Data processing: financial – business practice – management – or co – Business processing using cryptography
Reexamination Certificate
2005-02-24
2009-12-29
Fischer, Andrew J. (Department: 3685)
Data processing: financial, business practice, management, or co
Business processing using cryptography
C705S001100, C380S240000
Reexamination Certificate
active
07640215
ABSTRACT:
A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
REFERENCES:
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5687236 (1997-11-01), Moskowitz et al.
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5887133 (1999-03-01), Brown et al.
patent: 5889868 (1999-03-01), Moskowitz et al.
patent: 6078664 (2000-06-01), Moskowitz et al.
patent: 6205249 (2001-03-01), Moskowitz
patent: 6219788 (2001-04-01), Flavin et al.
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6285987 (2001-09-01), Roth et al.
patent: 6314451 (2001-11-01), Landsman et al.
patent: 6317761 (2001-11-01), Landsman et al.
patent: 6466967 (2002-10-01), Landsman et al.
patent: 6487538 (2002-11-01), Gupta et al.
patent: 2001/0010078 (2001-07-01), Moskowitz
patent: 2001/0029580 (2001-10-01), Moskowitz
patent: 2001/0054029 (2001-12-01), Williams
patent: 2002/0010679 (2002-01-01), Felsher
patent: 2002/0010684 (2002-01-01), Moskowitz
patent: 2002/0010757 (2002-01-01), Granik et al.
patent: 2002/0029186 (2002-03-01), Roth et al.
patent: 2002/0120666 (2002-08-01), Landsman et al.
patent: 2002/0129102 (2002-09-01), Landsman et al.
patent: 2002/0133518 (2002-09-01), Landsman et al.
patent: 2002/0198778 (2002-12-01), Landsman et al.
patent: 2003/0004804 (2003-01-01), Landsman et al.
patent: 2003/0005000 (2003-01-01), Landsman et al.
patent: 2003/0018885 (2003-01-01), Landsman et al.
patent: 2003/0084301 (2003-05-01), Krawetz
patent: 2003030143 (2003-01-01), None
Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,” Designing Privacy Enhancing Technologies: Proceedings/International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, Jul. 25-26, 2000, vol. 2009, pp. 10-29.
Chaum, David L., “Untraceable Electronic Mail, Return Addresses, And Digital Pseudonyms”,CACM, Feb. 1981, vol. 24, No. 2, pp. 84-88.
Felton, Edward W. et al., “Timing Attacks on Web Privacy”Proceedings of the 7thACM Conference on Computer and Communications Security, Nov. 2000, pp. 25-32.
Goldschlag, David M. et al. “Onion Routing for Anonymous and Private Internet Connections”,Communications of the ACM, Feb. 1999, vol. 42, No. 2, pp. 39-41.
Haveliwala, Taher, “Scalable Techniques for Clustering the Web”, 2000, http://dbpubs.stanford.edu/pub/2000-23 last printed Feb. 11, 2004.
Padmanabhan, V. N. et al. “An Investigation of Geographic Mapping Techniques for Internet Hosts”,Proceedings of acm sigcomm, Oct. 2001, vol. 31, No. 4, pp. 173-185.
Raymond, Jean-Francois, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems”,Designing Privacy Enhancing Technologies: Proceedings/International Workshop on Design Issues in Anonymity and Unobservability, Berkeley CA, Jul. 25-26, 2000, vol. 2009, pp. 10-29.
Reiter, Michael K. et al., “Crowds: Anonymity for Web Transactions”,ACM Transactions on Information and Systems Security, Nov. 1998, vol. 1, No. 1, pp. 66-92.
Shields, Clay et al. “A Protocol for Anonymous Communication Over The Internet”,Proceeding of the 7thACM Conference on Computer and Communications Security, Nov. 2000, pp. 33-42.
Paulson, Tom, “It was a fishy way for a scientist to start wiring houses onto Web”,Seattle Post-lntelligencer new article, Sep. 18, 2000, http://seattlep-i.nwsource.com/business/wang18.shtml.
Syverson, Paul F. et al., “Towards and Analysis of Onion Routing Security”,Designing Privacy Enhancing Technologies; Proceedings/International Workshop on Design Issues in Anonymity and Unoberservability, Berkeley, CA, Jul. 2000.
“Web Ad Blocking Under Linux/Unix, BeOS, MacOS and Windows” Last Update Feb 20, 2000. http://ecst.csuchico.edu/˜atman/spam/adblcok.shtml.
“Government Is Wary of tackling Online Privacy”New York Times Business Day, Sep. 6, 2001.
“As Big PC Brother Watches, Users Encounter Frustration”,New York Times, Sep. 5, 2001.
“Giving the Web a Memory Cost Its Users Privacy”New York Times, Apr. 9, 2001.
Wang, Yi Min, et al., “a Toolkit for Building Dependable and Extensible Home Networking Applications,” in proceeding USENIX Windows Systems Symposium, Aug. 2000, pp. 101-112.
Fielding R. et al., Hypertext Transfer Protocol-HTTP/I.1, http://www.w3.org/Protocols/HTTP/l.1/rfc2616.pdf.
Maxim White Paper 4: Glossary of 1-wire SHA-1 Terms, Jun. 7, 2002, Maxim Integrated Products, Dallas Semiconductor, Designer's Library, pp. 1-6.
Padmanabhan Venkata N.
Qiu Lili
Russell Wilfred
Simon Daniel R.
Sun Qixiang
Fischer Andrew J.
Lee & Hayes PLLC
Microsoft Corporation
Winter John M
LandOfFree
System and method for evaluating and enhancing source... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for evaluating and enhancing source..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for evaluating and enhancing source... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4143999