Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees
First Claim
1. A method for identifying streams requested in a communication network, the communication network comprising communication media transmitting the streams to addressees, the method comprising:
- allocating, using one or more hardware processors, a cryptonymic identity to a communication medium by a first instance, the cryptonymic identity being different from the real identity of the communication medium;
applying, using one or more hardware processors, a graft mask corresponding to the allocated cryptonymic identity to one or more streams transmitted by the communication medium;
analyzing, using one or more hardware processors and by a second instance following the first instance, the one or more streams transmitted by the communication medium by;
reading the one or more streams transmitted by the communication medium,correlating the graft mask applied to the one or more streams to cryptonymic identities in a table of cryptonymic identities and to the cryptonymic identity allocated to the communication medium, the cryptonymic identities in the table of cryptonymic identities being different from the real identities of the communication media, and the table of cryptonymic identities not including the real identities of the communication media,associating the one or more streams with the communication medium transmitting the streams based on a similarity determined in the correlation of the graft mask, andrecording observable characteristics of the one or more associated streams through the communication network without access to the content of the one or more associated streams;
comparing, using one or more hardware processors, a behavior defined by a set of one or more of the recorded observable characteristics with a predetermined set of observable characteristics to determine whether the behavior is typical or atypical;
receiving, using one or more hardware processors and by a third instance, a signal indicating whether the behavior is typical or atypical;
verifying, based on the signal indicating whether the behavior is typical or atypical and by the third instance, the content of the one or more associated streams; and
verifying, based on the content of the one or more associated streams and by the third instance, lawfulness, according to the current laws of a jurisdiction, of transmitting intellectual work to the addressees via the one or more associated streams,wherein the recorded observable characteristics are linked only to the cryptonymic identity, andwherein the second instance has no access to the content of the one or more associated streams.
1 Assignment
0 Petitions
Accused Products
Abstract
A network includes communication media transmitting streams to addressees, and a method includes: step of allocation of a cryptonymic identity to communication media by a first instance, the streams transmitted by a medium bearing a mark, as a function of its cryptonym, the cryptonymic identity of a medium being distinct from its real identity; step of reading and of analyzing the streams by a second instance, the analysis including a phase of identifying streams to their communication media by searching for similarity between the mark of the streams and the cryptonymic identity of the media, with the aid of a table listing the cryptonyms, and a phase of logging observable characteristics of the streams through the network. A behavior defined by a set of characteristics is declared typical or atypical by comparison with a given set of criteria, the table of cryptonymic identities having no link with the real identities. The invention is applied notably for combating illegal downloads, the sending of material that is unsolicited or likely to cover up identifiable malicious intentions.
-
Citations
24 Claims
-
1. A method for identifying streams requested in a communication network, the communication network comprising communication media transmitting the streams to addressees, the method comprising:
-
allocating, using one or more hardware processors, a cryptonymic identity to a communication medium by a first instance, the cryptonymic identity being different from the real identity of the communication medium; applying, using one or more hardware processors, a graft mask corresponding to the allocated cryptonymic identity to one or more streams transmitted by the communication medium; analyzing, using one or more hardware processors and by a second instance following the first instance, the one or more streams transmitted by the communication medium by; reading the one or more streams transmitted by the communication medium, correlating the graft mask applied to the one or more streams to cryptonymic identities in a table of cryptonymic identities and to the cryptonymic identity allocated to the communication medium, the cryptonymic identities in the table of cryptonymic identities being different from the real identities of the communication media, and the table of cryptonymic identities not including the real identities of the communication media, associating the one or more streams with the communication medium transmitting the streams based on a similarity determined in the correlation of the graft mask, and recording observable characteristics of the one or more associated streams through the communication network without access to the content of the one or more associated streams; comparing, using one or more hardware processors, a behavior defined by a set of one or more of the recorded observable characteristics with a predetermined set of observable characteristics to determine whether the behavior is typical or atypical; receiving, using one or more hardware processors and by a third instance, a signal indicating whether the behavior is typical or atypical; verifying, based on the signal indicating whether the behavior is typical or atypical and by the third instance, the content of the one or more associated streams; and verifying, based on the content of the one or more associated streams and by the third instance, lawfulness, according to the current laws of a jurisdiction, of transmitting intellectual work to the addressees via the one or more associated streams, wherein the recorded observable characteristics are linked only to the cryptonymic identity, and wherein the second instance has no access to the content of the one or more associated streams. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for transmitting a stream using a communication medium through a telecommunication or television broadcasting network configured to secure data traffic, said method comprising:
-
referencing, using one or more hardware processors by a first instance, a graft mask representing a cryptonymic identity, the cryptonymic identity being different from the real identity of the communication medium used to transmit the stream and different from the content within the stream; and analyzing, using one or more hardware processors by a second instance, the one or more streams transmitted by the communication medium by; reading the one or more streams transmitted by the communication medium, correlating the graft mask applied to the one or more streams to cryptonymic identities in a table of cryptonymic identities and to the cryptonymic identity allocated to the communication medium, the cryptonymic identities in the table of cryptonymic identities being different from the real identities of the communication media, and the table of cryptonymic identities not including the real identities of the communication media, associating the one or more streams with the communication medium transmitting the streams based on a similarity determined in the correlation of the graft mask, and recording observable characteristics of the one or more associated streams through the communication network without access to the content of the one or more associated streams; comparing, using one or more hardware processors, a behavior defined by a set of one or more of the recorded observable characteristics with a predetermined set of observable characteristics to determine whether the behavior is typical or atypical; receiving, using one or more hardware processors and by a third instance, a signal indicating whether the behavior is typical or atypical; verifying, based on the signal indicating whether the behavior is typical or atypical and by the third instance, the content of the one or more associated streams; and verifying, based on the content of the one or more associated streams and by the third instance, lawfulness, according to the current laws of a jurisdiction, of transmitting intellectual work to the addressees via the one or more associated streams, wherein the recorded observable characteristics are linked only to the cryptonymic identity, and wherein the second instance has no access to the content of the one or more associated streams. - View Dependent Claims (22, 23, 24)
-
Specification