1. Field of the Disclosure
The technology of the disclosure relates generally to Web Real-Time Communications (WebRTC) interactive sessions.
2. Technical Background
Web Real-Time Communications (WebRTC) is an ongoing effort to develop industry standards for integrating real-time communications functionality into web clients, such as web browsers, to enable direct interaction with other web clients. This real-time communications functionality is accessible by web developers via standard markup tags, such as those provided by version 5 of the Hypertext Markup Language (HTML5), and client-side scripting Application Programming Interfaces (APIs) such as JavaScript APIs. More information regarding WebRTC may be found in “WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web,” by Alan B. Johnston and Daniel C. Burnett (2012 Digital Codex LLC), which is incorporated in its entirety herein by reference.
WebRTC provides built-in capabilities for establishing real-time video, audio, and/or data streams in both point-to-point interactive sessions, as well as multi-party interactive sessions. The WebRTC standards are currently under joint development by the World Wide Web Consortium (W3C) and the Internet Engineering Task Force (IETF). Information on the current state of WebRTC standards can be found at, e.g., http://www.w3c.org and http://www/ietf.org.
To establish a WebRTC interactive session (e.g., a real-time video, audio, and/or data exchange), two web clients may retrieve WebRTC-enabled web applications, such as HTML5/JavaScript web applications, from a web application server. Through the web applications, the two web clients then engage in a media negotiation to communicate and reach an agreement on parameters that define characteristics of the interactive session. This media negotiation is known as a WebRTC “offer/answer” exchange. A WebRTC “offer/answer” exchange typically occurs via a secure network connection such as a Hypertext Transfer Protocol Secure (HTTPS) connection or a Secure WebSockets connection. In an offer/answer exchange, a first web client on a sender device sends an “offer” to a second web client on a recipient device. The offer includes a WebRTC session description object that specifies media types and capabilities that the first web client supports and prefers for use in the WebRTC interactive session. The second web client then responds with a WebRTC session description object “answer” that indicates which of the offered media types and capabilities are supported and acceptable for the WebRTC interactive session. Once the WebRTC offer/answer exchange is complete, the web clients may then establish a direct “peer connection” with one another, and may begin an exchange of media or data packets transporting the real-time communications. The peer connection between the web clients typically employs the Secure Real-time Transport Protocol (SRTP) to transport real-time media flows, and may utilize various other protocols for real-time data interchange.
The secure nature of a WebRTC offer/answer exchange and peer connection poses challenges for real-time communications across enterprise network boundaries. To determine whether to allow traffic to cross network edges, enterprises often rely on network security elements (e.g., firewalls and session border controllers (SBCs)). These network security elements may examine protocols at various levels in a network stack, including the actual content of the network traffic. Such in-depth analysis of network traffic may enable an enterprise to apply enterprise policies to achieve fine-grained control over the network traffic. However, because the WebRTC offer/answer exchange and peer connection may take place over secure network connections or otherwise be encrypted, the WebRTC session description objects and the WebRTC interactive flow exchanged between the web clients may be opaque to the enterprise. Thus, the enterprise may lack the ability to apply enterprise policies to a WebRTC interactive session using conventional network security elements. The secure nature of WebRTC may also present risks to the enterprise in the form of a new path for attack by virus vectors and/or malware.
Embodiments disclosed in the detailed description provide distributed application of enterprise policies to Web Real-Time Communications (WebRTC) interactive sessions. Related methods, systems, and computer-readable media are also disclosed. In this regard, in one embodiment, a method for applying an enterprise policy to a WebRTC interactive session is provided. The method comprises receiving, by a distributed policy enforcement agent of a recipient device, a WebRTC session description object directed to the recipient device originating from a sender device. The method further comprises determining, by the distributed policy enforcement agent, one or more enterprise policies based on the WebRTC session description object. The method also comprises applying the one or more enterprise policies to the WebRTC session description object. Use of the distributed policy enforcement agent of the recipient device allows in-depth analysis of the contents of the WebRTC session description object, including the packets transporting the WebRTC session description object, after it is received at the recipient device and before a WebRTC interactive session is established. In this manner, an enterprise may permit establishment of a WebRTC interactive session that crosses an enterprise network boundary, while at the same time ensuring that the WebRTC interactive session complies with the one or more enterprise policies.
In another embodiment, a system for applying an enterprise policy to a WebRTC interactive session is provided. The system comprises at least one communications interface, and a recipient device associated with the at least one communications interface and comprising a distributed policy enforcement agent. The distributed policy enforcement agent is configured to receive a WebRTC session description object directed to the recipient device originating from a sender device via a secure network connection. The distributed policy enforcement agent is further configured to determine one or more enterprise policies based on the WebRTC session description object. The distributed policy enforcement agent is also configured to apply the one or more enterprise policies to the WebRTC session description object.
In another embodiment, a non-transitory computer-readable medium is provided. The non-transitory computer-readable medium has stored thereon computer-executable instructions to cause a processor to implement a method comprising receiving, by a distributed policy enforcement agent of a recipient device, a WebRTC session description object directed to the recipient device originating from a sender device. The method implemented by the computer-executable instructions further comprises determining, by the distributed policy enforcement agent, one or more enterprise policies based on the WebRTC session description object. The method implemented by the computer-executable instructions also comprises applying the one or more enterprise policies to the WebRTC session description object.
The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the disclosure, and together with the description serve to explain the principles of the disclosure.
With reference now to the drawing figures, several exemplary embodiments of the present disclosure are described. The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments.
Embodiments disclosed in the detailed description provide distributed application of enterprise policies to Web Real-Time Communications (WebRTC) interactive sessions. Related methods, systems, and computer-readable media are also disclosed. In this regard, in one embodiment, a method for applying an enterprise policy to a WebRTC interactive session is provided. The method comprises receiving, by a distributed policy enforcement agent of a recipient device, a WebRTC session description object directed to the recipient device originating from a sender device. The method further comprises determining, by the distributed policy enforcement agent, one or more enterprise policies based on the WebRTC session description object. The method also comprises applying the one or more enterprise policies to the WebRTC session description object. Use of the distributed policy enforcement agent of the recipient device allows in-depth analysis of the contents of the WebRTC session description object, including the packets transporting the WebRTC session description object, after it is received at the recipient device and before a WebRTC interactive session is established. In this manner, an enterprise may permit establishment of a WebRTC interactive session that crosses an enterprise network boundary, while at the same time ensuring that the WebRTC interactive session complies with the one or more enterprise policies.
In this regard,
As seen in
The enterprise DMZ 16 of
The ability of the DMZ policy enforcement point 22 to apply enterprise policies to network traffic passing through the enterprise DMZ 16 may depend on whether the network traffic is unencrypted, or is transported in an encrypted format. In the former scenario, the DMZ policy enforcement point 22 may analyze various protocols within the network stack and/or the actual content of the network traffic, and apply enterprise policies to the network traffic based on its analysis. However, in the latter scenario, the DMZ policy enforcement point 22 may have access only to limited information about the network traffic, such as a source Internet Protocol (IP) address, a destination IP address, a source port number, a destination port number, and/or a network protocol in use. In such case, the DMZ policy enforcement point 22 may be forced to apply enterprise policies based only on this limited information. Moreover, even where the network traffic is unencrypted, the DMZ policy enforcement point 22 may not be capable of applying enterprise policies at an endpoint within the enterprise network 14 based on data received at the endpoint. Accordingly, as discussed in greater detail below, the distributed policy enforcement agent 12 is provided to enable the enterprise to enforce enterprise policies at an endpoint within the enterprise network 14, based on an in-depth analysis of packets and their contents received at the endpoint.
Before discussing details of the distributed policy enforcement agent 12, the establishment of a WebRTC interactive session in the system 10 of
In this embodiment, the enterprise web client 30 comprises a scripting engine 32 and a WebRTC functionality provider 34. The scripting engine 32 enables client-side applications written in a scripting language, such as JavaScript, to be executed within the enterprise web client 30. The scripting engine 32 also provides an application programming interface (API) to facilitate communications with other functionality providers within the enterprise web client 30 and/or the enterprise user device 28, and/or with other web clients, user devices, or web servers. The WebRTC functionality provider 34 implements the protocols, codecs, and APIs necessary to enable real-time interactive sessions via WebRTC. The scripting engine 32 and the WebRTC functionality provider 34 are communicatively coupled via a set of defined APIs, as indicated by bidirectional arrow 35.
The enterprise network 14 may also include an enterprise device 36, which is communicatively coupled to the WebRTC functionality provider 34 as indicated by bidirectional arrow 37. As discussed in greater detail below, the enterprise device 36 may be operative to record, log, or redirect a WebRTC interactive flow received from the WebRTC functionality provider 34 according to enterprise policies.
External to the enterprise network 14 is a web application server 38, which serves a WebRTC-enabled web application (not shown) to requesting web clients. In some embodiments, the web application server 38 may be a single server, while in some applications the web application server 38 may comprise multiple servers that are communicatively coupled to each other. It is to be understood that the web application server 38 may reside in the enterprise DMZ 16 of the enterprise network 14, or may reside within an enterprise DMZ of an enterprise network external to the enterprise network 14.
Also external to the enterprise network 14 is an external user device 40 executing an external web client 42. The external user device 40 may be any computing or communications device having network communications capabilities, such as a smartphone, a tablet computer, a dedicated web appliance, or a desktop computer, as non-limiting examples. The external web client 42 may be a web browser application, a dedicated communications application, or an interface-less application such as a daemon or service application, as non-limiting examples. In this embodiment, the external web client 42 comprises a scripting engine 44 and a WebRTC functionality provider 46, the functionality of which corresponds to the functionality of the scripting engine 32 and the WebRTC functionality provider 34 of the enterprise web client 30, respectively. The scripting engine 44 and the WebRTC functionality provider 46 are communicatively coupled via a set of defined APIs, as indicated by bidirectional arrow 48. It is to be further understood that the external web client 42 may reside within an enterprise network external to the enterprise network 14.
The enterprise web client 30 and the external web client 42 then establish secure web connections 50 and 52, respectively, with the web application server 38, and engage in a WebRTC offer/answer exchange. This is accomplished through an exchange of WebRTC session description objects indicated by arrows 54 and 56. The exchanged WebRTC session description objects 54 and 56 are used to determine the media types and capabilities for the desired WebRTC interactive session. Once the WebRTC offer/answer exchange is complete, a WebRTC interactive flow 58 may be established via a secure peer connection 60 between the enterprise web client 30 and the external web client 42. Accordingly, in
It is to be understood that some embodiments may utilize topographies other than the WebRTC “triangle” topography illustrated in
As seen in
In this regard, the distributed policy enforcement agent 12 of
In some embodiments, the distributed policy enforcement agent 12 is communicatively coupled to the scripting engine 32, as indicated by bidirectional arrow 62 in
To illustrate exemplary communications flows during the establishment of a WebRTC interactive session including the distributed policy enforcement agent 12 of
As seen in
As noted above, the distributed policy enforcement agent 12 may access the contents of network traffic received over a secure web connection after the network traffic has been decrypted, and may additionally examine data provided by the packets transporting the network traffic. Thus, the distributed policy enforcement agent 12 is able to examine the contents of the SDP Object A as well as data provided by packets transporting the SDP Object A. In some embodiments, the distributed policy enforcement agent 12 at this point may compare the format of the SDP Object A to an expected WebRTC session description object format. If the SDP Object A does not conform to the expected format, the distributed policy enforcement agent 12 may discard SDP Object A, and a WebRTC interactive session will not be established. If the SDP Object A appears valid, then establishment of the WebRTC interactive session may continue.
Based on the contents of the SDP Object A, the distributed policy enforcement agent 12 sends a query for enterprise policies to the enterprise policy data store 26, as indicated by arrow 70. The query may be based on or include data extracted from contents of the SDP Object A and/or other available data related to the SDP Object A, such as characteristics of or data in the packets comprising the SDP Object A. As non-limiting examples, such data may include an identity associated with the external user device 40, an identity of an intermediary that forwarded the SDP Object A to the enterprise user device 28, an exchange of encryption keys, or a type of WebRTC interactive flow. In response to the query, the enterprise policy data store 26 returns the requested enterprise policies to the distributed policy enforcement agent 12, indicated by arrow 72 in
Assuming the enterprise policies applied by the distributed policy enforcement agent 12 permit the establishment of the WebRTC interactive session to proceed, the distributed policy enforcement agent 12 next passes the WebRTC session description object to the scripting engine 32 for conventional processing, as indicated by arrow 74. As noted above, the distributed policy enforcement agent 12 may have modified the contents of SDP Object A in applying the enterprise policies. Thus, the WebRTC session description object forwarded to the scripting engine 32 is designated SDP Object A′.
After the scripting engine 32 receives the SDP Object A′ from the distributed policy enforcement agent 12, the scripting engine 32 in response sends a WebRTC session description object, referred to as SDP Object B, to the distributed policy enforcement agent 12, as indicated by arrow 76. The SDP Object B in this example represents the “answer” in the WebRTC offer/answer exchange. In some embodiments, the distributed policy enforcement agent 12 may apply enterprise policies by modifying a content of the SDP Object B prior to forwarding it on to the web application server 38. Accordingly, the WebRTC session description object forwarded by the distributed policy enforcement agent 12 is referred to as SDP Object B′. SDP Object B′ is sent to the web application server 38 via a secure network connection, as indicated by arrow 78. The web application server 38, in turn, forwards the SDP Object B′ to the external user device 40, as shown by arrow 80.
With continuing reference to
Once the hole punching indicated by arrows 82 and 83 is successful, the external web client 42 and the WebRTC functionality provider 34 of the enterprise web client 30 begin key negotiations to establish a secure peer connection (bidirectional arrow 84). Upon establishing a secure peer connection, the external web client 42 and the WebRTC functionality provider 34 of the enterprise web client 30 begin exchanging secure WebRTC media or data flows, as shown by bidirectional arrow 86.
To generally describe exemplary operations of the distributed policy enforcement agent 12 of
With continuing reference to
With continuing reference to
Referring now to
If the distributed policy enforcement agent 12 determines at block 96 of
Referring now to
If the distributed policy enforcement agent 12 determines at block 104 that the WebRTC session description object complies with the one or more enterprise policies, the distributed policy enforcement agent 12 permits a secure peer connection to be established between the recipient device and the sender device, as discussed above with respect to
In some embodiments, the distributed policy enforcement agent 12 may optionally apply the one or more enterprise policies to the first WebRTC interactive flow (block 114). For example, the enterprise policies may require that the first WebRTC interactive flow be recorded, logged, or redirected. Where the first WebRTC interactive flow is an interactive data interchange, applying the one or more enterprise policies may include examining the contents of the interactive data interchange to determine compliance with the one or more enterprise policies.
In this regard,
Some embodiments may provide variations of the WebRTC topology described above with respect to
The exemplary computer system 124 includes a processing device or processor 126, a main memory 128 (as non-limiting examples, read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM), etc.), and a static memory 130 (as non-limiting examples, flash memory, static random access memory (SRAM), etc.), which may communicate with each other via a bus 132. Alternatively, the processing device 126 may be connected to the main memory 128 and/or the static memory 130 directly or via some other connectivity means.
The processing device 126 represents one or more processing devices such as a microprocessor, central processing unit (CPU), or the like. More particularly, the processing device 126 may be a complex instruction set computing (CISC) microprocessor, a reduced instruction set computing (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, a processor implementing other instruction sets, or processors implementing a combination of instruction sets. The processing device 126 is configured to execute processing logic in instructions 134 and/or cached instructions 136 for performing the operations and steps discussed herein.
The computer system 124 may further include a communications interface in the form of a network interface device 138. It also may or may not include an input 140 to receive input and selections to be communicated to the computer system 124 when executing the instructions 134, 136. It also may or may not include an output 142, including but not limited to display(s) 144. The display(s) 144 may be a video display unit (as non-limiting examples, a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device (as a non-limiting example, a keyboard), a cursor control device (as a non-limiting example, a mouse), and/or a touch screen device (as a non-limiting example, a tablet input device or screen).
The computer system 124 may or may not include a data storage device 145 that includes using drive(s) 146 to store the functions described herein in a computer-readable medium 148, on which is stored one or more sets of instructions 150 (e.g., software) embodying any one or more of the methodologies or functions described herein. The functions can include the methods and/or other functions of the processing system 122, a participant user device, and/or a licensing server, as non-limiting examples. The one or more sets of instructions 150 may also reside, completely or at least partially, within the main memory 128 and/or within the processing device 126 during execution thereof by the computer system 124. The main memory 128 and the processing device 126 also constitute machine-accessible storage media. The instructions 134, 136, and/or 150 may further be transmitted or received over a network 152 via the network interface device 138. The network 152 may be an intra-network or an inter-network.
While the computer-readable medium 148 is shown in an exemplary embodiment to be a single medium, the term “machine-accessible storage medium” should be taken to include a single medium or multiple media (as non-limiting examples, a centralized or distributed database, and/or associated caches and servers) that store one or more sets of instructions. The term “machine-accessible storage medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine, and that cause the machine to perform any one or more of the methodologies disclosed herein. The term “machine-accessible storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, and carrier wave signals.
The embodiments disclosed herein may be embodied in hardware and in instructions that are stored in hardware, and may reside, as non-limiting examples, in Random Access Memory (RAM), flash memory, Read Only Memory (ROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), registers, a hard disk, a removable disk, a CD-ROM, or any other form of computer readable medium known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). The ASIC may reside in a remote station. In the alternative, the processor and the storage medium may reside as discrete components in a remote station, base station, or server.
It is also noted that the operational steps described in any of the exemplary embodiments herein are described to provide examples and discussion. The operations described may be performed in numerous different sequences other than the illustrated sequences. Furthermore, operations described in a single operational step may actually be performed in a number of different steps. Additionally, one or more operational steps discussed in the exemplary embodiments may be combined. It is to be understood that the operational steps illustrated in the flow chart diagrams may be subject to numerous different modifications as will be readily apparent to one of skill in the art. Those of skill in the art would also understand that information and signals may be represented using any of a variety of different technologies and techniques. As non-limiting examples, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the spirit or scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples and designs described herein, but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The present application claims priority to U.S. Provisional Patent Application Ser. No. 61/706,951 filed Sep. 28, 2012, and entitled “ENTERPRISE COMMUNICATIONS AND COLLABORATION SYSTEMS BASED ON REAL-TIME COMMUNICATIONS AND/OR MARKUP PROTOCOLS, AND RELATED METHODS, APPARATUSES, AND COMPUTER-READABLE MEDIA,” and to U.S. Provisional Patent Application Ser. No. 61/781,122 filed on Mar. 14, 2013, and entitled “DISTRIBUTED APPLICATION OF ENTERPRISE POLICIES TO WEB REAL-TIME COMMUNICATIONS (WEBRTC) INTERACTIVE SESSIONS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA,” which are hereby incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
6714967 | Horvitz | Mar 2004 | B1 |
7107316 | Brown et al. | Sep 2006 | B2 |
7145898 | Elliott | Dec 2006 | B1 |
7266591 | Johnston | Sep 2007 | B1 |
7379993 | Valdes et al. | May 2008 | B2 |
7636348 | Bettis et al. | Dec 2009 | B2 |
7730309 | Zimmermann | Jun 2010 | B2 |
8015484 | Backer | Sep 2011 | B2 |
8250635 | Chari et al. | Aug 2012 | B2 |
8300632 | Davis et al. | Oct 2012 | B2 |
8467308 | Johnston | Jun 2013 | B2 |
8494507 | Tedesco et al. | Jul 2013 | B1 |
8601144 | Ryner | Dec 2013 | B1 |
8605711 | Sinnreich et al. | Dec 2013 | B1 |
8606950 | Glatron et al. | Dec 2013 | B2 |
8693392 | Cooper et al. | Apr 2014 | B2 |
8695077 | Gerhard et al. | Apr 2014 | B1 |
8737596 | Kelley et al. | May 2014 | B2 |
8744147 | Torti | Jun 2014 | B2 |
8832271 | McCarty | Sep 2014 | B2 |
8856236 | Moore et al. | Oct 2014 | B2 |
8861692 | Phelps et al. | Oct 2014 | B1 |
8867731 | Lum et al. | Oct 2014 | B2 |
20020159464 | Lewis | Oct 2002 | A1 |
20020161685 | Dwinnell | Oct 2002 | A1 |
20030112766 | Riedel et al. | Jun 2003 | A1 |
20030120599 | Agboatwalla et al. | Jun 2003 | A1 |
20030131245 | Linderman | Jul 2003 | A1 |
20030188193 | Venkataramappa | Oct 2003 | A1 |
20040019494 | Ridgeway et al. | Jan 2004 | A1 |
20040081173 | Feather | Apr 2004 | A1 |
20040093515 | Reeves, Jr. | May 2004 | A1 |
20040167984 | Herrmann | Aug 2004 | A1 |
20040216173 | Horoszowski et al. | Oct 2004 | A1 |
20050084082 | Horvitz et al. | Apr 2005 | A1 |
20050177380 | Pritchard et al. | Aug 2005 | A1 |
20060104526 | Gringeler et al. | May 2006 | A1 |
20060155814 | Bennett et al. | Jul 2006 | A1 |
20060159063 | Kumar | Jul 2006 | A1 |
20060200855 | Willis | Sep 2006 | A1 |
20060230438 | Shappir et al. | Oct 2006 | A1 |
20070083929 | Sprosts et al. | Apr 2007 | A1 |
20070143408 | Daigle | Jun 2007 | A1 |
20070255662 | Tumminaro | Nov 2007 | A1 |
20070283423 | Bradley et al. | Dec 2007 | A1 |
20080046414 | Haub et al. | Feb 2008 | A1 |
20080046457 | Haub et al. | Feb 2008 | A1 |
20080046838 | Haub et al. | Feb 2008 | A1 |
20080127137 | Becker et al. | May 2008 | A1 |
20080133767 | Birrer et al. | Jun 2008 | A1 |
20080162642 | Bachiri et al. | Jul 2008 | A1 |
20080192646 | Song et al. | Aug 2008 | A1 |
20080270541 | Keener et al. | Oct 2008 | A1 |
20080313260 | Sweet | Dec 2008 | A1 |
20090070477 | Baum et al. | Mar 2009 | A1 |
20090094684 | Chinnusamy et al. | Apr 2009 | A1 |
20090300060 | Beringer et al. | Dec 2009 | A1 |
20100011282 | Dollard et al. | Jan 2010 | A1 |
20100023519 | Kailash et al. | Jan 2010 | A1 |
20100024019 | Backlund | Jan 2010 | A1 |
20100037324 | Grant et al. | Feb 2010 | A1 |
20100118700 | Blum et al. | May 2010 | A1 |
20100246571 | Geppert et al. | Sep 2010 | A1 |
20110102930 | Johnston et al. | May 2011 | A1 |
20110206013 | Aramoto et al. | Aug 2011 | A1 |
20110238862 | Chaturvedi et al. | Sep 2011 | A1 |
20110289037 | Tullio et al. | Nov 2011 | A1 |
20120001932 | Burnett et al. | Jan 2012 | A1 |
20120079031 | Matthews et al. | Mar 2012 | A1 |
20120137231 | Maxfield et al. | May 2012 | A1 |
20120158862 | Mosko et al. | Jun 2012 | A1 |
20120192086 | Ghods et al. | Jul 2012 | A1 |
20120268553 | Talukder | Oct 2012 | A1 |
20120313785 | Hanson et al. | Dec 2012 | A1 |
20130002799 | Mock | Jan 2013 | A1 |
20130078972 | Levien et al. | Mar 2013 | A1 |
20130091286 | Spencer | Apr 2013 | A1 |
20130136253 | Liberman Ben-Ami | May 2013 | A1 |
20130138829 | Bulava | May 2013 | A1 |
20130321340 | Seo et al. | Dec 2013 | A1 |
20130325934 | Fausak et al. | Dec 2013 | A1 |
20130346329 | Alib-Bulatao et al. | Dec 2013 | A1 |
20140013202 | Schlumberger | Jan 2014 | A1 |
20140043994 | Bansal et al. | Feb 2014 | A1 |
20140095633 | Yoakum | Apr 2014 | A1 |
20140095731 | Carey et al. | Apr 2014 | A1 |
20140108594 | Siegel et al. | Apr 2014 | A1 |
20140126708 | Sayko | May 2014 | A1 |
20140126714 | Sayko | May 2014 | A1 |
20140126715 | Lum | May 2014 | A1 |
20140143823 | Manchester et al. | May 2014 | A1 |
20140149512 | Leitch | May 2014 | A1 |
20140161237 | Tolksdorf | Jun 2014 | A1 |
20140201820 | Li et al. | Jul 2014 | A1 |
20140219167 | Santhanam | Aug 2014 | A1 |
20140222894 | Gangadharan et al. | Aug 2014 | A1 |
20140222930 | Gangadharan et al. | Aug 2014 | A1 |
20140222957 | Gangadharan | Aug 2014 | A1 |
20140223452 | Santhanam | Aug 2014 | A1 |
20140237057 | Khodorenko | Aug 2014 | A1 |
20140241215 | Massover | Aug 2014 | A1 |
20140244235 | Michaelis | Aug 2014 | A1 |
20140245143 | Saint-Marc | Aug 2014 | A1 |
20140258822 | Li et al. | Sep 2014 | A1 |
20140269326 | Westin et al. | Sep 2014 | A1 |
20140270104 | O'Connor | Sep 2014 | A1 |
20140280734 | Chaturvedi et al. | Sep 2014 | A1 |
20140280995 | Ezell | Sep 2014 | A1 |
20140282054 | Yoakum | Sep 2014 | A1 |
20140282135 | Segre | Sep 2014 | A1 |
20140282399 | Gorelik et al. | Sep 2014 | A1 |
20140282765 | Casey et al. | Sep 2014 | A1 |
20140282903 | Singh et al. | Sep 2014 | A1 |
20140324979 | Gao | Oct 2014 | A1 |
20140325078 | Shan et al. | Oct 2014 | A1 |
20140344169 | Phelps et al. | Nov 2014 | A1 |
20140348044 | Narayanan et al. | Nov 2014 | A1 |
20140365676 | Yoakum | Dec 2014 | A1 |
20140379931 | Gaviria | Dec 2014 | A1 |
20150002614 | Zino | Jan 2015 | A1 |
20150002619 | Johnston et al. | Jan 2015 | A1 |
20150006610 | Johnston et al. | Jan 2015 | A1 |
20150006611 | Johnston et al. | Jan 2015 | A1 |
20150026473 | Johnston et al. | Jan 2015 | A1 |
20150036690 | Pastro | Feb 2015 | A1 |
20150039687 | Waxman et al. | Feb 2015 | A1 |
20150039760 | Yoakum | Feb 2015 | A1 |
20150052067 | Thiyagarajan et al. | Feb 2015 | A1 |
20150180825 | Ren et al. | Jun 2015 | A1 |
Number | Date | Country |
---|---|---|
101609540 | Dec 2009 | CN |
1615386 | Jan 2006 | EP |
2529316 | Dec 2012 | EP |
2295747 | Jun 1996 | GB |
2468758 | Sep 2010 | GB |
2468759 | Sep 2010 | GB |
2517833 | Mar 2015 | GB |
2002207683 | Jul 2002 | JP |
2002374318 | Dec 2002 | JP |
2005346556 | Dec 2005 | JP |
2006050407 | Feb 2006 | JP |
2011504665 | Feb 2011 | JP |
2014060008 | Apr 2014 | WO |
2014123738 | Aug 2014 | WO |
2014190094 | Nov 2014 | WO |
2015032277 | Mar 2015 | WO |
Entry |
---|
https://webrtc.org/. |
L. L. Fernández, M. P. Diaz, R. B. Mejías, F. J. López and J. A. Santos, “Kurento: a media server technology for convergent WWW/mobile real-time multimedia communications supporting WebRTC,” World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE 14th International Symposium and Workshops on a, Madrid, 2013, pp. 1-6. doi: 10.1109/WoWM. |
Johnston, Alan B., and Daniel C. Burnett. WebRTC: APIs and RTCWEB protocols of the HTML5 real-time web. Digital Codex LLC, 2012. |
Singh, Kundan et al., “Building Communicating Web Applications Leveraging Endpoints and Cloud Resource Service,” Presented at the Sixth International Conference on Cloud Computing, Jun. 28, 2013, Santa Clara, California, IEEE Computer Society, pp. 486-493. |
Singh, Kundan et al., “Private Overlay of Enterprise Social Data and Interactions in the Public Web Context,” presented at the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), Oct. 20-23, 2013, Austin, Texas, IEEE, 10 pages. |
Berners-Lee, Tim, “Socially Aware Cloud Storage,” Notes on web design, Aug. 17, 2009, http://www.w3.org/DesignIssues/CloudStorage.html, 9 pages. |
Chandra, Ramesh et al., “Separating Web Applications from User Data Storage with BStore,” presented at the USENIX Conference on Web Application Development, Jun. 2010, Boston, Massachusettes, 13 pages. |
Davids, Carol et al., “SIP APIs for Voice and Video Communications on the Web,” presented at the International Conference on Principles, Systems and Applications of IP Telecommunications (IPTcomm), Aug. 2011, Chicago, Illinois, 7 pages. |
Geambasu, Roxana et al., “Organizing and Sharing Distributed Personal Web-Service Data,” presented at the International World Wide Web Conference, Apr. 21-25, 2008, Beijing, China, International World Wide Web Conference Committee, pp. 755-764. |
Hsu, F. et al., “Secure File System Services for Web 2.0 Applications,” presented at the ACM Cloud Computing Security Workshop, Nov. 13, 2009, Chicago, Illinois, Association for Computing Machinery, 7 pages. |
Joshi, R., “Data-Oriented Architecture: A Loosley Coupled Real-Time SOA,” Whitepaper, Aug. 2007, Real-Time Innovations, Inc., http://rtcgroup.com/whitepapers/files/RTI—DataOrientedArchitecture—WhitePaper.pdf, 54 pages. |
Vahdat, Amin et al., “WebFS: A Global Cache Coherent File System,” UC Berkeley, Dec. 1996, retrieved Sep. 16, 2014 from https://www.cs.duke.edu/˜vahdat/webfs/webfs.html, 12 pages. |
Non-Final Office Action for U.S. Appl. No. 14/037,440, mailed Sep. 12, 2014, 15 pages. |
Loreto, Salvatore et al., “Real-Time Communications in the Web: Issues, Achievements, and Ongoing Standardization Efforts,” IEEE Internet Computing, vol. 16, Issue 5, IEEE Computer Society, Oct. 2, 2012, pp. 68-73. |
Search Report for British patent application GB1411584.4 mailed Dec. 30, 2014, 4 pages. |
Search Report for British patent application GB1411580.2 mailed Dec. 30, 2014, 4 pages. |
Non-Final Office Action for U.S. Appl. No. 13/931,968, mailed Dec. 8, 2014, 6 pages. |
Non-Final Office Action for U.S. Appl. No. 13/835,913, mailed Nov. 20, 2014, 15 pages. |
Non-Final Office Action for U.S. Appl. No. 13/803,292, mailed Jan. 27, 2015, 13 pages. |
Non-Final Office Action for U.S. Appl. No. 14/050,891, mailed Jan. 29, 2015, 9 pages. |
Non-Final Office Action for U.S. Appl. No. 13/955,023, mailed Feb. 2, 2015, 12 pages. |
Andreasen et al., “Session Description Protocol (SDP): Security Descriptions for Media Streams,” Network Working Group, Request for Comments: 4568, Standards Track, The Internet Society, Jul. 2006, 40 pages. |
Baugher et al., “The Secure Real-time Transport Protocol (SRTP),” Network Working Group, Request for Comments: 3711, Standards Track, The Internet Society, Mar. 2004, 51 pages. |
Johnston et al., “WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web,” (Book), Second Edition, Smashwords Edition, Digital Codex LLC, Jun. 2013, 254 pages. |
Mahy et al., “Traversal Using Relays around NAT (TURN) : Relay Extensions to Session Traversal Utilities for NAT (STUN),” Internet Engineering Task Force, Request for Comments: 5766, Standards Track, IETF Trust, Apr. 2010, 61 pages. |
McGrew et al., “Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-Time Transport Protocol (SRTP),” Internet Engineering Task Force, Request for Comments: 5764, Standards Track, IETF Trust, May 2010, 24 pages. |
Zimmermann et al., “ZRTP: Media Path Key Agreement for Unicast Secure RTP,” Internet Engineering Task Force, Request for Comments: 6189, Informational, IETF Trust, Apr. 2011, 102 pages. |
Notice of Allowance for U.S. Appl. No. 13/931,968, mailed Mar. 23, 2015, 7 pages. |
Final Office Action for U.S. Appl. No. 13/835,913, mailed Mar. 26, 2015, 17 pages. |
Final Office Action for U.S. Appl. No. 14/037,440, mailed Feb. 11, 2015, 19 pages. |
Non-Final Office Action for U.S. Appl. No. 14/068,839, mailed Feb. 20, 2015, 15 pages. |
Barth, A. “The Web Origin Concept,” Internet Engineering Task Force (IETF), Request for Comments 6454 (RFC 6454), Dec. 2011, 19 pages, http://www.ietf.org/rfc/rfc6454.txt. |
Fischl, J. et al., “Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS),” Internet Engineering Task Force (IETF), Request for Comments (RFC) 5763, May 2010, 26 pages. |
Jesup, R. et al., “DTLS Encapsulation of SCTP Packets for RTCWEB,” IETF: Network Working Group, Internet Draft, Feb. 16, 2013, 6 pages. |
Johnston, A. et al., “An Origin Attribute for the STUN Protocol,” Internet Engineering Task Force (IETF), Internet-Draft, Jul. 20, 2014, 14 pages, https://tools.ietf.org/html/draft-ietf-tram-stun-origin-00. |
Rescorla, E., “Security Considerations for RTC-Web,” IETF RTCWEB, Internet Draft, Jan. 22, 2013, 16 pages. |
Rescorla, E., “WebRTC Security Architecture,” IETF RTCWEB, Internet Draft, Jul. 14, 2013, 30 pages. |
Corrected Notice of Allowability for U.S. Appl. No. 13/931,968, mailed Apr. 24, 2015, 4 pages. |
Advisory Action for U.S. Appl. No. 14/037,440, mailed May 20, 2015, 3 pages. |
Search Report for British Patent Application GB1419338.7, mailed Apr. 27, 2015, 4 pages. |
Search Report for British Patent Application GB1419334.6, mailed Apr. 28, 2015, 6 pages. |
Notice of Allowance for U.S. Appl. No. 13/944,368, mailed Apr. 1, 2015, 8 pages. |
Non-Final Office Action for U.S. Appl. No. 13/931,967, mailed May 5, 2015, 10 pages. |
Non-Final Office Action for U.S. Appl. No. 13/931,970, mailed May 7, 2015, 9 pages. |
Bergkvist, Adam et al., “WebRTC 1.0: Real-time Communication Between Browsers,” W3C Working Draft, Feb. 9, 2012, http://www.w3.org/TR/2012/WD-webrtc-20120209/, 42 pages. |
Notice of Reason for Refusal for Japanese Patent Application 2013-201228, dispatched Jun. 11, 2015, 8 pages. |
Advisory Action for U.S. Appl. No. 13/835,913, mailed Jun. 10, 2015, 3 pages. |
Final Office Action for U.S. Appl. No. 13/803,292, mailed Jun. 12, 2015, 17 pages. |
Final Office Action and Examiner Initiated Interview Summary for U.S. Appl. No. 14/050,891, mailed Jun. 29, 2015, 11 pages. |
Final Office Action for U.S. Appl. No. 13/955,023, mailed Jul. 20, 2015, 17 pages. |
Corrected Notice of Allowability for U.S. Appl. No. 13/944,368, mailed Jul. 23, 2015, 4 pages. |
Non-Final Office Action for U.S. Appl. No. 14/141,798, mailed Jul. 17, 2015, 13 pages. |
Extended European Search Report for European Patent Application 15161452.6, mailed Jun. 23, 2015, 5 pages. |
Johnston, Alan et al., “Taking on WebRTC in an Enterprise,” IEEE Communications Magazine, Apr. 2013, pp. 48-54, vol. 51, Issue 4. |
Search Report for British patent application GB1317121.0 mailed Mar. 14, 2014, 3 pages. |
Search Report for British patent application GB1317122.8 mailed Mar. 11, 2014, 3 pages. |
Non-Final Office Action for U.S. Appl. No. 13/955,711, mailed Nov. 9, 2015, 10 pages. |
Notice of Allowance for U.S. Appl. No. 14/050,891, mailed Nov. 10, 2015, 10 pages. |
Non-Final Office Action for U.S. Appl. No. 13/955,023, mailed Dec. 9, 2015, 13 pages. |
Non-Final Office Action for U.S. Appl. No. 14/037,440, mailed Oct. 22, 2015, 15 pages. |
Advisory Action for U.S. Appl. No. 13/931,967, mailed Nov. 3, 2015, 3 pages. |
Advisory Action for U.S. Appl. No. 13/931,970, mailed Nov. 5, 2015, 3 pages. |
Non-Final Office Action for U.S. Appl. No. 14/068,943, mailed Dec. 2, 2015, 16 pages. |
Non-Final Office Action for U.S. Appl. No. 14/255,429, mailed Nov. 9, 2015, 26 pages. |
Search Report for British Patent Application No. GB1423089.0, mailed Jul. 6, 2015, 4 pages. |
Rodriguez, Pedro et al., “Advanced Videoconferencing Services Based on WebRTC,” IADIS International Conferences Web Based Communities and Social Media 2012 and Collaborative Technologies 2012, Jul. 17-23, 2012, pp. 180-184, http://www.iadisportal.org/wbc-2012-proceedings. |
Non-Final Office Action for U.S. Appl. No. 13/835,913, mailed Sep. 3, 2015, 19 pages. |
Non-Final Office Action for U.S. Appl. No. 13/912,520, mailed Sep. 9, 2015, 21 pages. |
Advisory Action for U.S. Appl. No. 13/803,292, mailed Aug. 21, 2015, 3 pages. |
Non-Final Office Action for U.S. Appl. No. 13/803,292, mailed Oct. 9, 2015, 13 pages. |
Advisory Action and Examiner-Initiated Interview Summary for U.S. Appl. No. 14/050,891, mailed Sep. 29, 2015, 4 pages. |
Final Office Action for U.S. Appl. No. 14/068,839, mailed Sep. 9, 2015, 17 pages. |
Final Office Action for U.S. Appl. No. 13/931,967, mailed Aug. 20, 2015, 12 pages. |
Final Office Action for U.S. Appl. No. 13/931,970, mailed Aug. 27, 2015, 10 pages. |
Examination Report for British Patent Application GB1411584.4, mailed Aug. 21, 2015, 1 page. |
Examination Report for British Patent Application GB1411580.2, mailed Aug. 21, 2015, 1 page. |
Notification of Reasons for Refusal for Japanese Patent Application 2013-201221, mailed Aug. 25, 2015, 8 pages. |
Advisory Action and Examiner-Initiated Interview Summary for U.S. Appl. No. 14/068,839, mailed Feb. 12, 2016, 4 pages. |
Final Office Action for U.S. Appl. No. 14/141,798, mailed Dec. 24, 2015, 10 pages. |
Non-Final Office Action for U.S. Appl. No. 14/174,371, mailed Feb. 18, 2016, 18 pages. |
Non-Final Office Action for U.S. Appl. No. 13/931,970, mailed Feb. 23, 2016, 11 pages. |
Final Office Action for U.S. Appl. No. 13/912,520, mailed Mar. 2, 2016, 11 pages. |
Final Office Action for U.S. Appl. No. 13/803,292, mailed Mar. 9, 2016, 14 pages. |
Final Office Action for U.S. Appl. No. 13/955,711, mailed Mar. 21, 2016, 12 pages. |
Decision to Grant a Patent for Japanese Patent Application No. 2013-201221, mailed Mar. 29, 2016, 5 pages. |
Decision of Rejection for Japanese Patent Application No. 2013-201228, dispatched Feb. 25, 2016, 6 pages. |
Number | Date | Country | |
---|---|---|---|
20140095724 A1 | Apr 2014 | US |
Number | Date | Country | |
---|---|---|---|
61706951 | Sep 2012 | US | |
61781122 | Mar 2013 | US |