Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Domain Based Cloaking

IP.com Disclosure Number: IPCOM000011585D
Original Publication Date: 2003-Mar-06
Included in the Prior Art Database: 2003-Mar-06
Document File: 2 page(s) / 41K

Publishing Venue

IBM

Abstract

This disclosure provides a mechanism to allow PC to enable cloak UUID & MAC address for applications while allowing management applications to use UUID & MAC address for manageability. It creates domain based cloaking. The Universal Unique ID (UUID) is a 16 byte unique number for every PC built. Since the UUID is part of the system it has become a standard way to identify PCs. The MAC address is unique for each and every Ethernet/Token Ring network controller and is assigned by the IEEE. This provides a mechanism to simultaneously allow the UUID and MAC address to be in "Cloak" mode for external internet traffic while allowing "non-cloak" mode for internal management applications.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Domain Based Cloaking

  The world is rapidly becoming connected via the internet. This advance in technology is revolutionizing the way many people live their lives from shopping to seeking entertainment and information. However a major down side in the use of the internet is the potential for loss of privacy or anonymity. Today we have access to information and services but may remain anonymous. For example, people make purchases made with cash, read newspapers, and watch broadcast TV/cable. The internet allows the ability to do all of these functions from the PC, however it allows merchants or institutions to identify a PC and track each access on the web. Internet companies have began to track who is using their services and what their preferences are. This is highly useful information for the companies tracking this information, but it is also invading the privacy of the users of the service. This allows for everything from increased "target" marketing to making public an individuals embarrassing habits, behavior, or interests.

    The flack over Intel's processor ID illustrated the seriousness and perceived threat of this issue. Although the processor ID caught the headlines, there are additional mechanism to allow track of a PC's usage.

    Previous disclosures have provided the ability to "cloak" the MAC address and UUID. A side effect of this solution, was that it created problems for management applications (LCCM) that rely on the MAC address to identify and track the PC. This disclosures provides a mechanism to allow PC to enable cloak UUID & MAC address for applications while allowing management applications to use UUID & MAC address for manageability.

    This disclosure creates domain based cloaking. The Universal Unique ID (UUID) is a 16 byte unique number for every PC built. Since the UUID is part of the system it has become a standard way to identify PCs. The MAC address is unique for each and every Ethernet/Token Ring network controller and is assigned by the IEEE. This provides a mechanism to simultaneously allow the UUID and MAC address to be in "Cloak" mode for external internet traffic while allowing "non-cloak" mode for internal management applications. BIOS monitors the boot activity and determines when to invoke cloaking. T...