Transparent aware data transformation at file system level...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S162000, C713S150000

Reexamination Certificate

active

07877602

ABSTRACT:
A mechanism for enabling efficient encryption and integrity validation of network files. When a request to read a file stored in a local network file system is received, the local network file system examines cryptographic attributes associated with the file to determine if the file is encrypted or integrity-verified. If the cryptographic attributes indicate the file is encrypted, the local network file system omits the encryption of the file by the local network file system prior to passing the file to the remote network file system. If the cryptographic attributes indicate the file is integrity-verified, the local network file system omits the integrity-verification of the file by the local network file system prior to passing the file to the remote network file system. The local network file system then transmits the file to the remote network file system.

REFERENCES:
patent: 6128737 (2000-10-01), Jakubowski et al.
patent: 6199162 (2001-03-01), Luyster
patent: 6226742 (2001-05-01), Jakubowski et al.
patent: 6523022 (2003-02-01), Hobbs
patent: 6868495 (2005-03-01), Glover
patent: 6986043 (2006-01-01), Andrew et al.
patent: 7580919 (2009-08-01), Hannel et al.
A Next Generation CIFS Client; Steven French; Linux Technology Center; IBM Austin Connectathon 2002 Mar. 5, 2002.
Halcrow, M. 2005. eCryptfs: An enterprise-class cryptographic filesystem for Linux. In Proceedings of the Linux Symposium. vol. 1, 201-218; year 2005.
IBM Linux Technology Center Library, web page, as printed out in year 2010.
A cross-layer key management scheme in Ad hoc network ; , Zeng-Ping; , Hu-Ronglei; , Yang-Yatao; , Song-Jie; Signal Processing Systems (ICSPS), 2010 2nd International Conference on vol. 1 ; Publication Year: 2010 , pp. V1-132-V1-137.
Kubiatowicz et al., “OceanStore: An Architecture for Global-Scale Persistent Storage”, ACM 2000, ASPLOS 2000, Cambridge MA, Nov. 12-15, 2000, pp. 190-201.
Pang et al., “A High-level Programming Environment for Packet Trace Anonymization and Transformation”, ACM 2003, SIGCOMM'03, Aug. 25-29, 2003, Karlsruhe, Germany, pp. 339-351.
Hadzic et al., “Balancing Performance and Flexibility with Hardware Support for Network Architectures”, ACM Transactions on Computer Systems, vol. 21, Issue 4, Nov. 2003, pp. 375-411.
Blaze, “A Cryptographic File system for Unix”, ACM Conference on Communications and computing Security, Fairfax VA, Nov. 1993, pp. 1-8. http://www.crypto.com/papers/cfs.pdf.
Halcrow, “eCryptfs: A Stacked Cryptographic Filesystem*”, May 1, 2007, pp. 1-10, retrieved Dec. 16, 2008 http://ecryptfs.sourceforge.net/ecryptfs-article.pdf.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Transparent aware data transformation at file system level... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Transparent aware data transformation at file system level..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transparent aware data transformation at file system level... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2701805

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.