Computer system identification
First Claim
Patent Images
1. A method comprising:
- receiving, over a global computer network, an unsolicited request from a first computer system coupled to the global computer network for a second computer system coupled to the global computer network to provide an identification of the second computer system;
in response to the request, providing a visual interface on the second computer system to notify both a user of the second computer system of the request and prompt the user to allow or deny the request; and
in response to the user allowing the request providing a hash value to the first computer system, the hash value being generated by encryption of a key associated with a first computer system with an identifier that identifies the second computer system, andbased on a response of the user to the request, selectively communicating the key to a browser of the second computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer system includes an interface and a processor. The interface is adapted to receive a request from another computer system for identification of the first computer system. The adapter also furnishes a hash value that identifies the first computer system to the other computer system. The processor is coupled to the interface and is adapted to encrypt an identifier that identifies the first computer system with a key associated with the other computer system to provide the hash value.
-
Citations
13 Claims
-
1. A method comprising:
- receiving, over a global computer network, an unsolicited request from a first computer system coupled to the global computer network for a second computer system coupled to the global computer network to provide an identification of the second computer system;
in response to the request, providing a visual interface on the second computer system to notify both a user of the second computer system of the request and prompt the user to allow or deny the request; and in response to the user allowing the request providing a hash value to the first computer system, the hash value being generated by encryption of a key associated with a first computer system with an identifier that identifies the second computer system, and based on a response of the user to the request, selectively communicating the key to a browser of the second computer system. - View Dependent Claims (2, 3, 4, 5)
- receiving, over a global computer network, an unsolicited request from a first computer system coupled to the global computer network for a second computer system coupled to the global computer network to provide an identification of the second computer system;
-
6. An article comprising a storage medium readable by a first processor-based system, the storage medium storing instructions to cause a processor of the first processor-based system to:
-
receive an unsolicited request over a global computer network from a first computer system coupled to the global computer network for a second computer system to provide an identification of the second computer system; in response to the request, provide a visual interface on the second computer system to notify both a user of the second computer system of the request and prompt the user to allow or deny the request; and in response to the user allowing the request, provide a hash value to the first computer system, the hash value being generated by encryption of a key associated with the first computer system with an identifier that identifies the second computer system, and based on a response of the user to the request, selectively communicating the key to a browser of the second computer system. - View Dependent Claims (7, 8, 9)
-
-
10. A system comprising:
-
a database; and a first computer coupled to the database to; receive an unsolicited request over a global computer network from a second computer coupled to the global computer network for the first computer to provide an identification of the first computer; in response to the request, provide a visual interface on the first computer to notify both a user of the first computer of the request and prompt the user to allow or deny the request; and in response to the user allowing the request, provide a hash value to the second computer, the hash value being generated by encryption of a key associated with the second computer with an identifier that identifies the first computer, and based on a response of the user to the request, selectively communicating the key to a browser of the first computer. - View Dependent Claims (11, 12, 13)
-
Specification