Hash-Based Access To Resources in a Data Processing Network
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource. If a large resource such as a BLOB or new version of a computer program can be obtained from another computer within a LAN, a reduction in reliance on bandwidth-sensitive Internet connections and reduced load on remote servers becomes possible.
157 Citations
47 Claims
-
1-32. -32. (canceled)
-
33. A method for accessing resources within a data processing network, comprising the steps of:
-
computing a hash value representing a resource stored at a server data processing system; and
embedding the hash value within a hyperlink, wherein the hyperlink points to a stored data entity associated with the resource, so that in providing the hyperlink responsive to a request for access to the data entity, the resource is identified in the hyperlink. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. A computer program product, stored on a tangible, computer readable medium, for accessing resources within a data processing network, said computer program product having instructions for execution by a computer, which, when executed by the computer, cause the computer to implement a method comprising the steps of:
-
computing a hash value representing a resource stored at a server data processing system; and
embedding the hash value within a hyperlink, wherein the hyperlink points to a stored data entity associated with the resource, so that in providing the hyperlink responsive to a request for access to the data entity, the resource is identified in the hyperlink. - View Dependent Claims (40, 41, 42, 43, 44)
-
-
45. A computer program product, stored on a tangible, computer readable medium, for accessing resources within a data processing network, said computer program product having instructions for execution by a computer, which, when executed by the computer, cause the computer to implement a method comprising the steps of:
-
receiving a data entity including a hyperlink wherein the hyperlink references a server computer and references a resource stored at the server computer, wherein the resource reference includes a hash value representing the resource;
in response to user selection of the hyperlink, sending a request for the resource, wherein the request includes the hash value to the referenced server computer. - View Dependent Claims (46, 47)
-
Specification