EP 2294761 A1 20110316 - METHOD OF TRACING AND OF RESURGENCE OF PSEUDONYMIZED STREAMS ON COMMUNICATION NETWORKS, AND METHOD OF SENDING INFORMATIVE STREAMS ABLE TO SECURE THE DATA TRAFFIC AND ITS ADDRESSEES
Title (en)
METHOD OF TRACING AND OF RESURGENCE OF PSEUDONYMIZED STREAMS ON COMMUNICATION NETWORKS, AND METHOD OF SENDING INFORMATIVE STREAMS ABLE TO SECURE THE DATA TRAFFIC AND ITS ADDRESSEES
Title (de)
VERFAHREN ZUR VERFOLGUNG UND WIEDERBELEBUNG PSEUDONYMISIERTER STRÖME IN KOMMUNIKATIONSNETZEN UND VERFAHREN ZUM SENDEN INFORMATIVER STRÖME ZUR SICHERUNG DES DATENVERKEHRS UND SEINER EMPFÄNGER
Title (fr)
PROCÈDE DE TRAÇABILITÉ ET DE RÉSURGENCE DE FLUX PSEUDONYMISES SUR DES RÉSEAUX DE COMMUNICATION, ET PROCÈDE D'ÉMISSION DE FLUX INFORMATIF APTE A SÉCURISER LE TRAFIC DE DONNÉES ET SES DESTINATAIRES
Publication
Application
Priority
- EP 2009056786 W 20090603
- FR 0853675 A 20080603
Abstract (en)
[origin: WO2009147163A1] The network comprising communication supports (31, 32, 33) sending streams (36) to receiving agents (37, 38, 39), the method comprises at least: - a step of allocating a cryptonymic identity (34) to communication supports by a first instance A, the streams (36) sent by a support bearing a mark dependent on its cryptonym, the cryptonymic identity of a support being distinct from its real identity; - a step of reading and analyzing (41, 42) the streams by a second instance B (22), said analysis comprising a phase of identifying streams to their communication supports by searching for similitude between the mark of the streams and the cryptonymic identity of the supports, with the aid of a table referencing the cryptonyms, and a phase of logging observable characteristics of the streams through the network; a behaviour defined by a set of characteristics is declared typical or atypical by comparison with a given set of criteria, the table of cryptonymic identities having no relationship with the real identities. The invention applies in particular for combating illegal downloads, the sending of material which is unsolicited or which may cover up identifiable malicious intentions.
IPC 8 full level
H04L 12/26 (2006.01)
CPC (source: EP US)
G06F 21/6254 (2013.01 - EP US); H04L 43/00 (2013.01 - EP US); H04L 43/026 (2013.01 - EP US); H04M 2203/6027 (2013.01 - EP US)
Citation (search report)
See references of WO 2009147163A1
Designated contracting state (EPC)
AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR
Designated extension state (EPC)
AL BA RS
DOCDB simple family (publication)
WO 2009147163 A1 20091210; CN 102084624 A 20110601; EP 2294761 A1 20110316; FR 2932043 A1 20091204; FR 2932043 B1 20100730; JP 2011522336 A 20110728; US 2011307691 A1 20111215; US 9225618 B2 20151229
DOCDB simple family (application)
EP 2009056786 W 20090603; CN 200980126222 A 20090603; EP 09757544 A 20090603; FR 0853675 A 20080603; JP 2011512109 A 20090603; US 99562009 A 20090603