System and method for evaluating and enhancing source...

Data processing: financial – business practice – management – or co – Business processing using cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S001100, C380S240000

Reexamination Certificate

active

07640215

ABSTRACT:
A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.

REFERENCES:
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5687236 (1997-11-01), Moskowitz et al.
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5887133 (1999-03-01), Brown et al.
patent: 5889868 (1999-03-01), Moskowitz et al.
patent: 6078664 (2000-06-01), Moskowitz et al.
patent: 6205249 (2001-03-01), Moskowitz
patent: 6219788 (2001-04-01), Flavin et al.
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6285987 (2001-09-01), Roth et al.
patent: 6314451 (2001-11-01), Landsman et al.
patent: 6317761 (2001-11-01), Landsman et al.
patent: 6466967 (2002-10-01), Landsman et al.
patent: 6487538 (2002-11-01), Gupta et al.
patent: 2001/0010078 (2001-07-01), Moskowitz
patent: 2001/0029580 (2001-10-01), Moskowitz
patent: 2001/0054029 (2001-12-01), Williams
patent: 2002/0010679 (2002-01-01), Felsher
patent: 2002/0010684 (2002-01-01), Moskowitz
patent: 2002/0010757 (2002-01-01), Granik et al.
patent: 2002/0029186 (2002-03-01), Roth et al.
patent: 2002/0120666 (2002-08-01), Landsman et al.
patent: 2002/0129102 (2002-09-01), Landsman et al.
patent: 2002/0133518 (2002-09-01), Landsman et al.
patent: 2002/0198778 (2002-12-01), Landsman et al.
patent: 2003/0004804 (2003-01-01), Landsman et al.
patent: 2003/0005000 (2003-01-01), Landsman et al.
patent: 2003/0018885 (2003-01-01), Landsman et al.
patent: 2003/0084301 (2003-05-01), Krawetz
patent: 2003030143 (2003-01-01), None
Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,” Designing Privacy Enhancing Technologies: Proceedings/International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, Jul. 25-26, 2000, vol. 2009, pp. 10-29.
Chaum, David L., “Untraceable Electronic Mail, Return Addresses, And Digital Pseudonyms”,CACM, Feb. 1981, vol. 24, No. 2, pp. 84-88.
Felton, Edward W. et al., “Timing Attacks on Web Privacy”Proceedings of the 7thACM Conference on Computer and Communications Security, Nov. 2000, pp. 25-32.
Goldschlag, David M. et al. “Onion Routing for Anonymous and Private Internet Connections”,Communications of the ACM, Feb. 1999, vol. 42, No. 2, pp. 39-41.
Haveliwala, Taher, “Scalable Techniques for Clustering the Web”, 2000, http://dbpubs.stanford.edu/pub/2000-23 last printed Feb. 11, 2004.
Padmanabhan, V. N. et al. “An Investigation of Geographic Mapping Techniques for Internet Hosts”,Proceedings of acm sigcomm, Oct. 2001, vol. 31, No. 4, pp. 173-185.
Raymond, Jean-Francois, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems”,Designing Privacy Enhancing Technologies: Proceedings/International Workshop on Design Issues in Anonymity and Unobservability, Berkeley CA, Jul. 25-26, 2000, vol. 2009, pp. 10-29.
Reiter, Michael K. et al., “Crowds: Anonymity for Web Transactions”,ACM Transactions on Information and Systems Security, Nov. 1998, vol. 1, No. 1, pp. 66-92.
Shields, Clay et al. “A Protocol for Anonymous Communication Over The Internet”,Proceeding of the 7thACM Conference on Computer and Communications Security, Nov. 2000, pp. 33-42.
Paulson, Tom, “It was a fishy way for a scientist to start wiring houses onto Web”,Seattle Post-lntelligencer new article, Sep. 18, 2000, http://seattlep-i.nwsource.com/business/wang18.shtml.
Syverson, Paul F. et al., “Towards and Analysis of Onion Routing Security”,Designing Privacy Enhancing Technologies; Proceedings/International Workshop on Design Issues in Anonymity and Unoberservability, Berkeley, CA, Jul. 2000.
“Web Ad Blocking Under Linux/Unix, BeOS, MacOS and Windows” Last Update Feb 20, 2000. http://ecst.csuchico.edu/˜atman/spam/adblcok.shtml.
“Government Is Wary of tackling Online Privacy”New York Times Business Day, Sep. 6, 2001.
“As Big PC Brother Watches, Users Encounter Frustration”,New York Times, Sep. 5, 2001.
“Giving the Web a Memory Cost Its Users Privacy”New York Times, Apr. 9, 2001.
Wang, Yi Min, et al., “a Toolkit for Building Dependable and Extensible Home Networking Applications,” in proceeding USENIX Windows Systems Symposium, Aug. 2000, pp. 101-112.
Fielding R. et al., Hypertext Transfer Protocol-HTTP/I.1, http://www.w3.org/Protocols/HTTP/l.1/rfc2616.pdf.
Maxim White Paper 4: Glossary of 1-wire SHA-1 Terms, Jun. 7, 2002, Maxim Integrated Products, Dallas Semiconductor, Designer's Library, pp. 1-6.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for evaluating and enhancing source... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for evaluating and enhancing source..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for evaluating and enhancing source... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4143999

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.