ANONYMOUS AND SECURE NETWORK-BASED INTERACTION
First Claim
1. A system that facilitates private and secure network-based interaction comprising the following computer-implemented components:
- a computer implemented interface component that receives a network-based communication, the interface component resides within a network; and
a computer implemented anonymizer component that disguises a source identity of the network-based communication so as to minimize adverse effects on communication capabilities, and transmits the network-based communication that is disguised to a target destination outside the network, wherein the anonymizer component disguises the source identity at least by;
monitor network traffic on the network to determine that a user has set preference information for the target destination via a current cookie, the preference information enabling the user to conduct a particular type of search query on the target destination, andautomatically replace the current cookie with a new cookie to hold the preference information to enable the user to repeat the particular type of search query on the target destination via the preference information.
1 Assignment
0 Petitions
Accused Products
Abstract
The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities may anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation may employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom.
-
Citations
20 Claims
-
1. A system that facilitates private and secure network-based interaction comprising the following computer-implemented components:
-
a computer implemented interface component that receives a network-based communication, the interface component resides within a network; and a computer implemented anonymizer component that disguises a source identity of the network-based communication so as to minimize adverse effects on communication capabilities, and transmits the network-based communication that is disguised to a target destination outside the network, wherein the anonymizer component disguises the source identity at least by; monitor network traffic on the network to determine that a user has set preference information for the target destination via a current cookie, the preference information enabling the user to conduct a particular type of search query on the target destination, and automatically replace the current cookie with a new cookie to hold the preference information to enable the user to repeat the particular type of search query on the target destination via the preference information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
disguising a source identity of a network-based communication by using an anonymerizer component to at least; monitor network traffic on a network to determine that a user has set preference information for a target destination via a current cookie, the preference information enabling the user to conduct a particular type of search query on the target destination; and automatically replace the current cookie with a new cookie to hold the preference information to enable the user to repeat the particular type of search query on the target destination via the preference information; and transmit the network-based communication that is disguised to the target destination. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system that facilitates private and secure network-based interaction comprising the following computer-implemented components:
-
a computer implemented interface component that receives a network-based communication, the interface component resides within a network; and a computer implemented anonymizer component that disguises a source identity of the network-based communication so as to minimize adverse effects on communication capabilities, and transmits the network-based communication that is disguised to a target destination, wherein the anonymizer component disguises the source identity at least by; monitor network traffic on the network to determine that a user has set preference information for the target destination via a current cookie, the preference information enabling the user to conduct a particular type of search query on the target destination; automatically replace the current cookie with a new cookie to hold the preference information to enable the user to repeat the particular type of search query on the target destination via the preference information; and deleting one or more client header values associated with a hypertext transport protocol of the network-based communication to mask source software identifying information. - View Dependent Claims (20)
-
Specification