| CPC H04L 63/0236 (2013.01) [H04L 61/4511 (2022.05); H04L 63/0281 (2013.01); H04L 63/205 (2013.01); H04L 63/306 (2013.01)] | 26 Claims |

|
1. A packet filtering device comprising:
one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the packet filtering device to:
receive, from a server external to a network protected by the packet filtering device, intelligence data, wherein the intelligence data comprises one or more domains;
receive, from a first device, a plurality of encrypted packets, wherein the plurality of encrypted packets comprises an encrypted server name indication (eSNI) value;
determine whether a plaintext hostname is resolvable from the eSNI value;
determine, based on a determination that the plaintext hostname is resolvable from the eSNI value, whether the plaintext hostname corresponds to the one or more domain names;
query a data structure to determine whether law enforcement is authorized to intercept traffic corresponding to the plaintext hostname; and
based on a determination that the plaintext hostname corresponds to the one or more domain names and based on a determination that law enforcement is authorized to intercept traffic corresponding to the plaintext hostname, store the plurality of encrypted packets in a lawful intercept database.
|