Managed peer-to-peer applications, systems and methods for distributed data access and storage
First Claim
1. A method for efficiently accessing data and controlling storage devices among multiple computers connected by a wide area network, said method comprising:
- upon receiving a request for access to data originally stored in a remote storage device, determining whether said data is already available and valid in a local storage device;
accessing said data from the local storage device if said data is available and valid;
authenticating a request for a secure connection between a local computer associated with said local storage device and a remote computer associated with said remote storage device;
securely connecting said local computer with said remote computer;
requesting said data from the remote storage device, over the wide area network, if said data is not available and valid;
receiving data over the wide area network from the remote storage device; and
storing said data in the local storage device for direct local access thereto.
14 Assignments
0 Petitions
Accused Products
Abstract
Applications, systems and methods for efficiently accessing data and controlling storage devices among multiple computers connected by a network. Upon receiving a request for access to data originally stored in a remote storage device, determining whether the data is already available and valid in a local storage device. Accessing the data from the local storage device if the data is available and valid. Authenticating a request for a secure connection between a local computer associated with the local storage device and a remote computer associated with the remote storage device. Securely connecting the local computer with the remote computer. Requesting the data from the remote storage device, over the network, if the data is not locally available and valid. Receiving data over the network from the remote storage device, and storing the data in the local storage device for direct local access thereto.
-
Citations
35 Claims
-
1. A method for efficiently accessing data and controlling storage devices among multiple computers connected by a wide area network, said method comprising:
-
upon receiving a request for access to data originally stored in a remote storage device, determining whether said data is already available and valid in a local storage device;
accessing said data from the local storage device if said data is available and valid;
authenticating a request for a secure connection between a local computer associated with said local storage device and a remote computer associated with said remote storage device;
securely connecting said local computer with said remote computer;
requesting said data from the remote storage device, over the wide area network, if said data is not available and valid;
receiving data over the wide area network from the remote storage device; and
storing said data in the local storage device for direct local access thereto. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A process for efficiently accessing and controlling data of devices over a wide area network, wherein at least first and second devices are securely connected to one another over the wide area network, at least one of said devices being connectable to the wide area network through a firewall element, said firewall element adapted to protect said device from hostile intrusion from the wide area network, said process comprising:
-
maintaining version numbers for various versions of a file data as it is modified;
calculating a Delta file characterizing the differences in data contained different versions as the file data is modified;
comparing said version numbers between a first version of said file data at a first location from which said file data is requested , and a second version of said file data at a second location from which said file data is to be sent to said first location; and
securely transmitting the differences in data between the first and second version, from the second location to the first location, across the wide area network, rather than the entire file data, to reduce bandwidth requirements for the transmission. - View Dependent Claims (34, 35)
-
Specification