Anonymization of traffic patterns over communication networks
First Claim
1. A computer-implemented method of obfuscating communication traffic patterns between a first communication device and a second communication device occurring over a communication infrastructure including a computer server, the computer-implemented method comprising:
- accessing, at the first communications device, a first traffic pattern including communication occurrences between the first and the second communication devices over a first predefined time period;
accessing, at the first communications device, a second traffic pattern including occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and
generating, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern, wherein generating the dummy data communication pattern comprises;
determining, at the first communications device, a first information content value associated with the first traffic pattern and a second information content value associated with the second traffic pattern;
comparing, at the first communications device, the first and the second information content values; and
generating a first binary value based on the second information content value being outside a predefined threshold range of the first information content value.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
16 Citations
20 Claims
-
1. A computer-implemented method of obfuscating communication traffic patterns between a first communication device and a second communication device occurring over a communication infrastructure including a computer server, the computer-implemented method comprising:
-
accessing, at the first communications device, a first traffic pattern including communication occurrences between the first and the second communication devices over a first predefined time period; accessing, at the first communications device, a second traffic pattern including occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and generating, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern, wherein generating the dummy data communication pattern comprises; determining, at the first communications device, a first information content value associated with the first traffic pattern and a second information content value associated with the second traffic pattern; comparing, at the first communications device, the first and the second information content values; and generating a first binary value based on the second information content value being outside a predefined threshold range of the first information content value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system for obfuscating communication traffic patterns between a first communication device and a second communication device occurring over a cloud-based communication infrastructure including a computer server, the computer system comprising:
-
one or more processors, one or more computer-readable memories, one or more non-transitory computer-readable storage devices, and program instructions stored on at least one of the one or more non-transitory storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising; accessing, at the first communications device, a first traffic pattern including communication occurrences between the first and the second communication devices over a first predefined time period; accessing, at the first communications device, a second traffic pattern including occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and generating, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern, wherein generating the dummy data communication pattern comprises; determining, at the first communications device, a first information content value associated with the first traffic pattern and a second information content value associated with the second traffic pattern; comparing, at the first communications device, the first and the second information content values; and generating a first binary value based on the second information content value being outside a predefined threshold range of the first information content value. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification