Method and system for disguising a computer system's...

Electrical computers and digital processing systems: multicomput – Computer-to-computer data addressing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S203000, C709S221000, C713S002000, C713S100000

Reexamination Certificate

active

06832262

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates in general to data processing systems and, in particular, to a data processing system and method for disguising a computer's identity on a network. Still more particularly, the present invention relates to a data processing system and method for disguising a computer's identity on a network by utilizing an anonymous media access controller address instead of the real media access controller address.
2. Description of the Related Art
Personal computer systems are well known in the art. They have attained widespread use for providing computer power to many segments of today's modern society. Personal computers (PCs) may be defined as a desktop, floor standing, or portable microcomputer that includes a system unit having a central processing unit (CPU) and associated volatile and non-volatile memory, including random access memory (RAM) and basic input/output system read only memory (BIOS ROM), a system monitor, a keyboard, one or more flexible diskette drives, a CD-ROM drive, a fixed disk storage drive (also known as a “hard drive”), a pointing device such as a mouse, and an optional network interface adapter. One of the distinguishing characteristics of these systems is the use of a motherboard or system planar to electrically connect these components together. Examples of such personal computer systems are IBM's PC 300 series, Aptiva series, and Intellistation series.
A computer system requires a basic input/output system (BIOS) in order to operate. The BIOS is code that controls basic hardware operations, such as interactions with disk drives, hard drives, and the keyboard.
When a computer is reset, prior to a boot process being executed, the hardware components of the computer system are initialized. When the initialization is complete, a boot process begins when POST begins executing. POST uses the initialization settings to configure the computer. BIOS then controls the basic operation of the hardware utilizing the hardware as it was configured by POST. The boot process is complete upon the completion of the execution of the POST commands.
A network adapter card which conforms to the Ethernet specification will include a media access controller (MAC). The IEEE provides a unique MAC address for each adapter card which is manufactured. This address is an address which is unique to that card.
When a computer system accesses a network by transmitting network packets, the MAC address of the network adapter used to transmit a packet is included in the packet. It becomes very easy to track the use of the network by tracking the MAC address included in each packet.
The Internet communication protocol relies on an Internet Protocol (IP) address of the client computer system to transmit information to/from the client. The IP address can be either static across sessions or dynamic and changing with each new session. The MAC address, however, is unique for each network adapter. So, even though the client may receive a different IP address with each session, the MAC address included along with the IP address in each network packet will always be the same MAC address.
Server computer systems use the MAC address to identify a particular client computer system. Servers also associate a MAC address with either a static or dynamic IP address. Once this association between a MAC address and an IP address is made, whether statically or dynamically assigned, the MAC address is no longer required. The MAC address, however, remains available to the network. Therefore, the MAC address is always available by determining which MAC address was associated with a particular IP address.
The Internet is revolutionizing the way many people live their lives from shopping to seeking entertainment and information. However, there is a disadvantage to using the Internet. A user loses his/her privacy when the network packets are tracked. For example, a merchant could track which users are using the merchant's services by tracking the MAC address included in the packets transmitted to the merchant.
Currently, in order for a user to remain anonymous when accessing entertainment and conducting transactions, the user must conduct the transactions and access entertainment without using the Internet. For example, a user can pay for merchandise using cash. Reading a newspaper or watching broadcast television will not result in others learning what articles the user reads or program which the user watches.
Therefore a need exists for a data processing system and method for disguising an identity of a client computer system when the client is utilizing a network.
SUMMARY OF THE INVENTION
A method and system are disclosed for substituting an anonymous media access controller (MAC) address for a client computer system's real MAC address in order to disguise an identity of the client computer system when the client computer system is utilizing a network. The client computer system is coupled to a server computer system via the network. A primary storage device is established for storing a MAC address. A MAC address which is stored in the primary storage device is utilized as a network address for the client computer system when the client computer system is utilizing the network. An anonymous MAC address is generated. The anonymous MAC address is not associated with any particular client computer system. The anonymous MAC address is then stored in the primary storage device. The client computer system utilizes the anonymous MAC address as the network address for the client computer system when the client computer system is utilizing the network.
The above as well as additional objectives, features, and advantages of the present invention will become apparent in the following detailed written description.


REFERENCES:
patent: 5919257 (1999-07-01), Trostle
patent: 5974547 (1999-10-01), Klimenko
patent: 6101608 (2000-08-01), Schmidt et al.
patent: 6343330 (2002-01-01), Khanna et al.
patent: 6609151 (2003-08-01), Khanna et al.
patent: 6631137 (2003-10-01), Lorrain et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for disguising a computer system's... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for disguising a computer system's..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for disguising a computer system's... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3307106

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.