DATA STREAM TRAFFIC CONTROL
First Claim
Patent Images
1. A system for controlling data stream traffic, comprising:
- a processor to;
process a data stream at least partially scrambled so as to anonymize data encoded in the data stream,compute a bit equivalent entropy of the processed data stream; and
controlling traffic of the data stream based on the computed bit equivalent entropy.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques related to data stream traffic control are disclosed herein. A bit equivalent entropy of an anonymized data stream is computed. Traffic of the data stream is controlled based on the value of the bit equivalent entropy.
-
Citations
15 Claims
-
1. A system for controlling data stream traffic, comprising:
-
a processor to; process a data stream at least partially scrambled so as to anonymize data encoded in the data stream, compute a bit equivalent entropy of the processed data stream; and controlling traffic of the data stream based on the computed bit equivalent entropy. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method performed by a processor, comprising:
-
anonymizing a data stream; and computing, by the processor, a bit equivalent entropy of the anonymized data stream; and generating, by the processor, a value of the bit equivalent entropy of the anonymized data stream; and controlling traffic of the data stream based on the generated value of the bit equivalent entropy. - View Dependent Claims (8, 9, 10)
-
-
11. A computer software product comprising a tangible medium readable by a processor, the medium having stored thereon a set of instructions for controlling a data stream, the instructions comprising:
-
(a) a set of instructions which, when loaded into a memory and executed by the processor, causes processing anonymized data encoded in the data stream; (b) a set of instructions which, when loaded into a memory and executed by the processor, causes computation of a bit equivalent entropy of the processed data stream; and (c) a set of instructions which, when loaded into a memory and executed by the processor, causes determining whether the data stream is suitably encrypted based on the bit equivalent entropy. (d) a set of instructions which, when loaded into a memory and executed by the processor, causes, upon the data stream being determined to be suitably encrypted, allowing traffic containing the data stream, or upon the data stream being determined as not being suitably encrypted, restricting traffic containing the data stream. - View Dependent Claims (12, 13, 14, 15)
-
Specification