Systems and methods to emulate user network activity
First Claim
Patent Images
1. A computer implemented method comprising:
- monitoring, at a processor, one or more network activities corresponding to a particular user;
detecting, at the processor, a period of inactivity by the particular user based on the monitoring; and
in response to detecting the period of inactivity by the particular user, automatically generating, at the processor, additional network activity that is different from the one or more network activities of the particular user, wherein the additional network activity prevents a remote user tracking engine from identifying a usage pattern corresponding to the one or more network activities of the particular user, wherein automatically generating the additional network activity comprises;
automatically generating a plurality of email messages containing predetermined keywords; and
automatically sending each of the plurality of email messages to at least one of a plurality of email addresses.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods to emulate user network activity to change the profiling of users of the network are disclosed. A method includes monitoring network activity corresponding to a particular user. The method includes automatically generating emulated user network activity when a usage pattern is detected in the monitored network activity. The emulated user network activity may be detectable by a user tracking engine as the network activity of the particular user and the user tracking engine may attempt to profile the emulated user activity.
37 Citations
26 Claims
-
1. A computer implemented method comprising:
-
monitoring, at a processor, one or more network activities corresponding to a particular user; detecting, at the processor, a period of inactivity by the particular user based on the monitoring; and in response to detecting the period of inactivity by the particular user, automatically generating, at the processor, additional network activity that is different from the one or more network activities of the particular user, wherein the additional network activity prevents a remote user tracking engine from identifying a usage pattern corresponding to the one or more network activities of the particular user, wherein automatically generating the additional network activity comprises; automatically generating a plurality of email messages containing predetermined keywords; and automatically sending each of the plurality of email messages to at least one of a plurality of email addresses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a processor; and a memory accessible to the processor, the memory including; an anti-profiling component that is executable by the processor to; monitor one or more network activities corresponding to a particular user; detect a period of inactivity by the particular user based on the monitoring; and in response to detecting the period of inactivity by the particular user, automatically generate additional network activity that is different from the one or more network activities of the particular user, wherein the additional network activity prevents a remote user tracking engine from identifying a usage pattern corresponding to the one or more network activities of the particular user; and a web search emulation component configured to submit at least one user query to a search engine and to submit a hypertext transfer protocol request corresponding to at least one link from search results generated by the search engine. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A non-transitory computer-readable storage medium comprising instructions that, when executed by a processor, cause the processor to perform a method, the method comprising:
-
monitoring, at the processor, one or more network activities corresponding to a particular user; detecting, at the processor, a period of inactivity by the particular user based on the monitoring; and in response to detecting the period of inactivity by the particular user, automatically generating, at the processor, additional network activity that is different from the one or more network activities of the particular user to prevent a remote user tracking engine from identifying a usage pattern corresponding to the one or more network activities of the particular user, wherein automatically generating the additional network activity comprises sending a request to a video server of an Internet Protocol television system to receive streaming media content. - View Dependent Claims (25, 26)
-
Specification