate one or more encrypted media packets with a conference in response to determining that the first identification matches the second identification. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer readable medium including code for identifying encrypted conference media traffic, the code operable to:
-
receive a plurality of dummy packets; match a series of the plurality of dummy packets to a signature key; extract a first identification from one or more of the plurality of dummy packets in response to matching a series of the plurality of dummy packets to a signature key; determine that a second identification associated with one or more encrypted media packets matches the first identification; and associate one or more encrypted media packets with a conference in response to determining that the first identification matches the second identification. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A network apparatus comprising:
-
means for receiving a plurality of dummy packets; means for matching a series of the plurality of dummy packets to a signature key; means for extracting a first identification from one or more of the plurality of dummy packets in response to matching a series of the plurality of dummy packets to a signature key; means for determining that a second identification associated with one or more encrypted media packets matches the first identification; and means for associating one or more encrypted media packets with a conference in response to determining that the first identification matches the second identification.
-
Specification