Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees

A communication network, receiver technology, applied in the field of identity devices

Inactive Publication Date: 2011-06-01
电信教育集团-巴黎电信学校
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Finally, there are issues related to the decentralization or collaboration of servers ("Internet speed free access")

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees
  • Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees
  • Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees

Examples

Experimental program
Comparison scheme
Effect test

example 23

[0101] After the reading of this stream, a second type of tag, an informational attribute, may have the function of informing a communicator, such as the receiver or intermediary of the stream, of information, in particular a warning message for this stream. This information is called a sticker and can take any form, such as audible or visual. It can be easily expressed or reduced to signaling elements which can be standardized.

[0102] A third instance 23 (hereafter referred to as instance C) receives signals sent by instance B seeking behavioral reports as they are eg atypical or set to be culpable. Settings from these discoveries can be confirmed or rejected, especially the authentication of transmitted content. However, instance C does not have access to the data reported by instance B about the detailed behavior of the sender. It does not know whether these data are considered to represent illegal or legal behavior, typical or atypical, useful or useless, relative to t...

example A

[0144] - Instance A knows the real identity of the sender and its transplant, but not his pseudonym;

[0145] - Instance Z knows the real identity of the sender and his pseudonym, but is not able to detect and read his graft;

[0146] - Anonymous authority 72 is aware of aliases and transplanted ethnic groups, without functional access to real identities of interest.

[0147] Instance B is only interested in the first identity corresponding to the concealed transplant. It does not perform a search for the second corresponding to the pseudonym, just as it does not perform a search for the real identity of the stream and its sender.

[0148] Various applications are conceivable. The first application is to access pseudonyms based on possession or knowledge of hidden transplants, e.g. Figure 7 shown. In this example, Paul32 was provided with a transplant and a pseudonym. He requests access to Julie 39's site, and Julie 39 wants to know if he has approval to provide transpla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network comprises communication supports (31, 32, 33) sending streams (36) to receiving agents (37, 38, 39), the method comprises at least: - a step of allocating a cryptonymic identity (34) to communication supports by a first instance A, the streams (36) sent by a support bearing a mark dependent on its cryptonym, the cryptonymic identity of a support being distinct from its real identity; - a step of reading and analyzing (41, 42) the streams by a second instance B (22), said analysis comprising a phase of identifying streams to their communication supports by searching for similitude between the mark of the streams and the cryptonymic identity of the supports, with the aid of a table referencing the cryptonyms, and a phase of logging observable characteristics of the streams through the network; a behaviour defined by a set of characteristics is declared typical or atypical by comparison with a given set of criteria, the table of cryptonymic identities having no relationship with the real identities. The invention applies in particular for combating illegal downloads, the sending of material which is unsolicited or which may cover up identifiable malicious intentions.

Description

technical field [0001] The present invention relates to a method for tracking and resurgence of pseudonymized streams in communication networks, mainly telecommunications and television broadcasting networks, which method enables easy detection of unauthorized or due to e.g. Streams to look for for statistical processing or other reasons for metrological analysis. The invention also relates to a method for transmitting information flows in such a network, which ensures data traffic or access to the data, the recipients of the data and the terminals used by the recipients. The invention also relates to a device for protecting the identity of the interlocutor, which avoids the disclosure of the real identity being used. Background technique [0002] This invention is mainly used to combat illegal downloading of intellectual works (upload or download - any kind of handover or stream activation for dissemination), and against the sending of unsolicited messages or blanket reque...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
CPCH04L12/2602H04L43/00H04L43/026G06F21/6254H04M2203/6027
Inventor M·里吉德尔P·洛里耶L·拉杜里
Owner 电信教育集团-巴黎电信学校