Anonymization of traffic patterns over communication networks
First Claim
1. A computer program product for obfuscating communication traffic patterns occurring over a communication infrastructure including a computer server, the computer program product comprising:
- one or more non-transitory computer-readable storage devices and program instructions stored on at least one of the one or more non-transitory storage devices, the program instructions executable by a processor, the program instructions comprising;
instructions to detect, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol;
instructions to access, at the first communications device, a first traffic pattern based on the data communication sessions, the first traffic pattern determining communication occurrences between the first and the second communication devices over a first predefined time period;
instructions to access, at the first communications device, a second traffic pattern based on the data communication sessions, the second traffic pattern determining communication occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and
instructions to generate, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions, wherein the generating of the dummy data communication pattern comprises;
instructions to determine, at the first communications device, a first information content value associated with the first traffic pattern;
instructions to determine, at the first communications device, a second information content value associated with the second traffic pattern;
instructions to compare, at the first communications device, the first and the second information content values; and
instructions to generate a first binary value based on the comparing determining the second information content value to be outside a predefined threshold range of the first information content value.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
23 Citations
13 Claims
-
1. A computer program product for obfuscating communication traffic patterns occurring over a communication infrastructure including a computer server, the computer program product comprising:
one or more non-transitory computer-readable storage devices and program instructions stored on at least one of the one or more non-transitory storage devices, the program instructions executable by a processor, the program instructions comprising; instructions to detect, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol; instructions to access, at the first communications device, a first traffic pattern based on the data communication sessions, the first traffic pattern determining communication occurrences between the first and the second communication devices over a first predefined time period; instructions to access, at the first communications device, a second traffic pattern based on the data communication sessions, the second traffic pattern determining communication occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and instructions to generate, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions, wherein the generating of the dummy data communication pattern comprises; instructions to determine, at the first communications device, a first information content value associated with the first traffic pattern; instructions to determine, at the first communications device, a second information content value associated with the second traffic pattern; instructions to compare, at the first communications device, the first and the second information content values; and instructions to generate a first binary value based on the comparing determining the second information content value to be outside a predefined threshold range of the first information content value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
Specification