Data processing method
11336623 · 2022-05-17
Assignee
Inventors
Cpc classification
G06F21/6263
PHYSICS
H04L63/0421
ELECTRICITY
H04L63/0407
ELECTRICITY
H04W12/02
ELECTRICITY
H04L63/0236
ELECTRICITY
H04L63/0414
ELECTRICITY
G06F21/6254
PHYSICS
International classification
Abstract
There is disclosed a method of processing a data packet received by a packet sniffer, the packet containing an associated identifier, the method including transmitting the packet to a recipient, determining if the identifier corresponds to a particular network, wherein if the identifier is determined to correspond to the particular network, the identifier is provided to the recipient; and if the identifier is determined to not correspond to the particular network, the identifier is withheld from the recipient.
Claims
1. A method of processing a data packet received by a packet sniffer, the data packet containing an associated identifier, the method comprising: modifying the data packet to anonymize the identifier by overwriting the identifier with a coded form of the identifier; transmitting the data packet to a recipient; determining whether the identifier corresponds to a particular network; in response to determining that the identifier corresponds to the particular network, transmitting to the recipient a data file including decoding information to enable the coded form of the identifier to be decoded, after the data packet is received by the recipient; and in response to determining that the identifier does not correspond to the particular network, withholding the identifier from the recipient.
2. The method as claimed in claim 1, wherein the data packet contains a plurality of identifiers and the method is performed in respect of each identifier in the plurality of identifiers.
3. The method as claimed in claim 2, wherein the plurality of identifiers comprises one or more media access control (MAC) addresses.
4. The method as claimed in claim 3, wherein the plurality of identifiers comprises between three and six MAC addresses inclusive.
5. The method as claimed in claim 2, wherein the plurality of identifiers comprises one or more service set identifiers (SSIDs).
6. The method as claimed in claim 1, wherein the decoding information comprises a reference code.
7. The method as claimed in claim 1, wherein the decoding information is recorded in a table.
8. The method as claimed in claim 1, wherein the decoding information is sent to the recipient separately from the data packet.
9. The method as claimed in claim 1, wherein the recipient is a server.
10. The method as claimed in claim 1, wherein the particular network is a local area network (LAN).
11. The method as claimed in claim 1, wherein the method further comprises removing some or all of a payload of the data packet before transmitting the data packet to the recipient.
12. A network device adapted to process a data packet, the network device comprising: a transmitter adapted to modify the data packet to anonymize an identifier in the data packet by overwriting the identifier with a coded form of the identifier and transmit the data packet to a recipient; and a determiner adapted to determine whether the identifier corresponds to a particular network; wherein in response to the determiner determining that the identifier corresponds to the particular network, the network device is adapted to transmit to the recipient a data file including decoding information to enable the coded form of the identifier to be decoded after the data packet is received by the recipient; and further wherein in response to the determiner determining that the identifier does not correspond to the particular network, the network device is adapted to withhold the identifier from the recipient.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) There now follows a detailed description of embodiments of the disclosure, for illustration purposes only, with reference to the appended drawings, in which:
(2)
(3)
(4)
(5)
(6)
DETAILED DESCRIPTION
(7) A schematic representation of a typical wireless LAN is shown at
(8)
(9)
(10)
(11) The payload 23 of the packet 3 is also shown in
(12) In some known systems, diagnostic processing on the type of LAN shown in
(13) The present disclosure anonymizes some or all of the MAC addresses and SSIDs in the data packets 3 before the data packets 3 are sent to the server 7 for diagnostic processing. A first embodiment of the disclosure will now be described.
(14) In a first embodiment of the disclosure a packet 3 is received by the sniffer 60. The MAC addresses 21 and SSIDs 22 on the packet are read. The sniffer 60 receives information from the access point 4 in relation to which devices are the client devices 2 of the LAN 1. If the MAC addresses 21 and SSIDs 22 indicate that the packet 3 was sent by a client device 2 of the LAN 1, the MAC addresses 21 and SSIDs 22 are not anonymized (i.e., they are not overwritten by MAC code 10 and SSID code 11) before being sent to the server 7. Instead, the packet is sent to the server with the MAC addresses 21 and SSIDs 22 in non-anonymized form. These packets are stored at the sniffer 60 and then sent to the server 7 in batches. The MAC addresses and SSIDs 22 of the packets are entered in a look up table 14, 15 along with a flag indicating the device has associated to the LAN.
(15) If the MAC addresses 21 and SSIDs 22 indicate that the packet 3 was sent by a device which is not a client device 2 of the LAN 1, the sending device must be either (i) a third party device; or (ii) a device which is part of the network, but at the time of sending, the device had not yet been observed by the sniffer 60 to have successfully associated to the LAN 1. The devices of (ii) are not third party devices and so there is no need for the MAC addresses and SSIDs to remain anonymized. The present embodiment enables these MAC addresses and SSIDs to be de-anonymized at the server, while preventing the third party MAC addresses and SSIDs to be de-anonymized at the server. This is achieved as follows.
(16) If the MAC addresses 21 and SSIDs 22 indicate that a packet 3 received at the sniffer 60 was sent by a device which is not a client device 2 of the LAN 1, the MAC addresses 21 are entered in a look up table 14 (see
(17) A similar method is then applied to the SSID 22 of the packet. In particular, one or more SSIDs 22 from of the packet 3 are entered in a second look up table 15. A reference code, which is referred to as the SSID code 11, is then assigned to each SSID 22. SSID code 11 is entered in the same row of the look up table 15 as SSID 22, but in a second column. Each SSID 22 in the packet 3 is then overwritten with its respective SSID code 11.
(18) The packet is truncated to remove the payload 23. This is so the payload 23 is not uploaded to the server 7 (as uploading the payload of a third party data packet to the server would infringe the privacy of the third party).
(19) If the access point 4 indicates to the sniffer 60 that successful authentication between the client device 2 and the LAN 1 has occurred, a mark is placed in the look up tables 14, 15 next to the MAC address/SSID corresponding to that device 2. The mark is placed in the “LAN Device” column 50 of the look up tables 14, 15 (see
(20) In the second embodiment of the disclosure, the MAC addresses and SSIDs of all packets 3 received at the sniffer 60 are anonymized, not simply those MAC addresses and SSIDs corresponding to devices that have not associated to the LAN 1. The process of this anonymization is as described in relation to the first embodiment. In particular, when any packet is received at the sniffer 60, the MAC addresses 21 of the packet 3 are entered in a look up table 14 (see
(21) As in the first embodiment, the packet is truncated to remove the payload 23. This is so the payload 23 is not uploaded to the server 7 (as uploading the payload of a third party data packet to the server would infringe the privacy of the third party).
(22) If a MAC/SSID of a packet 3 received by the sniffer 60 corresponds to a device which can be determined to be part of the LAN 1 a mark is placed in the look up tables 14, 15 next to the MAC address/SSID corresponding to that device 2. The mark is placed in the “LAN Device” column 50 of the look up tables 14, 15 (see
(23) The trimmed look up tables 14, 15 uploaded to the server therefore only contain MAC codes 10 and SSID codes 11 corresponding to devices that are associated to the LAN 1. They do not contain MAC codes 10 or SSID codes corresponding to third party devices. Therefore it is not possible to de-anonymize the MAC addresses or SSIDs associated with third party devices. Therefore, as with the first embodiment, this embodiment prevents the privacy of the third party devices from being infringed, while making available the MAC addresses and SSIDs of all devices associated to the LAN 1.
(24) The method is performed at a data processing device. The data processing device receives packets from an associated sniffer and processes the packets in accordance with the disclosure.
(25)
MULTIPLE SNIFFER ARRANGEMENT
(26) In some embodiments there is more than one data processing device associated with a particular network, each of which has an associated sniffer (see