System and method for evaluating and enhancing source anonymity for encrypted web traffic
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
157 Citations
42 Claims
-
1-18. -18. (canceled)
-
19. A computer-readable medium having computer-executable instructions for performing steps by an Internet client to access Web pages, the steps comprising:
-
sending a request to access a target Web page;
receiving a list of objects in the target Web page;
identifying advertisement objects in the list of objects in the target Web page;
selecting randomly a subset of the identified advertisement objects; and
downloading, in an encrypted form, the objects in the target Web page except the subset of identified advertisement objects. - View Dependent Claims (20, 26, 27, 28, 29)
-
-
21. A method for an Internet client to access Web pages, comprising:
-
sending a request to access a target Web page;
receiving a list of objects in the target Web page;
identifying advertisement objects in the list of objects in the target Web page;
selecting randomly a subset of the identified advertisement objects; and
downloading, in an encrypted form, the objects in the target Web page except the subset of identified advertisement objects. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
-
22-25. -25. (canceled)
-
36. A Web advertisement blocker, comprising:
computer-executable instructions embodied on computer-readable media, and when executed, the computer-executable instructions facilitate, sending a request to access a target Web page;
receiving a list of objects in the target Web page;
identifying advertisement objects in the list of objects in the target Web page;
selecting randomly a subset of the identified advertisement objects; and
downloading, in an encrypted form, the objects in the target Web page except the subset of identified advertisement objects. - View Dependent Claims (37, 38, 39, 40, 41, 42)
Specification