SYSTEM AND METHOD FOR EXTRACTING USER IDENTIFIERS OVER ENCRYPTED COMMUNICATION TRAFFIC
First Claim
Patent Images
1. A method, comprising:
- monitoring multiple flows of communication traffic;
sending to a user a sequence of messages in accordance with a first temporal pattern;
identifying among the monitored flows a flow whose activity has a second temporal pattern that matches the first temporal pattern; and
associating the identified flow with the user.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for extracting user identifiers over encrypted communication traffic are provided herein. An example method includes monitoring multiple flows of communication traffic. A sequence of messages is then sent to a user in accordance with a first temporal pattern. A flow whose activity has a second temporal pattern that matches the first pattern is then identified among the monitored flows. The identified flow is then associated with the user.
20 Citations
20 Claims
-
1. A method, comprising:
-
monitoring multiple flows of communication traffic; sending to a user a sequence of messages in accordance with a first temporal pattern; identifying among the monitored flows a flow whose activity has a second temporal pattern that matches the first temporal pattern; and associating the identified flow with the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. Apparatus, comprising:
-
an interface for communicating over a communication network; and a processor, which is configured to monitor multiple flows of communication traffic in the communication network, to send to a user a sequence of messages in accordance with a first temporal pattern, to identify among the monitored flows a flow whose activity has a second temporal pattern that matches the first temporal pattern, and to associate the identified flow with the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification