Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2008-07-08
2008-07-08
Moise, Emmanuel L. (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C713S190000, C705S002000, C705S051000, C711S108000, C711S216000, C369S027010, C369S030010, C369S030030, C369S030040
Reexamination Certificate
active
07398391
ABSTRACT:
Techniques for managing the storing of a digital asset by a first computer in a computer system that further comprises a second computer. The first computer receives a communication from the second computer including the digital asset, determines whether the digital asset has been stored by the first computer, and when it has not, stores a copy of the digital asset. The digital asset is identified by a first identifier based, at least in part, on its content. In one embodiment, the first identifier is the only identifier that can be used to identify the digital asset in communication between the first and second computers. In another embodiment, the computer system further stores a unit of data comprising the first identifier and metadata relating to the digital asset.
REFERENCES:
patent: 5202982 (1993-04-01), Gramlick et al.
patent: 5404508 (1995-04-01), Konrad et al.
patent: 5491817 (1996-02-01), Gopal et al.
patent: 5581764 (1996-12-01), Fitzgerald et al.
patent: 5600834 (1997-02-01), Howard
patent: 5694596 (1997-12-01), Campbell
patent: 5701316 (1997-12-01), Alferness et al.
patent: 5710922 (1998-01-01), Alley et al.
patent: 5742807 (1998-04-01), Masinter
patent: 5757915 (1998-05-01), Aucsmith et al.
patent: 5907619 (1999-05-01), Davis
patent: 5978791 (1999-11-01), Farber et al.
patent: 5991414 (1999-11-01), Garay et al.
patent: 2294132 (1996-04-01), None
patent: 96/32685 (1996-10-01), None
patent: 97/43717 (1997-11-01), None
patent: 99/38093 (1999-07-01), None
Moore et al., “Why LIFNs?”, Aug. 31, 1995, www.netlib.org.
Prusker et al., “The Siphon: Managing Distant Replicated Repositories” Nov. 8-9, 1990, Proceedings on the Management of Replicated Data IEEE.
Fowler et al., “A User-Level Replicated File System”, Jun. 21-25, 1993, Usenix Summer 1993 Technical Conference, Conference Proceedings.
Greene et al., “Multi-Index Hashing for Information Retrieval”, Nov. 20-22, 1994, Proceedings, 35thAnnual Symposium on Foundations of Computer Science, IEEE.
Bosselaers et al., “The RIPEMD-160 Cryptographic Hash Function”, Jan. 1997, Dr. Dobb's Journal.
Kenneth Rich and Scott Leadley, “Hobgoblin: A File and Directory Auditor”, Sep. 30-Oct. 3, 1991, Lisa V., San Diego, CA.
Hirano et al., “Improved Extendible Hashing with High Concurrency”, 1995, Systems and Computers in Japan, vol. 26, No. 13.
Andrew Gore, “File Wave Agents Cross Atlantic”, Mar. 29, 1993, MACWEEK.
Robert Hess, “FileRunner Gets in Sync with Mac”, May 3, 1993, MACWEEK.
Schneier, Bruce, Applied Cryptograph 2ndEdition. John Wiley and Sons Pub., Oct. 1995, pp. 30-31.
Carpentier Paul R.
Teugels Tom
Van Riel Jan F.
Callahan Paul
EMC Corporation
Moise Emmanuel L.
Wolf Greenfield & Sacks P.C.
LandOfFree
Content addressable information encapsulation,... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Content addressable information encapsulation,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Content addressable information encapsulation,... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2743854