Data processing: database and file management or data structures – File or database maintenance – Database recovery
Reexamination Certificate
2006-09-22
2011-12-20
Hicks, Michael (Department: 2165)
Data processing: database and file management or data structures
File or database maintenance
Database recovery
Reexamination Certificate
active
08082231
ABSTRACT:
Described are techniques for representing a data segment comprising. A list of one or more tokens representing one or more data portions included in the data segment is received. A unique identifier uniquely identifying said data segment from other data segments is received. A signature value determined in accordance with said list of tokens and said unique identifier is received. The list of tokens, said unique identifier, and said signature value are stored as information corresponding to said data segment.
REFERENCES:
patent: 5737594 (1998-04-01), Williams
patent: 6134597 (2000-10-01), Rieth et al.
patent: 6704730 (2004-03-01), Moulton et al.
patent: 6810398 (2004-10-01), Moulton
patent: 7685171 (2010-03-01), Beaverson et al.
Apvrille et al., “A Time Stamped Virtual WORM System”, In: Workshop SECI02 Securite de la Communication sur Internet, pp. 93-104, Sep. 2002.
Redundancy Elimination Within Large Collections of Files, Purushottam Kulkarni, et al., Proceedings of the 2004 USENIX Annual Technical Conference, Boston, MA, Jun. 2004 (pp. 1-14).
Efficient Algorithms for Sorting and Synchronization, Andrew Tridgell, Doctoral Thesis, The Australian National University, Feb. 1999 (115 pages).
Venti: A New Approach to Archival Storage, Sean Quinlan, et al.
Semantically-Smart Disk Systems, Muthian Sivathanu, et al., 2nd USENIX Conference on File and Storage Technologies, Mar. 31-Apr. 2, 2003.
A Two-Tiered Software Architecture for Automated Tuning of Disk Layouts, Brandon Salmon, et al. , Apr. 2003, (12 pp.).
A Low Bandwidth Network File System, Athicha Muthitacharoen, et al., TR CS-96-08.
Using Content-Derived Names for Caching and Software Distribution, Ethan L. Miller, et al., TR CS-96-08.
Snap-Mirror®: File System Based Asynchronous Mirroring for Disaster Recovery, Hugo Patterson, et al., Proceedings of the FAST 2002 Conference on File and Storage Technologies, Monterey, California, USA, Jan. 28-30, 2002 (14 pp.).
Matching Application Access Patterns to Storage Device Characteristics, Jiri Schindler, May 2004, Doctoral Thesis, Dept. of Electrical and Computer Engineering, Carnegie Mellon University, May 2004 CMU-PDL-03-109 (194 pages).
Maintenance-Free Global Data Storage, Sean Rhea, et al., IEEE Internet Computing, Sep.-Oct. 2001, (pp. 40-49).
Collision Search Attackson SHAI, Xiaoyun Wang, et al., Feb. 13, 2005.
The Ubiquitous B-Tree, Douglas Corner, Computing Surveys, Jun. 1979.
The Ubiquitous B-Tree, Marcel Adam.
“Veritas NetBackup PureDisk: Overview—Symantic Corp.”, http://www.symantec.com/enterprise/products/overview.jsp?pcid=1018&pvid=1381—1 Jul. 11, 2007.
Leach, et al., “Standards Track”, RFC 4122, A UUID URN Namespace, (pp. 1-40) Jul. 2005.
Beaverson Arthur
McDaniel Matthew R.
EMC Corporation
Hicks Michael
Muirhead and Saturnelli LLC
LandOfFree
Techniques using identifiers and signatures with data... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Techniques using identifiers and signatures with data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques using identifiers and signatures with data... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4264894