Method and system for disguising a computer system's identity on a network
First Claim
1. A method for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID in order to disguise an identity of said computer system to an application requesting a UUID for said client computer system, said method comprising the steps of:
- establishing a storage device in said computer system including a primary location, wherein a UUID stored in said primary location is used as a UUID for said computer system;
generating said anonymous UUID, wherein said anonymous UUID does not identify any particular computer system;
storing said anonymous UUID in said primary location within said storage device; and
providing said anonymous UUID in response to a request for said computer system'"'"'s UUID.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system are disclosed for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID in order to disguise an identity of the computer system to an application which is requesting a UUID for the client computer system. A storage device is established in the computer system. The storage device includes a primary and a second location. A UUID stored in the primary location is used as a UUID for the computer system. An anonymous UUID is generated. The anonymous UUID does not identify any particular computer system. The anonymous UUID is stored in the primary location within the storage device, and the real UUID is backed up by moving it into the secondary location. Thereafter, the anonymous UUID is provided in response to requests for the computer system'"'"'s UUID.
-
Citations
14 Claims
-
1. A method for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID in order to disguise an identity of said computer system to an application requesting a UUID for said client computer system, said method comprising the steps of:
-
establishing a storage device in said computer system including a primary location, wherein a UUID stored in said primary location is used as a UUID for said computer system;
generating said anonymous UUID, wherein said anonymous UUID does not identify any particular computer system;
storing said anonymous UUID in said primary location within said storage device; and
providing said anonymous UUID in response to a request for said computer system'"'"'s UUID. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID in order to disguise an identity of said computer system to an application requesting a UUID for said client computer system, said computer system including a CPU, comprising:
-
a storage device in said computer system including a primary location, wherein a UUID stored in said primary location is used as a UUID for said computer system;
said system for generating said anonymous UUID, wherein said anonymous UUID does not identify any particular computer system;
said anonymous UUID being stored in said primary location within said storage device; and
said system for providing said anonymous UUID in response to a request for said computer system'"'"'s UUID. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification