Method for protecting history in a file system

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C707S793000, C707S793000

Reexamination Certificate

active

11240829

ABSTRACT:
A method for protecting history in a file system in which rules governing which versions of files must be retained, and for how long, are enforced by one or more storage systems attached to a network, the method comprising associating with a storage system a time standard configured to prevent the accuracy of the time standard from being manipulated over the network, storing file information in the storage system, with files stored as objects adapted for separate retrieval in any order, storing, in the storage system, directory information which is sufficient to allow files to be retrieved starting from file system pathnames, marking at least some versions of files as archival file versions not subject to further change, and assigning an expiration time to each of at least some of the archival file versions, preventing storage system clients from deleting archival file versions before their expiration times, and allowing individual archival file versions that have passed their expiration times to be deleted and their storage space reused, with the decision to delete a particular archival file version being capable of being made separately and independently from the decision to delete other archival file versions.

REFERENCES:
patent: 4899299 (1990-02-01), MacPhail
patent: 5107419 (1992-04-01), MacPhail
patent: RE34954 (1995-05-01), Haber et al.
patent: 5625818 (1997-04-01), Zarmer et al.
patent: 5659626 (1997-08-01), Ort et al.
patent: 5689699 (1997-11-01), Howell et al.
patent: 5765152 (1998-06-01), Erickson
patent: 5778395 (1998-07-01), Whiting et al.
patent: 5787247 (1998-07-01), Norin et al.
patent: 5813009 (1998-09-01), Johnson et al.
patent: 5819295 (1998-10-01), Nakagawa et al.
patent: 5915025 (1999-06-01), Taguchi et al.
patent: 5978791 (1999-11-01), Farber et al.
patent: 6023706 (2000-02-01), Schmuck et al.
patent: 6125371 (2000-09-01), Bohannon et al.
patent: 6205533 (2001-03-01), Margolus
patent: 6209000 (2001-03-01), Klein et al.
patent: 6314435 (2001-11-01), Wollrath et al.
patent: 6529995 (2003-03-01), Shepherd
patent: 6535867 (2003-03-01), Waters
patent: 6584466 (2003-06-01), Serbinis et al.
patent: 6618735 (2003-09-01), Krishnaswami et al.
patent: 6618751 (2003-09-01), Challenger et al.
patent: 6801999 (2004-10-01), Venkatesan et al.
patent: 6928442 (2005-08-01), Farber et al.
patent: 6952737 (2005-10-01), Coates et al.
patent: 6971018 (2005-11-01), Witt et al.
patent: 7054867 (2006-05-01), Bosley et al.
patent: 7055008 (2006-05-01), Niles et al.
patent: 2002/0038296 (2002-03-01), Margolus et al.
patent: 2003/0004975 (2003-01-01), Nakano et al.
patent: 2003/0028761 (2003-02-01), Platt
patent: 2003/0105739 (2003-06-01), Essafi et al.
patent: 2003/0220929 (2003-11-01), Tolpin et al.
patent: 2006/0010150 (2006-01-01), Shaath et al.
patent: 0774715 (1997-05-01), None
patent: 99/09480 (1999-02-01), None
patent: 01/18633 (2001-03-01), None
patent: 01/61563 (2001-08-01), None
Santry, et al., Deciding when to forget in the elephant file system, Dec. 1999, ACM, pp. 110-123.
Chaum et al., “Utraceable Electronic Cash”, Advances in Cryptology CRYPTO '88, Springer-Verlag, pp. 319-327 (1998).
Feige et al., “Zero-Knowledge Proofs of Identity,” Journal of Cryptology 1:77-94 (1988).
Margolus, Crystalline Computation, Chapter 18 of Feynman and Computation (A. Hey, ed.), Perseus Books, pp. 267-305 (1999).
Muthitacharoen et al., “A Low-Bandwidth Network File System,” Symposium on Operating Systems Principles, pp. 174-187 (2001).
National Institute of Standards and Technology, Nist Fips Pub 180-1, “Secure Hash Standard”, U.S. Department of Commerce (Apr. 1995).
Nowicki, “NFS: Network File System Protocol Specification” Network Working Group RFC1094, Sun Microsystems, Inc. (Mar. 1989).
Preface from FWKCS(TM) Contents—Signature System, Version 2.05, Copypright Frederick W. Kantor (Apr. 26, 1996).
Rabin, “Efficient Dispersal of Information for Security,” Load Balancing, and Fault Tolerance, Journal of the ACM, vol. 36, No. 2, pp. 335-348 (Apr. 1989).
Rivest, “The MD4 Message Digest Algorithm,” Network Working Group RFC1186, MIT Laboratory for Computer Science (Oct. 1990).
Santry et al., “Deciding When to Forget in the Elephant File System,” Symposium on Operating System Principal, pp. 110-123 (1999).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for protecting history in a file system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for protecting history in a file system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for protecting history in a file system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3847797

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.