TECHNIQUES TO POLLUTE ELECTRONIC PROFILING
First Claim
Patent Images
1. A non-transitory computer-readable implemented method to process on a device, comprising:
- identifying, by the device, time intervals and dates that a principal is likely to be logged into a network;
determining, by the device, that the principal is not logged into the network during the time intervals and the dates; and
performing, by the device, actions over the network pretending to be the principal and by using a cloned identity for the principal, the actions taken are divergent from areas of interest associated with a true identity of the principal and the actions taken during the time intervals and dates.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques to pollute electronic profiling are provided. A cloned identity is created for a principal. Areas of interest are assigned to the cloned identity, where a number of the areas of interest are divergent from true interests of the principal. One or more actions are automatically processed in response to the assigned areas of interest. The actions appear to network eavesdroppers to be associated with the principal and not with the cloned identity.
8 Citations
20 Claims
-
1. A non-transitory computer-readable implemented method to process on a device, comprising:
-
identifying, by the device, time intervals and dates that a principal is likely to be logged into a network; determining, by the device, that the principal is not logged into the network during the time intervals and the dates; and performing, by the device, actions over the network pretending to be the principal and by using a cloned identity for the principal, the actions taken are divergent from areas of interest associated with a true identity of the principal and the actions taken during the time intervals and dates. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable implemented method to process on a device, comprising:
-
determining, by the device, first times and dates that a principal is likely to be logged onto a network performing principal actions; identifying, by the device, second times and dates that the principal is unlikely to be logged onto the network; performing, by the device, automated actions during the first times and dates on behalf of the principal when the principal is not logged onto the network and not performing the principal actions and using a cloned identity for the principal, the automated actions are based on divergent areas of interest for the principal. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system, comprising:
-
a processing device configured with a cloning agent that is implemented as executable instructions within a non-transitory computer-readable medium and that executes on the processing device; the cloning agent configured to automatically perform actions over a network as a cloned identity for a principal, the actions configured to pollute information being gathered on the principal by a network eavesdropper and the cloning agent configured to not process ay actions when the principal is logged onto the network and when the principal is unlikely to be logged onto the network. - View Dependent Claims (20)
-
Specification