Connection arrangements for electrical devices

ABSTRACT

A method and system are disclosed for substituting an anonymous Universal Unique Identifier (UUID) for a computer system&#39;s real UUID in order to disguise an identity of the computer system to an application which is requesting a UUID for the client computer system. A storage device is established in the computer system. The storage device includes a primary and a second location. A UUID stored in the primary location is used as a UUID for the computer system. An anonymous UUID is generated. The anonymous UUID does not identify any particular computer system. The anonymous UUID is stored in the primary location within the storage device, and the real UUID is backed up by moving it into the secondary location. Thereafter, the anonymous UUID is provided in response to requests for the computer system&#39;s UUID.

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] The present invention is related to the subject matter ofco-pending patent application serial number ______ (Docket Number RPS92000 0057 US1) entitled “METHOD AND SYSTEM FOR DISGUISING A COMPUTERSYSTEM's IDENTITY ON A NETWORK BY DISGUISING THE SYSTEM'S MAC ADDRESS”,assigned to the assignee herein named, filed on ______, and incorporatedherein by reference.

BACKGROUND OF THE INVENTION

[0002] 1. Field of the Invention

[0003] The present invention relates in general to data processingsystems and, in particular, to a data processing system and method fordisguising a computer's identity. Still more particularly, the presentinvention relates to a data processing system and method for disguisinga computer's identity by utilizing an anonymous UUID instead of thecomputer system's real UUID.

[0004] 2. Description of the Related Art

[0005] Personal computer systems are well known in the art. They haveattained widespread use for providing computer power to many segments oftoday's modern society. Personal computers (PCs) may be defined as adesktop, floor standing, or portable microcomputer that includes asystem unit having a central processing unit (CPU) and associatedvolatile and non-volatile memory, including random access memory (RAM)and basic input/output system read only memory (BIOS ROM), a 5 systemmonitor, a keyboard, one or more flexible diskette drives, a CD-ROMdrive, a fixed disk storage drive (also known as a “hard drive”), apointing device such as a mouse, and an optional network interfaceadapter. One of the distinguishing characteristics of these systems isthe use 10 of a motherboard or system planar to electrically connectthese components together. Examples of such personal computer systemsare IBM's PC 300 series, Aptiva series, and Intellistation series.

[0006] A computer system requires a basic input/output system (BIOS) inorder to operate. The BIOS is code that controls cr basic hardwareoperations, such as interactions with disk drives, hard drives, and thekeyboard.

[0007] When a computer is reset, the computer system is initialized.When the initialization is complete, a boot process begins when POSTbegins executing. POST uses the initialization settings to configure thecomputer. BIOS then controls the basic operation of the hardwareutilizing the hardware as it was configured by POST. The boot process iscomplete upon the completion of the execution of the POST commands.

[0008] Each computer system includes a Universal Unique Identifier(UUID). The UUID is a 16-byte number which is unique for each computersystem. The UUID is a part of the computer system and is a standard wayto identifier particular computer systems. The UUID is programmed intothe computer system during the manufacture of the computer system. Thereare standard calls to allow application programs to access the UUID.

[0009] The Internet is revolutionizing the way many people live theirlives from shopping to seeking entertainment and information. However,there is a disadvantage to using the Internet. A user loses his/herprivacy when the UUID of each computer system accessing the Internet istracked. For example, a merchant could track which users are using themerchant's services by tracking the UUID of each computer system whichaccesses the merchant's Internet site.

[0010] Currently, in order for a user to remain anonymous when accessingentertainment and conducting transactions, the user must conduct thetransactions and access entertainment without using the Internet. Forexample, a user can pay for merchandise using cash. Reading a newspaperor watching broadcast television will not result in others learning whatarticles the user reads or program which the user watches.

[0011] Therefore a need exists for a data processing system and methodfor disguising an identity of a computer system.

SUMMARY OF THE INVENTION

[0012] A method and system are disclosed for substituting an anonymousUniversal Unique Identifier (UUID) for a computer system's real UUID inorder to disguise an identity of the computer system to an applicationwhich is requesting a UUID for the client computer system. A storagedevice is established in the computer system. The storage deviceincludes primary and second locations. A UUID stored in the primarylocation is used as a UUID for the computer system. An anonymous UUID isgenerated. The anonymous UUID does not identify any particular computersystem. The anonymous UUID is stored in the primary location within thestorage device, and the real UUID is backed up by moving it into thesecondary location. Thereafter, the anonymous UUID is provided inresponse to requests for the computer system's UUID.

[0013] The above as well as additional objectives, features, andadvantages of the present invention will become apparent in thefollowing detailed written description.

BRIEF DESCRIPTION OF THE DRAWINGS

[0014] The novel features are set forth in the appended claims. Thepresent invention itself, however, as well as a preferred mode of use,further objectives, and advantages thereof, will best be understood byreference to the following detailed description of a preferredembodiment when read in conjunction with the accompanying drawings,wherein:

[0015]FIG. 1 illustrates a pictorial representation of a data processingsystem including a plurality of client computer systems coupled to aserver computer system utilizing a network and a hub in accordance withthe method and system of the present invention;

[0016]FIG. 2 depicts a more detailed pictorial representation of eithera client or server computer system in accordance with the method andsystem of the present invention;

[0017]FIG. 3 illustrates a high level flow chart which depicts storing areal UUID in a primary location in a storage device in accordance withthe method and system of the present invention;

[0018]FIG. 4 depicts a high level flow chart which illustrates movingthe real UUID and anonymous UUID between primary and secondary locationsaccording to the current setting of a cloaking bit in accordance withthe method and system of the present invention; and

[0019]FIG. 5 illustrates a high level flow chart which depicts acomputer system reporting a UUID to a requesting application inaccordance with the method and system of the present invention.

DESCRIPTION OF A PREFERRED EMBODIMENT

[0020] A preferred embodiment of the present invention and itsadvantages are better understood by referring to FIGS. 1-5 of thedrawings, like numerals being used for like and corresponding parts ofthe accompanying drawings.

[0021] The present invention is a method and system for substituting ananonymous UUID for a computer system's real UUID address in order todisguise the identity of the computer system. The computer systemincludes a storage device having a primary location and a secondarylocation. The primary location is used for storing a UUID. When thecomputer system receives a request for its UUID, it will report thevalue currently stored in the primary location. The secondary locationis used when the identity of the computer is to be disguised. When theidentity of the computer is to be disguised, the real UUID currentlystored in the primary location is moved from the primary location intothe secondary location. An anonymous UUID is then stored in the primarylocation. Thereafter, when the computer provides its UUID, it willprovide the anonymous UUID.

[0022] When the client is to again represent its true identity, the realUUID which is now stored in the secondary location is copied from thesecondary location back into the primary location. The client system isthen reset.

[0023] In order to determine whether to disguise a computer system'sreal UUID, a cloaking bit is used which is included in the CMOS. Whenthe cloaking bit is set, the UUID stored in the primary location iscopied to the secondary location so that an UUID can be subsequentlystored in the primary storage device. When the cloaking bit is cleared,the address stored in the secondary location is restored to the primarylocation so that the real UUID can be used.

[0024]FIG. 1 illustrates a pictorial representation of a networkincluding a plurality of client computer systems 104 coupled to a servercomputer system 100 utilizing a hub 102 in accordance with the methodand system of the present invention. Server computer system 100 isconnected to a hub 102 utilizing a local area network (LAN) connectorbus 106. Respective client computer systems 104 also connect to hub 102through respective LAN busses 106. The preferred form of the networkconforms to the Ethernet specification and uses such hubs and busses. Itwill be appreciated, however, that other forms of networks may beutilized to implement the invention.

[0025]FIG. 2 depicts a more detailed pictorial representation of eithera client or a server computer system in accordance with the method andsystem of the present invention. Client computer system 104 includes aplanar 201 (also commonly called a motherboard or system board) which ismounted within client 104 and provides a means for mounting andelectrically interconnecting various components of client 104 includinga central processing unit (CPU) 200, system memory 206, and accessorycards or boards as is well known in the art.

[0026] CPU 200 is connected by address, control, and data busses 202 toa memory controller and peripheral component interconnect (PCI) busbridge 204 which is coupled to system memory 206. An integrated driveelectronics (IDE) device controller 220, and a PCI bus to IndustryStandard Architecture (ISA) bus bridge 212 are connected to PCI busbridge 204 utilizing PCI bus 208. IDE controller 220 provides for theattachment of IDE compatible storage devices, such a removable hard diskdrive 222. PCI/ISA bridge 212 provides an interface between PCI bus 208and an optional feature or expansion bus such as the ISA bus 214.PCI/ISA bridge 212 includes power management logic. PCI/ISA bridge 212is supplied power from battery 244 to prevent loss of configuration datastored in CMOS 213.

[0027] A cloak bit 215 is included within CMOS 213. Cloak bit 215 isutilized to determine whether the real MAC address should be disguised.When cloak bit 215 is set, the real MAC address assigned to MAC 232 bythe IEEE will be disguised. When cloak bit 215 is cleared, the real MACaddress assigned to MAC 216 will be transmitted.

[0028] A PCI standard expansion bus with connector slots 210 is coupledto PCI bridge 204. PCI connector slots 210 may receive PCI buscompatible peripheral cards. An ISA standard expansion bus withconnector slots 216 is connected to PCI/ISA bridge 212. ISA connectorslots 216 may receive ISA compatible adapter cards (not shown). It willbe appreciated that other expansion bus types may be used to permitexpansion of the system with added devices. It should also beappreciated that two expansion busses are not required to implement thepresent invention.

[0029] An I/O controller 218 is coupled to PCI-ISA bridge controller212. I/O controller 218 controls communication between PCI-ISA bridgecontroller 212 and devices and peripherals such as floppy drive 224,keyboard 226, and mouse 228 so that these devices may communicate withCPU 200.

[0030] PCI-ISA bridge controller 212 includes an interface for a flashmemory 242 which includes an interface for address, data, flash chipselect, and read/write. Flash memory 242 is an electrically erasableprogrammable read only memory (EEPROM) module and includes BIOS that isused to interface between the I/O devices and operating system.

[0031] Client computer system 104 includes a video controller 246 whichmay, for example, be plugged into one of PCI expansion slots 210. Videocontroller 246 is connected to video memory 248. The image in videomemory 248 is read by controller 246 and displayed on a monitor (notshown) which is connected to computer system 104 through connector 250.

[0032] Computer system 104 includes a power supply 240 which suppliesfull normal system power 243, and has an auxiliary power main AUX 5 241which supplies full time power to the power management logic 212 and tonetwork adapter 230.

[0033] In accordance with the present invention, a storage device 217 iscoupled to PCI-ISA bridge 212 utilizing a system management (SM) bus238. Preferably, storage device 217 is implemented utilizing anelectronically erasable storage device, such as an EEPROM. At the timecomputer system 104 is manufactured, the real UUID which identifies thiscomputer system is stored in primary location 219 of storage device 217.System management bus 238 is a two-wire, low speed, serial bus used tointerconnect management and monitoring devices. Those skilled in the artwill recognize that storage device 217 may be coupled to another buswithin planar 201.

[0034] The current setting of the cloak bit 215 is detected during POST.When cloak bit 215 is set, the UUID stored in primary location 219 ismoved into secondary location 221. An anonymous UUID is then created,such as by scrambling the real UUID, zeroing-out the UUID, or storing anew UUID.

[0035] Thereafter, when the UUID is requested, the anonymous UUID willbe reported. The anonymous UUID is reported until the cloak bit iscleared. When the cloak bit is detected during POST as being clearedafter just previously being set, the real UUID currently stored insecondary location 221 will be moved back into primary location 219.Thereafter, when the UUID is requested, the real UUID will be reported.The real UUID is reported until the cloak bit is again set.

[0036] Client 104 also includes a network adapter 230. Network adapter230 includes a physical layer 234 and a media access controller (MAC)232 coupled together utilizing a Media Independent Interface (MII) bus252. The MII bus 252 is a specification of signals and protocols whichdefine the interfacing of a 10/100 Mbps Ethernet Media Access Controller(MAC) 232 to the underlying physical layer 234.

[0037] Network adapter 230 may be plugged into one of the PCI connectorslots 210 (as illustrated) or one of the ISA connector slots 216 inorder to permit client 104 to communicate with server 100 utilizing acommunication link 106. MAC 232 processes digital network signals, andserves as an interface between a shared data path, i.e. the MII bus 252,and the PCI bus 208. MAC 232 performs a number of functions in thetransmission and reception of data packets. For example, during thetransmission of data, MAC 232 assembles the data to be transmitted intoa packet with the address of MAC 232, and error detection fields.Conversely, during the reception of a packet, MAC 232 disassembles thepacket and performs address checking and error detection. In addition,MAC 232 typically performs encoding/decoding of digital signalstransmitted over the shared path and performs preamblegeneration/removal, as well as bit transmission/reception. In apreferred embodiment, MAC 232 is an Intel 82557 chip. However, thoseskilled in the art will recognize that the functional blocks depicted innetwork adapter 230 may be manufactured utilizing a single piece ofsilicon.

[0038] Physical layer 234 conditions analog signals to go out to thenetwork via an R45 connector 236. Physical layer 234 may be a fullyintegrated device supporting 10 and 100 Mbps CSMA/CD Ethernetapplications. Physical layer 234 receives parallel data from the MIIlocal bus 252 and converts it to serial data for transmission throughconnector 236. Physical layer 234 is also responsible for wave shapingand provides analog voltages. In a preferred embodiment, physical layer234 is implemented utilizing an Integrated Services chip ICS-1890.

[0039] Physical layer 234 includes auto-negotiation logic that servesthree primary purposes. First, it determines the capabilities of client104. Second, it advertises its own capabilities to server 100. And,third, it establishes a connection with server 100 using the highestperformance connection technology.

[0040]FIG. 3 illustrates a high level flow chart which depicts storing areal UUID in a primary location in a storage device in accordance withthe method and system of the present invention. The process starts asdepicted by block 300 and thereafter passes to block 302 whichillustrates establishing a storage device 217 within a computer system.The storage device is preferably a vital product data (VPD) EEPROM. Thestorage device includes a primary location 219 and a secondary location221. Next, block 304 depicts the real UUID assigned to this particularcomputer system being stored in primary location 219 at the time thecomputer system is manufactured. Thereafter, whenever the UUID for thiscomputer system is requested, the computer system will report whatevervalue is currently stored in primary location 219 as being the real UUIDfor the computer system. The process then terminates as illustrated byblock 306.

[0041]FIG. 4 depicts a high level flow chart which illustrates movingthe real UUID and anonymous UUID between primary and second locationsaccording to the current setting of a cloaking bit in accordance withthe method and system of the present invention. The process starts asdepicted at block 400 and thereafter passes to block 402 whichillustrates starting the execution of POST. Next, block 404 depicts adetermination of whether or not a user has entered SETUP. If adetermination is made that the user has not entered SETUP, the processpasses to block 406 which illustrates completing the boot process toboot the computer system and the continuation of normal processing.

[0042] Referring again to block 404, if a determination is made that theuser has entered SETUP, the process passes to block 408 which depicts adetermination and displaying of a current cloaking status for thecomputer system using cloak bit 215. Next, block 410 illustrates adetermination of whether to enable or disable cloaking. If adetermination is made to enable cloaking, the process passes to block412 which depicts setting cloak bit 215. The process then passes toblock 414 which illustrates moving the real UUID currently stored inprimary location 219 storage device 217 to secondary location 221 instorage device 217. Thereafter, block 416 depicts generating ananonymous UUID. The anonymous UUID may be generated using one of severaldifferent methods. For example, the time stamp in the UUID could bereplaced with the current time, thus creating a UUID which is differentfrom the real UUID. In another method, the real UUID could be replacedwith a random number. Next, block 418 illustrates saving the anonymousUUID in secondary storage 221. The process then passes to block 420which depicts saving SETUP. Block 422, then, depicts resetting andrebooting the computer system.

[0043] Referring again to block 410, if a determination is made todisable cloaking, the process passes to block 424 which illustratesclearing cloak bit 215. Thereafter, block 426 illustrates moving thereal UUID from secondary location 221 to primary location 219. Theprocess then passes to block 420.

[0044]FIG. 5 illustrates a high level flow chart which depicts acomputer system reporting a UUID to a requesting application inaccordance with the method and system of the present invention. Theprocess starts as depicted by block 500 and thereafter passes to block502 which illustrates the computer system executing an operating system(OS). An application program also being executed by the computer systemrequests the computer system's UUID. Next, block 504 depicts theapplication program handing the request off to the operating system.Thereafter, block 506 illustrates the operating system sending therequest to a BIOS system services routine. Block 508, then, depicts theBIOS system services routine reading a UUID currently stored in primarylocation 219 of storage device 217 and providing that UUID as the UUIDof the computer system. If the cloaking bit is set, the UUID read fromprimary location 219 will be the anonymous UUID. If the cloaking bit iscleared, the UUID read from primary location 219 will be the real UUIDwhich correctly identifies this particular computer system. The processthen terminates as depicted by block 510.

[0045] While a preferred embodiment has been particularly shown anddescribed, it will be understood by those skilled in the art thatvarious changes in form and detail may be made therein without departingfrom the spirit and scope of the present invention.

What is claimed is:
 1. A method for substituting an anonymous UniversalUnique Identifier (UUID) for a computer system's real UUID in order todisguise an identity of said computer system to an applicationrequesting a UUID for said client computer system, said methodcomprising the steps of: establishing a storage device in said computersystem including a primary location, wherein a UUID stored in saidprimary location is used as a UUID for said computer system; generatingsaid anonymous UUID, wherein said anonymous UUID does not identify anyparticular computer system; storing said anonymous UUID in said primarylocation within said storage device; and providing said anonymous UUIDin response to a request for said computer system's UUID.
 2. The methodaccording to claim 1, further comprising the steps of: said storagedevice including a secondary location for saving said real UUID whilesaid anonymous UUID is being utilized as said computer system's UUID;and in response to said storage of said anonymous UUID in said primarylocation, moving said real UUID from said primary location to saidsecondary location, wherein said real UUID is not located in saidprimary location after said move.
 3. The method according to claim 1,further comprising the steps of: establishing a cloak bit for specifyingwhether to disguise said computer system's identity; said computersystem starting execution of said boot process; determining whether saidcloak bit is set during said execution of said boot process; and inresponse to a determination that said cloak bit is set, moving said realUUID stored in said primary location to a secondary location in saidstorage device and storing said anonymous UUID in said primary location,wherein said identity of said computer system is disguised by utilizingsaid anonymous UUID as said client computer system's UUID.
 4. The methodaccording to claim 3, further comprising the step of in response to adetermination that said cloak bit is cleared, moving said real UUID fromsaid storage location to said primary location, wherein a true identityof said computer system is represented by utilizing said real UUID assaid computer system's UUID.
 5. The method according to claim 1, furthercomprising the steps of: an application program requesting said computersystem's UUID; and said computer system providing a UUID stored in saidprimary location to said application program in response to saidrequest.
 6. The method according to claim 5, further comprising thesteps of: establishing a cloak bit for specifying whether to disguisesaid computer system's identity; said computer system providing saidreal UUID which is stored in said primary location to said applicationprogram in response to said request when said cloak bit is cleared; andsaid computer system providing said anonymous UUID which is stored insaid primary location to said application program in response to saidrequest when said cloak bit is set.
 7. The method according to claim 6,further comprising the steps of: determining whether said cloak bit isset or cleared; in response to a determination that said cloak bit isset, moving said real UUID from said primary location to a secondarylocation and moving said anonymous UUID from said secondary location tosaid primary location, wherein a true identity of said computer systemis disguised by utilizing said anonymous UUID as said computer system'sUUID; and in response to a determination that said cloak bit is cleared,moving said real UUID from said secondary location to said primarylocation and moving said anonymous UUID from said primary location tosaid secondary location, wherein a true identity of said computer systemis represented by utilizing said real UUID as said computer system'sUUID.
 8. A system for substituting an anonymous Universal UniqueIdentifier (UUID) for a computer system's real UUID in order to disguisean identity of said computer system to an application requesting a UUIDfor said client computer system, said computer system including a CPU,comprising: a storage device in said computer system including a primarylocation, wherein a UUID stored in said primary location is used as aUUID for said computer system; said system for generating said anonymousUUID, wherein said anonymous UUID does not identify any particularcomputer system; said anonymous UUID being stored in said primarylocation within said storage device; and said system for providing saidanonymous UUID in response to a request for said computer system's UUID.9. The system according to claim 8, further comprising: said storagedevice for including a secondary location for saving said real UUIDwhile said anonymous UUID is being utilized as said computer system'sUUID; and in response to said storage of said anonymous UUID in saidprimary location, said system for moving said real UUID from saidprimary location to said secondary location, wherein said real UUID isnot located in said primary location after said move.
 10. The systemaccording to claim 8, further comprising: a cloak bit for specifyingwhether to disguise said computer system's identity; said computersystem for starting execution of said boot process; means fordetermining whether said cloak bit is set during said execution of saidboot process; and in response to a determination that said cloak bit isset, said system for moving said real UUID stored in said primarylocation to a secondary location in said storage device and storing saidanonymous UUID in said primary location, wherein said identity of saidcomputer system is disguised by utilizing said anonymous UUID as saidclient computer system's UUID.
 11. The system according to claim 10,further comprising in response to a determination that said cloak bit iscleared, said system for moving said real UUID from said storagelocation to said primary location, wherein a true identity of saidcomputer system is represented by utilizing said real UUID as saidcomputer system's UUID.
 12. The system according to claim 8, furthercomprising: an application program for requesting said computer system'sUUID; and said computer system for providing a UUID stored in saidprimary location to said application program in response to saidrequest.
 13. The system according to claim 12, further comprising: acloak bit for specifying whether to disguise said computer system'sidentity; said computer system for providing said real UUID which isstored in said primary location to said application program in responseto said request when said cloak bit is cleared; and said computer systemfor providing said anonymous UUID which is stored in said primarylocation to said application program in response to said request whensaid cloak bit is set.
 14. The system according to claim 13, furthercomprising: means for determining whether said cloak bit is set orcleared; in response to a determination that said cloak bit is set, saidsystem for moving said real UUID from said primary location to asecondary location and moving said anonymous UUID from said secondarylocation to said primary location, wherein a true identity of saidcomputer system is disguised by utilizing said anonymous UUID as saidcomputer system's UUID; and in response to a determination that saidcloak bit is cleared, said system for moving said real UUID from saidsecondary location to said primary location and moving said anonymousUUID from said primary location to said secondary location, wherein atrue identity of said computer system is represented by utilizing saidreal UUID as said computer system's UUID.