Anonymization of traffic patterns over communication networks
First Claim
1. A computer-implemented method of obfuscating communication traffic patterns occurring over a communication infrastructure including a computer server, the computer-implemented method comprising:
- detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol;
accessing, at the first communications device, a first traffic pattern based on the detected data communication sessions, the first traffic pattern determining communication occurrences between the first and the second communication devices over a first predefined time period;
accessing, at the first communications device, a second traffic pattern based on the data communication sessions, the second traffic pattern determining communication occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and
generating, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions, and wherein the dummy data communication pattern comprises one or more randomly generated binary values based on the randomization process, wherein the one or more randomly generated binary values include a binary ‘
1’
value or a binary ‘
0’
value, the binary ‘
1’
value establishing a dummy communication session between the first and the second communications devices, and the binary ‘
0’
value restricting a communication session between the first and the second communications devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
23 Citations
12 Claims
-
1. A computer-implemented method of obfuscating communication traffic patterns occurring over a communication infrastructure including a computer server, the computer-implemented method comprising:
-
detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol; accessing, at the first communications device, a first traffic pattern based on the detected data communication sessions, the first traffic pattern determining communication occurrences between the first and the second communication devices over a first predefined time period; accessing, at the first communications device, a second traffic pattern based on the data communication sessions, the second traffic pattern determining communication occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and generating, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions, and wherein the dummy data communication pattern comprises one or more randomly generated binary values based on the randomization process, wherein the one or more randomly generated binary values include a binary ‘
1’
value or a binary ‘
0’
value, the binary ‘
1’
value establishing a dummy communication session between the first and the second communications devices, and the binary ‘
0’
value restricting a communication session between the first and the second communications devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification