×

Secure identification of intranet network

  • US 8,635,680 B2
  • Filed: 04/19/2007
  • Issued: 01/21/2014
  • Est. Priority Date: 04/19/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method performed on a first computing device, the method comprising generating a signature of a network based on an identifier of a second computing device and a name, where the name is selected from a first name and a second name in response to a first condition, where the identifier is selected from a single identifier and a combination of identifiers in response to a second condition, where the first computing device and the second computing device are each coupled to the network, where the generated network signature is not obtainable from outside the network, where the generated network signature is configured to preclude spoofing of the network, where the first condition comprises determining whether or not a root domain identifier is available from the network, and in response to determining that the root domain identifier is available from the network, then selecting the first name as the name, and in response to determining that the root domain identifier is not available from the network, then selecting the second name as the name, and where the second condition comprises determining whether or not the first computing device is authenticated to the second computing device, and in response to determining that the first device is authenticated to the second device, then selecting the single identifier as the identifier, and in response to determining that the first device is not authenticated to the second device, then further determining whether or not the first computing device was previously authenticated to the second computing device, and in response to determining that the first computing device was previously authenticated to the second computing device, then selecting the combination of identifiers as the identifier, and in response to determining that the first computing device was not previously authenticated to the second computing device, then selecting the single identifier as the identifier.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×