Browse Prior Art Database

Services for Providing Enterprise Security Enhancement Disclosure Number: IPCOM000202163D
Publication Date: 2010-Dec-06
Document File: 2 page(s) / 26K

Publishing Venue

The Prior Art Database


Disclosed are novel methods to provide services enhancing user and company security through realistic web traffic emulation.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Services for Providing Enterprise Security Enhancement

Historically, vendors of page-tagging analytics solutions have used third-party cookies sent from the vendor's domain instead of the domain of the website being browsed. Third-party cookies can manage visitors who cross multiple unrelated domains within the company's site, because the cookie is always managed by the vendor's servers. However, third-party cookies in principle allow tracking an individual user across the sites of different companies, allowing the analytics vendor to collate the user's activity on other sites. On these sites, because the user thought they were anonymous, they may have provided personal information with their activity. Privacy concerns related to the use of cookies have therefore led a noticeable minority of users to block or delete third-party cookies.

Presently, the only known method for preventing analytics companies from capturing analytic information is to disable cookies. Such disablement may render certain websites unavailable. Therefore, new methods are needed to thwart the security concerns of user tracking via cookies.

The disclosed invention is a system and method to enhance user security through an intelligent method of background web traffic emulation. A program local to the user, web browser plugin, or external tool analyzes the user's current web tasks and performs background non-random obfuscation.

The disclosed invention has numerous advantages over current methods:
• Improved user security
• Improved company security
• Maintained competitive advantage through invention implementation

The disclosed invention is comprised of a set of modules, as follows:

1. User Browser Interaction Analysis Component

This component monitors a user's standard interaction with a web browser to create a pattern that emulates the real-world method in which a user interacts with a web site. The system can track a variety of metrics, such as average length on page, average length per word, number of links clicked per page, total time per site, etc. These metrics are calculated over the total browser time period of a user. These calculations are then used by the obfuscation generator to prevent analytics engines from discerning obfuscated browsing actions from real.

2. Obfuscation Selection Component

This component selects when to initiate the obfuscation generator. Initiation can be automatic or through manual selection. For example, a user may specify that obfuscation should occur whenever the user is visiting a specific website. At that point, whenever the user visits that page the obfuscation


Page 02 of 2

generator is enabled. In other embodiments, the web browser may be a...