×

Anonymization of traffic patterns over communication networks

  • US 10,193,776 B2
  • Filed: 11/28/2017
  • Issued: 01/29/2019
  • Est. Priority Date: 10/07/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product for obfuscating communication traffic patterns occurring over a communication infrastructure including a computer server, the computer program product comprising:

  • one or more non-transitory computer-readable storage devices and program instructions stored on at least one of the one or more non-transitory storage devices, the program instructions executable by a processor, the program instructions comprising;

    instructions to detect, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol;

    instructions to access, at the first communications device, a first traffic pattern based on the data communication sessions, the first traffic pattern determining communication occurrences between the first and the second communication devices over a first predefined time period;

    instructions to access, at the first communications device, a second traffic pattern based on the data communication sessions, the second traffic pattern determining communication occurrences between the first and the second communications devices over a second predefined time period that occurs after the first predefined time period; and

    instructions to generate, at the first communications device, based on a randomization process, a dummy data communication pattern for transmission to the second communications device, wherein the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions, wherein the generating of the dummy data communication pattern comprises;

    instructions to determine, at the first communications device, a first information content value associated with the first traffic pattern;

    instructions to determine, at the first communications device, a second information content value associated with the second traffic pattern;

    instructions to compare, at the first communications device, the first and the second information content values; and

    instructions to generate a first binary value based on the comparing determining the second information content value to be outside a predefined threshold range of the first information content value.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×