System for implementing a small computer systems interface protocol over a content centric network
First Claim
1. A computer system, comprising:
- a processor; and
a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising;
receiving, by a target device from an initiating device, a first interest which includes a name and information associated with a first protocol data unit that indicates a first command, of a small computer system interface protocol, to be executed by the target device to pull data from storage attached to the target device based on a first name, wherein the name includes a name prefix of the target device;
extracting the information to obtain the first command;
generating a first content object with a payload that includes data received in response to executing the first command, thereby facilitating use of the small computer system interface protocol over a content centric network;
generating a second interest with the first name and that indicates a request for the data and, in response to the second interest, receiving a second content object with the data; and
in response to receiving a third interest that includes an identifier of the initiating device and indicates an authentication challenge, authenticating the initiating device to the target device based on the identifier, wherein the authenticating includes generating an acknowledgement indicating results of the authenticating.
3 Assignments
0 Petitions
Accused Products
Abstract
One embodiment provides a system that facilitates schematized access control in a content centric network. During operation, the system generates, by a content producing device, a secret key for a user based on a schema, wherein the schema is a regular expression which corresponds to one or more names and allows a user access to content associated with the names, wherein a name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. The system receives an interest with a name that corresponds to the schema. The system encrypts a payload of a responsive content object based on the interest name. The system transmits the responsive content object with the encrypted payload to the user, which allows the user to decrypt the encrypted payload with the secret key.
-
Citations
20 Claims
-
1. A computer system, comprising:
-
a processor; and a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising; receiving, by a target device from an initiating device, a first interest which includes a name and information associated with a first protocol data unit that indicates a first command, of a small computer system interface protocol, to be executed by the target device to pull data from storage attached to the target device based on a first name, wherein the name includes a name prefix of the target device; extracting the information to obtain the first command; generating a first content object with a payload that includes data received in response to executing the first command, thereby facilitating use of the small computer system interface protocol over a content centric network; generating a second interest with the first name and that indicates a request for the data and, in response to the second interest, receiving a second content object with the data; and in response to receiving a third interest that includes an identifier of the initiating device and indicates an authentication challenge, authenticating the initiating device to the target device based on the identifier, wherein the authenticating includes generating an acknowledgement indicating results of the authenticating. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system, comprising:
-
a processor; and a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising; generating, by an initiating device, a first interest which includes a name and information associated with a first protocol data unit that indicates a first command, of a small computer system interface protocol, to be executed by a target device to pull data from storage attached to the target device based on a first name, wherein the name includes a name prefix of the target device; in response to the first interest, receiving a first content object with a payload that includes data received in response to the target device executing the first command, thereby facilitating use of the small computer system interface protocol over a content centric network; receiving a second interest with the first name and that indicates a request for the data and, in response to the second interest, generating a second content object with the data; and in response to generating a third interest that includes an identifier of the initiating device and indicates an authentication challenge, authenticating the initiating device to the target device based on the identifier, wherein the authenticating includes receiving an acknowledgement indicating results of the authenticating. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
at a target device including a processor and a storage device, performing; receiving from an initiating device a first interest which includes a name and information associated with a first protocol data unit that indicates a first command, of a small computer system interface protocol, to be executed by the target device to pull data from storage attached to the target device based on a first name, wherein the name includes a name prefix of the target device; extracting the information to obtain the first command; generating a first content object with a payload that includes data received in response to executing the first command, thereby facilitating use of the small computer system interface protocol over a content centric network; generating a second interest with the first name and that indicates a request for the data and, in response to the second interest, receiving a second content object with the data; and in response to receiving a third interest that includes an identifier of the initiating device and indicates an authentication challenge, authenticating the initiating device to the target device based on the identifier, wherein the authenticating includes generating an acknowledgement indicating results of the authenticating. - View Dependent Claims (20)
-
Specification