SURREPTITIOUS WEB SERVER BIAS TOWARDS DESIRED BROWSERS
First Claim
1. A method of processing requests from a client system to a server system through a communications network, the method comprising:
- establishing a covert packetization pattern for fragmenting data into packets before transmission;
splitting a request into one or more packets according to the covert packetization pattern;
transmitting each packet to a server system;
responsive to reconstructing fragmented packets, recognizing the covert packetization pattern; and
responsive to recognizing the covert packetization pattern, giving priority to a client system.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention address deficiencies of the art in respect to processing requests from a client to a server and provide a novel and non-obvious method, system and computer program product for transmitting data in a surreptitious pattern. In this regard, in one embodiment of the invention, a method for processing requests from a client system to a server system through a communications network can be provided. The method can include establishing a covert packetization pattern for fragmenting data into packets before transmission, splitting a request into one or more packets according to the covert packetization pattern, transmitting each packet to a server system, responsive to reconstructing fragmented packets, recognizing the covert packetization pattern, and responsive to recognizing the covert packetization pattern, giving priority to a client system.
25 Citations
13 Claims
-
1. A method of processing requests from a client system to a server system through a communications network, the method comprising:
-
establishing a covert packetization pattern for fragmenting data into packets before transmission; splitting a request into one or more packets according to the covert packetization pattern; transmitting each packet to a server system; responsive to reconstructing fragmented packets, recognizing the covert packetization pattern; and responsive to recognizing the covert packetization pattern, giving priority to a client system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A client request processing system comprising:
-
a client entity; a server; covert packet generator logic coupled to the client entity comprising program code enabled to establish a covert packetization pattern for fragmenting data into packets before transmission, split a request into one or more packets according to the covert packetization pattern and transmit each packet to a server system through a data communications link; and
,covert packet recognizer logic coupled to the server comprising program code enabled to reconstruct fragmented packets, recognize the covert packetization pattern, and responsive to recognizing the covert packetization pattern, give priority to the client entity. - View Dependent Claims (7, 8)
-
-
9. A computer program product comprising a computer usable medium embodying computer usable program code for validating software entitlement of a software product the computer program product comprising:
-
computer usable program code for establishing a covert packetization pattern for fragmenting data into packets before transmission; computer usable program code for splitting a request into one or more packets according to the covert packetization pattern; computer usable program code for transmitting each packet to a server system; computer usable program code for recognizing the covert packetization pattern responsive to reconstructing the fragmented packets; and computer useable program code for giving priority to a client system responsive to recognizing the covert packetization pattern. - View Dependent Claims (10, 11, 12, 13)
-
Specification