Controlling access to data in a data processing system
First Claim
1. A method, in a system which includes a network of computers, the method comprising:
- (a) obtaining a name for a data item, the name being included in a request for the data item, and the name being based at least in part on the data which comprise the contents of the data item; and
(b) determining, based at least in part on said name, whether or not access to the data item is authorized.
3 Assignments
0 Petitions
Accused Products
Abstract
Access to and delivery of licensed content is controlled using content names that were determined based on the content. A name for a data item is obtained, the name having been determined based at least in part on the data which comprise the contents of the data item. Access to the data item is authorized based at least in part on the name. Once authorized, access may be granted from more than one computer. The name may have been determined using a hash or message digest function such as MD4, MD5 or SHA. The data item may comprise a file, a portion of a file, a page in memory, a digital message, a digital image, a video signal or an audio signal.
126 Citations
25 Claims
-
1. A method, in a system which includes a network of computers, the method comprising:
-
(a) obtaining a name for a data item, the name being included in a request for the data item, and the name being based at least in part on the data which comprise the contents of the data item; and
(b) determining, based at least in part on said name, whether or not access to the data item is authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
controlling distribution of licensed content from a first computer to a requesting computer, by in response to a request for the content from said requesting computer, the request including at least a name of the data file, the name having been determined using at least a function of the data comprising the data item, permitting the content to be provided to the requesting computer if the content is authorized or licensed.
-
21. A method comprising:
-
(a) obtaining a list of names, one for each of a plurality of data items, wherein, for each of the data items, the corresponding name for that data item was determined as a function of the contents of the data item;
(b) receiving, from a requestor, an identifier for a requested data item, said identifier having been determined based at least in part on the contents of the requested data item;
(c) determining, based at least in part on said identifier for said requested data item, and using said list of names, whether the requestor may access the requested data item; and
(d) based on said determining, if it is determined that requestor may not access the requested data item, denying access to the requested data item. - View Dependent Claims (22, 23)
-
-
24. A method comprising:
-
(a) receiving at a first computer, from a requesting computer, a request for a data file, said request including a name for the data file, the name having been determined using at least a function of the data in the data file, wherein the data used by the function to determine the name comprises the contents of the data file; and
(b) in response to said request;
(i) causing the name of the data file to be compared to a plurality of values;
(ii) determining if access to the data file is authorized or unauthorized based on whether the name matches at least one of said plurality of values, and (iii) based on said determining in step (i), not allowing the data file to be delivered to the requesting computer if it is determined that access to the data file is not authorized. - View Dependent Claims (25)
-
Specification