Anonymization of traffic patterns over communication networks

    公开(公告)号:US10178004B2

    公开(公告)日:2019-01-08

    申请号:US15823803

    申请日:2017-11-28

    Abstract: A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.

    Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads

    公开(公告)号:US20180196958A1

    公开(公告)日:2018-07-12

    申请号:US15912637

    申请日:2018-03-06

    CPC classification number: G06F21/6218 G06F8/427 G06F8/433 G06F21/577

    Abstract: Automatically generating audit logs is provided. Audit log statement insertion points are identified in software components of an application based on a static code analysis identifying start and end operations on sensitive data in the software components of the application. The application is instrumented with audit log statements at the audit log statement insertion points in the software components of the application. Audit logs of monitored sensitive data activity events in the application are generated using the audit log statements at the audit log statement insertion points in the software components of the application. A dynamic code analysis is performed on the application during execution of the application to prevent executing source code of the application from recording in the audit logs the sensitive data processed by the application.

Patent Agency Ranking