Data processing: database and file management or data structures – Database and file access – Database access control methods
Reexamination Certificate
2011-07-26
2011-07-26
Alam, Hosain T (Department: 2166)
Data processing: database and file management or data structures
Database and file access
Database access control methods
C707S783000, C707S802000
Reexamination Certificate
active
07987197
ABSTRACT:
A method by which a disk-based distributed data storage system is organized for protecting historical records of stored data entities. The method comprises recording distinct states of an entity, corresponding to different moments of time, as separate entity versions coexisting within the distributed data storage system, and assigning expiration times to the entity versions independently within each of a plurality of storage sites according to a shared set of rules, before which times deletion is prohibited.
REFERENCES:
patent: 4899299 (1990-02-01), MacPhail
patent: 5107419 (1992-04-01), MacPhail
patent: RE34954 (1995-05-01), Haber et al.
patent: 5535322 (1996-07-01), Hecht
patent: 5625818 (1997-04-01), Zarmer et al.
patent: 5659626 (1997-08-01), Ort et al.
patent: 5689699 (1997-11-01), Howell et al.
patent: 5765152 (1998-06-01), Erickson
patent: 5778395 (1998-07-01), Whiting et al.
patent: 5781629 (1998-07-01), Haber et al.
patent: 5787247 (1998-07-01), Norin et al.
patent: 5813009 (1998-09-01), Johnson et al.
patent: 5819295 (1998-10-01), Nakagawa et al.
patent: 5864852 (1999-01-01), Luotonen
patent: 5915025 (1999-06-01), Taguchi et al.
patent: 5978791 (1999-11-01), Farber et al.
patent: 6023706 (2000-02-01), Schmuck et al.
patent: 6125371 (2000-09-01), Bohannon et al.
patent: 6182080 (2001-01-01), Clements
patent: 6205533 (2001-03-01), Margolus
patent: 6209000 (2001-03-01), Klein et al.
patent: 6314435 (2001-11-01), Wollrath et al.
patent: 6327656 (2001-12-01), Zabetian
patent: 6496850 (2002-12-01), Bowman-Amuah
patent: 6529995 (2003-03-01), Shepherd
patent: 6535867 (2003-03-01), Waters
patent: 6571282 (2003-05-01), Bowman-Amuah
patent: 6584466 (2003-06-01), Serbinis et al.
patent: 6601172 (2003-07-01), Epstein
patent: 6618735 (2003-09-01), Krishnaswami et al.
patent: 6618751 (2003-09-01), Challenger et al.
patent: 6681369 (2004-01-01), Meunier et al.
patent: 6697824 (2004-02-01), Bowman-Amuah
patent: 6801999 (2004-10-01), Venkatesan et al.
patent: 6928442 (2005-08-01), Farber et al.
patent: 6952737 (2005-10-01), Coates et al.
patent: 6971018 (2005-11-01), Witt et al.
patent: 7054867 (2006-05-01), Bosley et al.
patent: 7055008 (2006-05-01), Niles et al.
patent: 7062648 (2006-06-01), Moulton et al.
patent: 7363346 (2008-04-01), Groner et al.
patent: 7386439 (2008-06-01), Charnock et al.
patent: 7412462 (2008-08-01), Margolus et al.
patent: 2001/0047347 (2001-11-01), Perell et al.
patent: 2002/0038296 (2002-03-01), Margolus et al.
patent: 2002/0143798 (2002-10-01), Lisiecki et al.
patent: 2003/0004975 (2003-01-01), Nakano et al.
patent: 2003/0028761 (2003-02-01), Platt
patent: 2003/0105739 (2003-06-01), Essafi et al.
patent: 2003/0142847 (2003-07-01), Rhoads
patent: 2003/0167235 (2003-09-01), McKinley et al.
patent: 2003/0220929 (2003-11-01), Tolpin et al.
patent: 2004/0034650 (2004-02-01), Springer et al.
patent: 2005/0058318 (2005-03-01), Rhoads
patent: 2006/0010150 (2006-01-01), Shaath et al.
patent: 0774715 (1997-05-01), None
patent: 99/09480 (1999-02-01), None
patent: 01/18633 (2001-03-01), None
patent: 01/61563 (2001-08-01), None
Chaum et al., “Utraceable Electronic Cash”, Advances in Cryptology CRYPTO '88, Springer-Verlag, pp. 319-327 (1998).
Feige et al., “Zero-Knowledge Proofs of Identity,” Journal of Cryptology 1:77-94 (1988).
Margolus, Crystalline Computation, Chapter 18 of Feynman and Computation (A. Hey, ed.), Perseus Books, pp. 267-305 (1999).
National Institute of Standards and Technology, NIST FIPS Pub 180-1, “Secure Hash Standard”, U.S. Department of Commerce (Apr. 1995).
Nowicki, “NFS: Network File System Protocol Specification” Network Working Group RFC1094, Sun Microsystems, Inc. (Mar. 1989).
Preface from FWKCS(TM) Contents—Signature System, Version 2.05, Copypright Frederick W. Kantor (Apr. 26, 1996).
Rabin, “Efficient Dispersal of Information for Security,” Load Balancing, and Fault Tolerance, Journal of the ACM, vol. 36, No. 2, pp. 335-348 (Apr. 1989).
Rivest, “The MD4 Message Digest Algorithm,” Network Working Group RFC1186, MIT Laboratory for Computer Science (Oct. 1990).
Muthitacharoen et al., “A Low-Bandwidth Network File System,” Symposium on Operating Systems Principles, pp. 174-187 (2001).
Santry et al., “Deciding When to Forget in the Elephant File System,” Symposium on Operating System Principal, pp. 110-123 (1999).
Floyd Jered J.
Homsy, II George E.
Keller Jeffrey M.
Margolus Norman H.
Alam Hosain T
Fish & Richardson P.C.
Harper Eliyah S
Permabit Technology Corporation
LandOfFree
History preservation in a computer storage system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with History preservation in a computer storage system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and History preservation in a computer storage system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2741278