Techniques using identifiers and signatures with data...

Data processing: database and file management or data structures – File or database maintenance – Database recovery

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

08082231

ABSTRACT:
Described are techniques for representing a data segment comprising. A list of one or more tokens representing one or more data portions included in the data segment is received. A unique identifier uniquely identifying said data segment from other data segments is received. A signature value determined in accordance with said list of tokens and said unique identifier is received. The list of tokens, said unique identifier, and said signature value are stored as information corresponding to said data segment.

REFERENCES:
patent: 5737594 (1998-04-01), Williams
patent: 6134597 (2000-10-01), Rieth et al.
patent: 6704730 (2004-03-01), Moulton et al.
patent: 6810398 (2004-10-01), Moulton
patent: 7685171 (2010-03-01), Beaverson et al.
Apvrille et al., “A Time Stamped Virtual WORM System”, In: Workshop SECI02 Securite de la Communication sur Internet, pp. 93-104, Sep. 2002.
Redundancy Elimination Within Large Collections of Files, Purushottam Kulkarni, et al., Proceedings of the 2004 USENIX Annual Technical Conference, Boston, MA, Jun. 2004 (pp. 1-14).
Efficient Algorithms for Sorting and Synchronization, Andrew Tridgell, Doctoral Thesis, The Australian National University, Feb. 1999 (115 pages).
Venti: A New Approach to Archival Storage, Sean Quinlan, et al.
Semantically-Smart Disk Systems, Muthian Sivathanu, et al., 2nd USENIX Conference on File and Storage Technologies, Mar. 31-Apr. 2, 2003.
A Two-Tiered Software Architecture for Automated Tuning of Disk Layouts, Brandon Salmon, et al. , Apr. 2003, (12 pp.).
A Low Bandwidth Network File System, Athicha Muthitacharoen, et al., TR CS-96-08.
Using Content-Derived Names for Caching and Software Distribution, Ethan L. Miller, et al., TR CS-96-08.
Snap-Mirror®: File System Based Asynchronous Mirroring for Disaster Recovery, Hugo Patterson, et al., Proceedings of the FAST 2002 Conference on File and Storage Technologies, Monterey, California, USA, Jan. 28-30, 2002 (14 pp.).
Matching Application Access Patterns to Storage Device Characteristics, Jiri Schindler, May 2004, Doctoral Thesis, Dept. of Electrical and Computer Engineering, Carnegie Mellon University, May 2004 CMU-PDL-03-109 (194 pages).
Maintenance-Free Global Data Storage, Sean Rhea, et al., IEEE Internet Computing, Sep.-Oct. 2001, (pp. 40-49).
Collision Search Attackson SHAI, Xiaoyun Wang, et al., Feb. 13, 2005.
The Ubiquitous B-Tree, Douglas Corner, Computing Surveys, Jun. 1979.
The Ubiquitous B-Tree, Marcel Adam.
“Veritas NetBackup PureDisk: Overview—Symantic Corp.”, http://www.symantec.com/enterprise/products/overview.jsp?pcid=1018&pvid=1381—1 Jul. 11, 2007.
Leach, et al., “Standards Track”, RFC 4122, A UUID URN Namespace, (pp. 1-40) Jul. 2005.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Techniques using identifiers and signatures with data... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Techniques using identifiers and signatures with data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques using identifiers and signatures with data... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4264894

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.