Method and system for disguising a computer system's identity on a network
First Claim
1. A method for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID) in order to disguise an identity of said computer system to an application requesting a UUID for said client computer system, said method comprising the steps of:
- establishing a cloak bit for specifying whether to disguise said computer system'"'"'s identity;
establishing a storage device in said computer system including a primary location, wherein a UUID stored in said primary location is used as a UUID for said computer system;
determining whether said cloak bit is set or cleared;
generating an anonymous UUID in response to a determination that said cloak bit is set, wherein said anonymous UUID does not identify any particular computer system;
moving said real UUID to a secondary location within said storage device; and
providing said anonymous UUID in response to a request for said computer system'"'"'s UUID.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system are disclosed for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID in order to disguise an identity of the computer system to an application which is requesting a UUID for the client computer system. A storage device is established in the computer system. The storage device includes a primary and a second location. A UUID stored in the primary location is used as a UUID for the computer system. An anonymous UUID is generated. The anonymous UUID does not identify any particular computer system. The anonymous UUID is stored in the primary location within the storage device, and the real UUID is backed up by moving it into the secondary location. Thereafter, the anonymous UUID is provided in response to requests for the computer system'"'"'s UUID.
-
Citations
8 Claims
-
1. A method for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID) in order to disguise an identity of said computer system to an application requesting a UUID for said client computer system, said method comprising the steps of:
-
establishing a cloak bit for specifying whether to disguise said computer system'"'"'s identity; establishing a storage device in said computer system including a primary location, wherein a UUID stored in said primary location is used as a UUID for said computer system; determining whether said cloak bit is set or cleared; generating an anonymous UUID in response to a determination that said cloak bit is set, wherein said anonymous UUID does not identify any particular computer system; moving said real UUID to a secondary location within said storage device; and providing said anonymous UUID in response to a request for said computer system'"'"'s UUID. - View Dependent Claims (2, 3, 4)
-
-
5. A system for substituting an anonymous Universal Unique Identifier (UUID) for a computer system'"'"'s real UUID in order to disguise an identity of said computer system to an application requesting a UUID for said client computer system, said computer system including a CPU, comprising:
-
a cloak bit for specifying whether to disguise said computer system'"'"'s identity; a storage device in said computer system including a primary location, wherein a UUID stored in said primary location is used as a UUID for said computer system; means for determining whether said cloak bit is set or cleared; means for generating said anonymous UUID in response to a determination that said cloak bit is set, wherein said anonymous UUID does not identify any particular computer system; means for storing said anonymous UUID in said primary location within said storage device and for moving said real UUID to a secondary location within said storage device; and said system for providing said anonymous UUID in response to a request for said computer system'"'"'s UUID. - View Dependent Claims (6, 7, 8)
-
Specification