Signature specification for encrypted packet streams
First Claim
Patent Images
1. A method, comprising:
- receiving an encrypted stream of packets, wherein data included in the encrypted stream of packets is obscured by encryption;
specifying a signature for the encrypted stream of packets;
identifying an application type of the data included in the encrypted stream of packets using the signature, wherein the receiving, specifying and identifying are performed on at least one processor; and
communicating the signature to a communications device;
wherein the signature is based on one of size of the packets and timing between the packets;
wherein specifying the signature comprises specifying a packet for time-based insertion into the encrypted stream of packets, the packet having a size that identifies the application type of the data and not comprising data of the application type; and
wherein specifying the signature comprises establishing a pattern of packet sizes.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents.
-
Citations
16 Claims
-
1. A method, comprising:
-
receiving an encrypted stream of packets, wherein data included in the encrypted stream of packets is obscured by encryption; specifying a signature for the encrypted stream of packets; identifying an application type of the data included in the encrypted stream of packets using the signature, wherein the receiving, specifying and identifying are performed on at least one processor; and communicating the signature to a communications device; wherein the signature is based on one of size of the packets and timing between the packets; wherein specifying the signature comprises specifying a packet for time-based insertion into the encrypted stream of packets, the packet having a size that identifies the application type of the data and not comprising data of the application type; and wherein specifying the signature comprises establishing a pattern of packet sizes. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
a processor; and a memory device comprising computer readable program code on the memory device that when executed by the process causes the processor to perform operations comprising; receiving an encrypted stream of packets, wherein data included in the encrypted stream of packets is obscured by encryption; specifying a signature for the encrypted stream of packets; identifying an application type of the data included in the encrypted stream of packets using the signature, wherein the receiving, specifying and identifying are performed on at least one processor; and communicating the signature to a communications device; wherein the signature is based on one of size of the packets and timing between the packets; wherein specifying the signature comprises specifying a packet for time-based insertion into the encrypted stream of packets, the packet having a size that identifies the application type of the data and not comprising data and wherein specifying the signature comprises establishing a pattern of packet sizes. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product, comprising:
-
a non-transitory computer readable medium comprising computer readable program code that when the computer readable program code is executed by a processor causes the processor to perform operations comprising; receiving an encrypted stream of packets, wherein data included in the encrypted stream of packets is obscured by encryption; specifying a signature for the encrypted stream of packets; identifying an application type of the data included in the encrypted stream of packets using the signature, wherein the receiving, specifying and identifying are performed on at least one processor; and communicating the signature to a communications device; wherein the signature is based on one of size of the packets and timing between the packets; wherein specifying the signature comprises specifying a packet for time-based insertion into the encrypted stream of packets, the packet having a size that identifies the application type of the data and not comprising data of the application type; and wherein specifying the signature comprises establishing a pattern of packet sizes. - View Dependent Claims (14, 15, 16)
-
Specification