Integration of intentional noise into a communication channel to simulate activity
First Claim
1. A method of simulating activity to conceal actual activity associated with a wireless network, comprising:
- generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device, the sham push message including an indication that the sham push message is not an actual push message from a third party associated with the mobile application;
retrieving an application registration identifier associated with the mobile application hosted on the mobile device, wherein the target mobile device is subscribed to the push service provider for push message delivery;
encrypting the sham push message; and
transmitting the encrypted sham push message to the target mobile device associated with the application registration identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
An example method of simulating activity to conceal actual activity associated with a wireless network includes generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device. The sham push message includes an indication that the sham push message is not an actual push message from a third party associated with the mobile application. The method also includes retrieving an application registration identifier associated with the mobile application hosted on the mobile device. The target mobile device is subscribed to the push service provider for push message delivery. The method further includes encrypting the sham push message. The method also includes transmitting the encrypted sham push message to the target mobile device associated with the application registration identifier.
-
Citations
20 Claims
-
1. A method of simulating activity to conceal actual activity associated with a wireless network, comprising:
- generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device, the sham push message including an indication that the sham push message is not an actual push message from a third party associated with the mobile application;
retrieving an application registration identifier associated with the mobile application hosted on the mobile device, wherein the target mobile device is subscribed to the push service provider for push message delivery;
encrypting the sham push message; and
transmitting the encrypted sham push message to the target mobile device associated with the application registration identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
- generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device, the sham push message including an indication that the sham push message is not an actual push message from a third party associated with the mobile application;
-
11. A system for simulating activity to conceal actual activity associated with a wireless network, comprising:
- a memory that stores one or more application registration identifiers associated with one or more mobile applications hosted on one or more target mobile devices;
an encryptor that encrypts one or more sham push messages operable to simulate activity on a communication channel between a push service provider and a target mobile device; and
a message generator that generates a sham push message including an indication that the sham push message is not an actual push message from a third party associated with a mobile application, retrieves an application registration identifier associated with the mobile application hosted on the mobile device, and transmits the encrypted sham push message to the target mobile device associated with the application registration identifier, wherein the target mobile device is subscribed to the push service provider for push message delivery. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
- a memory that stores one or more application registration identifiers associated with one or more mobile applications hosted on one or more target mobile devices;
-
20. A non-transitory machine-readable medium comprising a plurality of machine-readable instructions that when executed by one or more processors is adapted to cause the one or more processors to perform a method comprising:
generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device, the sham push message including an indication that the sham push message is not an actual push message from a third party associated with the mobile application;
retrieving an application registration identifier associated with the mobile application hosted on the mobile device, wherein the target mobile device is subscribed to the push service provider for push message delivery;
encrypting the sham push message; and
transmitting the encrypted sham push message to the target mobile device associated with the application registration identifier.
Specification