Content addressable information encapsulation,...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07930550

ABSTRACT:
Representing a number of assets on an originating computer begins with selecting the assets to be represented. Cryptographic hash asset identifiers are generated; each of the asset identifiers is computed using the contents of a particular asset. The asset identifier is a content-based or content-addressable asset name for the asset and is location independent. An asset list is generated that includes the asset identifiers computed from the assets. A cryptographic hash asset list identifier is generated that is computed from the asset list. The asset list identifier is stored for later retrieval. The assets selected are also stored for safekeeping either locally or on a computer network. In the event of loss of the files from the originating computer, the asset list identifier is retrieved. Using the asset list identifier, the original asset list is found and retrieved from its safe location. The asset identifiers from the retrieved asset list are used to find and retrieve the individual assets from their backup locations. The assets are verified by recomputing the cryptographic hash asset identifier for each asset retrieved and comparing it to the asset identifier from the asset list. The MD5 algorithm is used for the cryptographic hash function. Assets are retrieved using a multicast protocol. A series of importer programs searches for assets to retrieve in progressively more remote locations. Assets are retrieved whole or in segments.

REFERENCES:
patent: 5050212 (1991-09-01), Dyson
patent: 5202982 (1993-04-01), Gramlich et al.
patent: 5404508 (1995-04-01), Konrad et al.
patent: 5581764 (1996-12-01), Fitzgerald et al.
patent: 5600834 (1997-02-01), Howard
patent: 5649196 (1997-07-01), Woodhill et al.
patent: 5694596 (1997-12-01), Campbell
patent: 5701316 (1997-12-01), Alferness et al.
patent: 5710922 (1998-01-01), Alley et al.
patent: 5742807 (1998-04-01), Masinter
patent: 5757915 (1998-05-01), Aucsmith et al.
patent: 5884301 (1999-03-01), Takano
patent: 5907619 (1999-05-01), Davis
patent: 5973731 (1999-10-01), Schwab
patent: 5978791 (1999-11-01), Farber et al.
patent: 5991414 (1999-11-01), Garay et al.
patent: 6173311 (2001-01-01), Hassett et al.
patent: 6807632 (2004-10-01), Carpentier et al.
patent: 7398391 (2008-07-01), Carpentier et al.
patent: 7415731 (2008-08-01), Carpentier et al.
patent: 7475432 (2009-01-01), Carpentier et al.
patent: 7591022 (2009-09-01), Carpentier et al.
patent: 2005/0010792 (2005-01-01), Carpentier et al.
patent: 2006/0080307 (2006-04-01), Carpentier et al.
patent: 2008/0066191 (2008-03-01), Farber et al.
patent: 2318908 (2007-04-01), None
patent: 96/32685 (1996-10-01), None
patent: 97/43717 (1997-11-01), None
patent: 99/38093 (1999-07-01), None
patent: 1049988 (2002-09-01), None
patent: 2294132 (1996-04-01), None
patent: WO 9743717 (1997-11-01), None
patent: WO 99/38093 (1999-07-01), None
Moore et al., “Why LIFNs?”, Aug. 31, 1995, www.netlib.org.
Prusker et al., “The Siphon: Managing Distant Replicated Repositories” Nov. 8-9, 1990, Proceedings on the Management of Replicated Data IEEE.
Fowler et al., “A User-Level Replicated File System”, Jun. 21-25, 1993, Usenix Summer 1993 Technical Conference, Conference Proceedings.
Greene et al., “Multi-Index Hashing for Information Retrieval”, Nov. 20-22, 1994, Proceedings, 35thAnnual Symposium on Foundations of Computer Science, IEEE.
Bosselaers et al., “The RIPEMD-160 Cryptographic Hash Function”, Jan. 1997, Dr. Dobb's Journal.
Kenneth Rich and Scott Leadley, “Hobgoblin: A File and Directory Auditor”, Sep. 30-Oct. 3, 1991, Lisa V., San Diego, CA.
Hirano et al., “Improved Extendible Hashing with High Concurrency”, 1995, Systems and Computers in Japan, vol. 26, No. 13.
Andrew Gore, “File Wave Agents Cross Atlantic”, Mar. 29, 1993, MACWEEK.
Robert Hess, “FileRunner Gets in Sync with Mac”, May 3, 1993, MACWEEK.
Schneier, Bruce, Applied Cryptograph 2ndEdition. John Wiley and Sons Pub., Oct. 1995, pp. 30-31.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Content addressable information encapsulation,... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Content addressable information encapsulation,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Content addressable information encapsulation,... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2733271

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.