METHOD OF TRACING AND OF RESURGENCE OF PSEUDONYMIZED STREAMS ON COMMUNICATION NETWORKS, AND METHOD OF SENDING INFORMATIVE STREAMS ABLE TO SECURE THE DATA TRAFFIC AND ITS ADDRESSEES
First Claim
1. A method for identifying streams capable to being sought in a communication network comprising communication media transmitting streams to addressees, sa method comprising at least:
- a step of allocation of a cryptonymic identity to communication media by a first instance, the streams transmitted by a medium bearing a graft masking, as a function of its cryptonymic identity, the cryptonym of a medium being distinct from its real identity;
a step of reading and of analyzing the streams by a second instance, said analysis comprising a phase of identifying streams to their communication media by searching for similarity between the possible graft of the streams and the possible cryptonymic identity of the media with the aid of a table listing the cryptonyms, and a phase of logging observable characteristics of the streams through the network; and
a behavior, defined by a set of characteristics, being declared typical or atypical by comparison with a given set of criteria, the table of cryptonymic identities having no link with the real identities.
1 Assignment
0 Petitions
Accused Products
Abstract
A network includes communication media transmitting streams to addressees, and a method includes: step of allocation of a cryptonymic identity to communication media by a first instance, the streams transmitted by a medium bearing a mark, as a function of its cryptonym, the cryptonymic identity of a medium being distinct from its real identity; step of reading and of analyzing the streams by a second instance, the analysis including a phase of identifying streams to their communication media by searching for similarity between the mark of the streams and the cryptonymic identity of the media, with the aid of a table listing the cryptonyms, and a phase of logging observable characteristics of the streams through the network. A behavior defined by a set of characteristics is declared typical or atypical by comparison with a given set of criteria, the table of cryptonymic identities having no link with the real identities. The invention is applied notably for combating illegal downloads, the sending of material that is unsolicited or likely to cover up identifiable malicious intentions.
44 Citations
32 Claims
-
1. A method for identifying streams capable to being sought in a communication network comprising communication media transmitting streams to addressees, sa method comprising at least:
-
a step of allocation of a cryptonymic identity to communication media by a first instance, the streams transmitted by a medium bearing a graft masking, as a function of its cryptonymic identity, the cryptonym of a medium being distinct from its real identity; a step of reading and of analyzing the streams by a second instance, said analysis comprising a phase of identifying streams to their communication media by searching for similarity between the possible graft of the streams and the possible cryptonymic identity of the media with the aid of a table listing the cryptonyms, and a phase of logging observable characteristics of the streams through the network; and a behavior, defined by a set of characteristics, being declared typical or atypical by comparison with a given set of criteria, the table of cryptonymic identities having no link with the real identities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
- 29. A method for transmitting a stream by a communication medium through a telecommunication or television broadcasting network capable of securing the data traffic, said method comprising a graft representing a cryptonym independent of the real identity of its transmission communication medium and of the content that it carries, said cryptonym being referenced in a first instance, the listing indicating the link with the corresponding real identity and said cryptonym being able to be found by a second instance not having access to the corresponding real identity.
Specification