Browse Prior Art Database

System and Method for Anonymization Proxy

IP.com Disclosure Number: IPCOM000245259D
Publication Date: 2016-Feb-22
Document File: 2 page(s) / 44K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a middleware proxy with the principal objective of anonymizing Internet use, such as through search engines, and disallowing a third party from knowing the origin of the search.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

System and Method for Anonymization Proxy

Corporates and subject matter experts (SMEs) are concerned with intentional and unintentional leakage of intellectual property (IP). For example, an organization might not allow employees to use a common search engine for patent related research because there is sufficient information in the incoming Internet Protocol (IP) address and search string for a third party to infer areas of the organization's interest . Likewise, there is a growing concern for search engines retain information about users , interests, patterns of behavior, session data, etc., and how this data is used (e.g., sold to third parties, etc.). In addition, users are concerned with adware for purchases being influenced by session characteristics from previous purchases , as well as maintained user details and session characteristics being used for targeted marketing , spam, advertising, etc., all of which are deemed non-business essential as well as an expensive and time-consuming distraction.

An anti-competitive solution is needed to counteract this class of problem .

The novel contribution is a middleware proxy with the principal objective of anonymizing Internet use, such as through search engines, and disallowing a third party from knowing the origin of the search. This includes the non-obvious exploitation of background art to yield a new middleware solution asset to deal with outbound anonymization and outbound IP protection, as well as scrub incoming payloads to defined business policies, at the scale of 100,000 transactions per second.

Associated with the proxy are methods for anonymizing session characteristics of the user:


• Changing the name, originating IP address, and presenting an anonymous façade to receiving third party servers


• Applying a rule base to disallow IP from leaking out-bound (e.g., if an organization has a new product name to keep for internal use only , this proxy allows a rule to be specified such that any outbound traffic , such as a web search, is halted/disallowed)


• Applying corporate-configured thresholds to scrub unnecessary business content (e.g., SPAM, adware, marketing, etc.) from incoming payloads satisfying web requests

The core novel step is a scalable proxy that acts on the users' (and businesses') behalf to assist in anonymizing outgoing payloads, as well as scrubbing incoming payloads to maintain compliance with business policies.

The system works by housing a new middleware proxy in the corporate demilitarized zone (DMZ). The proxy is both vertically and horizontally scalable, capable of dealing

with 1000s of conc...