Signature specification for encrypted packet streams
First Claim
Patent Images
1. A method, comprising the steps of:
- receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and
specifying a signature for the stream of packets, the signature identifying a type of data encrypted within the stream of packets,wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and
wherein the step of specifying the signature comprises at least one of i) specifying at least one packet for insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets, and ii) specifying at least one packet for time-based insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents.
-
Citations
17 Claims
-
1. A method, comprising the steps of:
-
receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and specifying a signature for the stream of packets, the signature identifying a type of data encrypted within the stream of packets, wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and wherein the step of specifying the signature comprises at least one of i) specifying at least one packet for insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets, and ii) specifying at least one packet for time-based insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising the steps of:
-
receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and specifying a signature for the stream of packets. the signature identifying a type of data encrypted within the stream of packets, wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and wherein the step of specifying the signature comprises establishing a size for each packet in the stream of packets, the size for each packet identifying the type of data encrypted within the stream of packets.
-
-
7. A method, comprising the steps of:
-
receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and specifying a signature for the stream of packets, the signature identifying a type of data encrypted within the stream of packets, wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and wherein the step of specifying the signature comprises at least one of i) establishing a pattern of packet sizes, the pattern of packet sizes identifying the type of data encrypted within the stream of packets, and ii) establishing a pattern of timing intervals, the pattern of timing intervals identifying the type of data encrypted within the stream of packets.
-
-
8. A system, comprising:
-
a communications module stored in a memory device, and a processor communicating with the memory device; the communications module receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and
the communications module specifying a signature for the stream of packets, the signature identifying a type of data encrypted within the stream of packets.wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and wherein the communications module specifics at least one of i) at least one packet for insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets, and ii) at least one packet for time-based insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system, comprising:
-
a communications module stored in a memory device, and a processor communicating with the memory device; the communications module receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and
the communications module specifying a signature for the stream of packets, the signature identifying a type of data encrypted within the stream of packets,wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and wherein the communications module establishes a size for each packet in the stream of packets, the size for each packet identifying the type of data encrypted within the stream of packets.
-
-
14. A system, comprising:
-
a communications module stored in a memory device, and a processor communicating with the memory device; the communications module receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and
the communications module specifying a signature for the stream of packets, the signature identifying a type of data encrypted within the stream of packets,wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and wherein the communications module establishes at least one of i) a pattern of packet sizes, the pattern of packet sizes identifying the type of data encrypted within the stream of packets, and ii) a pattern of timing intervals, the pattern of timing intervals identifying the type of data encrypted within the stream of packets.
-
-
15. A computer program product comprising a computer readable medium including instructions for performing the steps:
-
receiving an encrypted stream of packets having the contents of a packet obscured by encryption; and
specifing a signature for the stream of packets, the signature identifying a type of data encrypted within the stream of packets,wherein the signature identifies the contents of the packet despite the encryption obscuring the contents; and wherein the step of specifying the signature comprises at least one of i) specifying at least one packet for insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets, and ii) specifying at least one packet for time-based insertion into the stream of packets, the packet having a size that identifies the type of data encrypted within the stream of packets. - View Dependent Claims (16, 17)
-
Specification