Anonymous and secure network-based interaction
First Claim
1. A system that facilitates private and secure network-based interaction comprising the following computer-implemented components:
- a computer-implemented interface component that receives a network-based communication originated by a user, the interface component resides within a network;
a computer-implemented simulator component to recommend anonymizing of a source identity included in the network-based communication in response to determining that the anonymizing minimizes inferences made regarding the user, the determining being made based at least on a simulation of a user interaction through the network that includes the network-based communication as guided by a long-term privacy goal of the user; and
a computer-implemented anonymizer component that, based at least on the recommendation from the simulator component, disguises a source identity of the network-based communication so as to minimize adverse effects on communication capabilities, and transmits the network-based communication that is disguised to a target destination outside the network, wherein the anonymizer component disguises the source identity at least by;
monitoring network traffic on the network to determine that the user has set preference information for the target destination via a specific cookie value in a current cookie, the preference information enabling the user to conduct a particular type of search query on the target destination, andautomatically replacing the current cookie with a new cookie that includes the specific cookie value to hold the preference information to enable the user to repeat the particular type of search query on the target destination via the preference information.
1 Assignment
0 Petitions
Accused Products
Abstract
The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities may anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation may employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom.
80 Citations
20 Claims
-
1. A system that facilitates private and secure network-based interaction comprising the following computer-implemented components:
-
a computer-implemented interface component that receives a network-based communication originated by a user, the interface component resides within a network; a computer-implemented simulator component to recommend anonymizing of a source identity included in the network-based communication in response to determining that the anonymizing minimizes inferences made regarding the user, the determining being made based at least on a simulation of a user interaction through the network that includes the network-based communication as guided by a long-term privacy goal of the user; and a computer-implemented anonymizer component that, based at least on the recommendation from the simulator component, disguises a source identity of the network-based communication so as to minimize adverse effects on communication capabilities, and transmits the network-based communication that is disguised to a target destination outside the network, wherein the anonymizer component disguises the source identity at least by; monitoring network traffic on the network to determine that the user has set preference information for the target destination via a specific cookie value in a current cookie, the preference information enabling the user to conduct a particular type of search query on the target destination, and automatically replacing the current cookie with a new cookie that includes the specific cookie value to hold the preference information to enable the user to repeat the particular type of search query on the target destination via the preference information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
determining that a recommendation for an anonymization of a source identity included in a network-based communication originated by a user minimizes inferences made regarding the user, the determining being made based at least on a simulation of a user interaction through the network that includes the network-based communication as guided by a long-term privacy goal of the user; disguising the source identity of the network-based communication following the determining and based on the recommendation by using an anonymizer component to at least; determine that the user has set preference information for a target destination via a current cookie, the preference information enabling the user to conduct a particular type of search query on the target destination; and automatically replace the current cookie with a new cookie to hold the preference information to enable the user to repeat the particular type of search query on the target destination via the preference information; and transmitting the network-based communication that is disguised to the target destination. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system that facilitates private and secure network-based interaction comprising the following computer-implemented components:
-
a computer-implemented interface component that receives a network-based communication originated by a user, the interface component resides within a network; a computer-implemented simulator component to recommend anonymizing of source identity information included in the network-based communication in response to determining that the anonymizing minimizes inferences made regarding the user, the determining being made based at least on a simulation of a user interaction through the network that includes the network-based communication as guided by a long-term privacy goal of the user; and a computer-implemented anonymizer component that disguises a source identity of the network-based communication based at least on the recommendation from the simulator component, wherein the anonymizer component disguises the source identity by implementing at least one of; replacing a current cookie that holds preference information enabling the user to conduct a particular type of search query on a target destination with a new cookie that holds the preference information after a predetermined time interval; and deleting one or more client header values associated with a hypertext transport protocol of the network-based communication to mask source software identifying information. - View Dependent Claims (20)
-
Specification