Method and system for obscuring user access patterns using a buffer memory
First Claim
1. In a computer network, a method for obscuring user requests for information comprising:
- routing a user computer request for information, aimed at another network member, to a first cache memory;
if the first cache memory contains the requested information, returning the requested information in response to the user request without releasing the user request to the network member;
if the first cache memory does not contain the requested information, editing user identity information contained in the request, resulting in an edited request with obscured identity information;
releasing the edited request to the network member;
receiving the requested information from the network member; and
storing a copy of the requested information in the first cache memory such that user requests for information that can be satisfied by information stored in the cache memory are not revealed to other network members, and user requests that cannot be satisfied by the cache memory are obscured by editing prior to release to other network members.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for obscuring user requests for information in a computer network. A user request for information, aimed at another network member, is routed to a first cache memory. If the first cache memory contains the requested information, the cache returns the requested information in response to the user request without releasing the user request to the network member. If the first cache memory does not contain the requested information, a first reference editing function edits user identity information contained in the request, resulting in an edited request with obscured identity information. The edited request is then released to the network member and the requested information is received by the user from the network member. A copy of the requested information is stored in the first cache memory. In this method and system, user privacy is enhanced because user requests for information that can be satisfied by information stored in the cache memory are not revealed to other network members, and user requests that cannot be satisfied by the cache memory are obscured by the reference editing function prior to release to other network members. A software program and system for implementing the method are also disclosed.
65 Citations
27 Claims
-
1. In a computer network, a method for obscuring user requests for information comprising:
-
routing a user computer request for information, aimed at another network member, to a first cache memory; if the first cache memory contains the requested information, returning the requested information in response to the user request without releasing the user request to the network member; if the first cache memory does not contain the requested information, editing user identity information contained in the request, resulting in an edited request with obscured identity information; releasing the edited request to the network member; receiving the requested information from the network member; and storing a copy of the requested information in the first cache memory such that user requests for information that can be satisfied by information stored in the cache memory are not revealed to other network members, and user requests that cannot be satisfied by the cache memory are obscured by editing prior to release to other network members. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a computer network, a software program embedded in a computer-readable medium for obscuring user requests for information, said software program configuring a computer system to:
-
route a user computer request for information, aimed at another network member, to a first cache memory; if the first cache memory contains the requested information, return the requested information in response to the user request without releasing the user request to the network member; if the first cache memory does not contain the requested information, edit user identity information contained in the request, resulting in an edited request with obscured identity information; release the edited request to the network member; receive the requested information from the network member; and
store a copy of the requested information in the first cache memory such that user requests for information that can be satisfied by information stored in the cache memory are not revealed to other network members, and user requests that cannot be satisfied by the cache memory are obscured by editing prior to release to other network members. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. In a computer network, a system for obscuring user requests for information comprising:
-
a user computer having a processor; a server computer containing information sought by the user computer;
a first cache memory capable of storing information; anda reference editing function capable of editing user identity information contained in a request for information, wherein a request for information from the user computer, aimed at the server computer, is routed by the processor to the first cache memory, and if the first cache memory contains the requested information, the requested information is returned in response to the user request without releasing the user request to the server computer;
butif the first cache memory does not contain the requested information, the first reference editing function edits user identity information contained in the request prior to releasing the request to the server computer, and upon receipt of the requested information from the server computer, the first cache memory stores a copy of the requested information such that user requests for information that can be satisfied by information stored in the first cache memory are not revealed to other network members, and user requests that cannot be satisfied by the first cache memory are obscured by the first reference editing function prior to release to the server computer. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification