SECURE AND EFFICIENT METHODS FOR LOGGING AND SYNCHRONIZING DATA EXCHANGES
First Claim
Patent Images
1. A method comprising:
- receiving a request from a requester to post data to a first log;
identifying the log based on a context identifier in the request indicative of a location of the first log and digital data associated with a document corresponding to the first log;
creating a first entry based on the data in the request;
appending the first log with the first entry;
calculating a first identifier based on log entries in the first log; and
sending the first identifier to the requester.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus is disclosed herein for logging and/or synchronizing data exchanges. In one embodiment, the method comprises receiving a request from a requester to post data to a first log, identifying the log based on a context identifier in the request indicative of a location of the first log and digital data associated with a document corresponding to the first log, creating a first entry based on data in the request, appending the first log with the first entry, calculating a first identifier based on log entries in the first log, and sending the first identifier to the requester.
58 Citations
28 Claims
-
1. A method comprising:
-
receiving a request from a requester to post data to a first log;
identifying the log based on a context identifier in the request indicative of a location of the first log and digital data associated with a document corresponding to the first log;
creating a first entry based on the data in the request;
appending the first log with the first entry;
calculating a first identifier based on log entries in the first log; and
sending the first identifier to the requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
sending a request for entries in a first context log that occur after a first checkpoint;
receiving the entries that are after the first checkpoint to satisfy the request; and
adding one or more of the entries to a second context log to synchronize the second context log and the first context log. - View Dependent Claims (22, 23, 24)
-
-
25. An article of manufacture having one or more computer readable storage media storing instructions thereon which, when executed by a system, cause the system to perform a method comprising:
-
sending a request for entries in a first context log that occur after a first checkpoint;
receiving the entries that are after the first checkpoint to satisfy the request; and
adding one or more of the entries to a second context log to synchronize the second context log and the first context log.
-
-
26. A method comprising:
-
calculating an intersection of attribute entries that appear in first and second logs that include first and second sequences, respectively, of content and attribute entries associated with each context punctuated by one or more checkpoints;
ordering entries according to their appearance in the first log;
determining whether each entry in the second log is in the intersection of attribute entries or is the next entry in the order; and
performing an additional comparison between the first and second logs starting only after checkpoints in each of the first and second logs subsequent to the first and second sets of sequences.
-
-
27. A method comprising:
-
storing a first entry in a log that includes an identifier, wherein the identifier comprise a list of hashes;
receiving a request to post an new entry into the log, wherein the entry includes a portion of data; and
calculating the hash of the portion of data received in the request;
comparing the hash to a list of one or more hashes in the identifier; and
accepting the post request if the hash appear in the list of hashes in the identifier. - View Dependent Claims (28)
-
Specification