Method for providing access control for data items in a data...

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C713S176000, C713S180000, C713S181000, C709S203000, C705S018000, C705S051000

Reexamination Certificate

active

07398283

ABSTRACT:
A method for providing naming and access control of data items in a data repository, the method comprising having a first client program deposit a data item in the data repository, the depositing including determining a digital fingerprint from the data item, and storing the data item in the data repository at a location or locations associated with the fingerprint, having the first client program specify an object name for an object that comprises a set of data items, storing in the repository an association between the name and the set of data items, and allowing the client program to retrieve a data item from the set of data items by specifying the object name and without providing the digital fingerprint of any data item or composite of data items.

REFERENCES:
patent: 4641274 (1987-02-01), Swank
patent: 4864616 (1989-09-01), Pond et al.
patent: RE34954 (1995-05-01), Haber et al.
patent: 5532920 (1996-07-01), Hartrick et al.
patent: 5579501 (1996-11-01), Lipton et al.
patent: 5594227 (1997-01-01), Deo
patent: 5765152 (1998-06-01), Erickson
patent: 5778395 (1998-07-01), Whiting et al.
patent: 5781901 (1998-07-01), Kuzma
patent: 5852666 (1998-12-01), Miller et al.
patent: 5914938 (1999-06-01), Brady et al.
patent: 5915025 (1999-06-01), Taguchi et al.
patent: 5931947 (1999-08-01), Burns et al.
patent: 5940507 (1999-08-01), Cane et al.
patent: 5978791 (1999-11-01), Farber et al.
patent: 5990810 (1999-11-01), Williams
patent: 6041411 (2000-03-01), Wyatt
patent: 6052688 (2000-04-01), Thorsen
patent: 6122631 (2000-09-01), Berbec et al.
patent: 6148342 (2000-11-01), Ho
patent: 6205533 (2001-03-01), Margolus
patent: 6272492 (2001-08-01), Kay
patent: 6308325 (2001-10-01), Dobbek
patent: 6374266 (2002-04-01), Shnelyar
patent: 6415280 (2002-07-01), Farber et al.
patent: 6415302 (2002-07-01), Garthwaite et al.
patent: 6430618 (2002-08-01), Karger et al.
patent: 6526418 (2003-02-01), Midgley et al.
patent: 6532542 (2003-03-01), Thomlinson et al.
patent: 6535867 (2003-03-01), Waters
patent: 6549992 (2003-04-01), Armangau et al.
patent: 6557102 (2003-04-01), Wong et al.
patent: 6584466 (2003-06-01), Serbinis et al.
patent: 6601172 (2003-07-01), Epstein
patent: 2003/0028761 (2003-02-01), Platt
patent: 2003/0140051 (2003-07-01), Fujiwara et al.
patent: 0774715 (1997-05-01), None
patent: 1 049 988 (2002-09-01), None
patent: 1 049 989 (2003-05-01), None
patent: 99/09480 (1999-02-01), None
patent: WO 01/18633 (2001-03-01), None
patent: WO 01/61563 (2001-08-01), None
Kaliski, “PKCS #1: RSA Encryption,” Mar. 1998, The Internet Society, Request for Comments 2313, pp. 1-19, http://www.ietf.org/rfc/rfc2313.txt.
Berners-Lee et al., “Universal Document Identifiers,” available at http://www.webhistory.org/www-talk.1992/0032.html (Mar. 11, 1992).
Bowman et al., “Harvest: A Scalable, Customizable Discovery and Access System,” Technical Report CU-CS-732-94, Dept. of Comp. Science, Univ. of Colorado (Aug. 1994).
Browne et al., “Location-Independent Naming for Virtual Distributed Software Repositories,” available at www.netlib.org/utk/papers/lefn/main.html (Nov. 11, 1994).
Crespo et al., “Archival Storage for Digital Libraries,” Procs. of the Third ACM Conf. on Digital Libraries, pp. 69-78 (ISBN: 0-89791-965-3) (1998).
Heckel, “A Technique for Isolating Differences Between Files,” Communications of the ACM, vol. 21, No. 4 (Apr. 1978).
Kantor, FWKCS™ Contents—Signature System, Version 1.18 (Sep. 11, 1992).
Rabin, “Fingerprinting by Random Polynomials,” Center for Research in Computing Technology, Harvard University, Technical Report TR-15-81 (1981).
Rivest, “The MD5 Message-Digest Algorithm,” Network Working Group, Request for Comments: 1321, MIT Lab. for Comp. Science and RSA Data Security , Inc. (Apr. 1992).
Sollins, “Functional Requirements for Uniform Resource Names,” Network Working Group, Request for Comments: 1737, MIT Lab. For Comp. Science (Dec. 1994).
Tridgell et al., The Rsync Algorithm, Jun. 18, 1996, Department of Computer Science Australian National University Canberra, pp. 1-6.
Williams, “An Introduction to Digest Algorithms,” available at ftp.rocksoft.com:/pub/rocksoft/., (Sep. 1994).
Chaum et al., “Utraceable Electronic Cash”, Advances in Cryptology CRYPTO '88, Springer-Verlag, pp. 319-327 (1998).
Feige et al., “Zero-Knowledge Proofs of Identity,” Journal of Cryptology 1:77-94 (1988).
Margolus, Crystalline Computation, Chapter 18 of Feynman and Computation (A. Hey, ed.), Perseus Books, pp. 267-305 (1999).
National Institute of Standards and Technology, NIST FIPS Pub 180-1, “Secure Hash Standard”, U.S. Department of Commerce (Apr. 1995).
Nowicki, “NFS: Network File System Protocol Specification” Network Working Group RFC1094, Sun Microsystems, Inc. (Mar. 1989).
Preface from FWKCS(TM) Contents—Signature System, Version 2.05, Copypright Frederick W. Kantor (Apr. 26, 1996).
Rabin, “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance,” Journal of the ACM, vol. 36, No. 2, pp. 335-348 (Apr. 1989).
Rivest, “The MD4 Message Digest Algorithm,” Network Working Group RFC1186, MIT Laboratory for Computer Science (Oct. 1990).
Karger et al., “Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web,” Laboratory for Computer Science and Department of Mathematics, MIT, Cambridge, MA.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for providing access control for data items in a data... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for providing access control for data items in a data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for providing access control for data items in a data... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2774880

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.