Accessing Data In A Content-Addressable Data Processing System
First Claim
1. A method of managing information in a content-addressable computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method comprising:
- (A) creating a first identifier for a data item, at least in part, by hashing the content of the data item;
(B) sending a request including the first identifier from the first computer to the at least two second computers to access the data item, wherein at least one of the at least two second computers uses the first identifier to access the data item; and
(C) verifying that the content of the data item has not changed since the creation of the first identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of managing information in a content-addressable computer system comprising a plurality of computers including at least a first computer and at least two second computers. The method includes creating a first identifier for a data item, at least in part, by hashing the content of the data item; sending a request including the first identifier from the first computer to the at least two second computers to access the data item, wherein at least one of the at least two second computers uses the first identifier to access the data item; and verifying that the content of the data item has not changed since the creation of the first identifier. 2. The method may include using the first identifier to locate a storage location for the data item on the computer system. The first identifier may be based on the entire content of the data item
-
Citations
111 Claims
-
1. A method of managing information in a content-addressable computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method comprising:
-
(A) creating a first identifier for a data item, at least in part, by hashing the content of the data item; (B) sending a request including the first identifier from the first computer to the at least two second computers to access the data item, wherein at least one of the at least two second computers uses the first identifier to access the data item; and (C) verifying that the content of the data item has not changed since the creation of the first identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. At least one non-transitory computer readable medium encoded with instructions that, when executed on a computer system, perform a method of managing information, wherein the computer system comprises content addressable computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method comprising acts of:
-
(A) creating a first identifier for a data item, at least in part, by hashing the content of the data item; (B) sending a request including the first identifier from the first computer to the at least two second computers to access the data item, wherein at least one of the at least two second computers uses the first identifier to access the data item; and (C) verifying that the content of the data item has not changed since the creation of the first identifier. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
-
-
76. A content addressable computer system for managing information, comprising:
-
a first computer; at least two second computers; and at least one controller comprising hardware and software, in combination with said hardware, that; creates a first identifier for a data item, at least in part, by hashing the content of the data item; sends to the at least two second computers a request including the first identifier to access the data item, wherein at least one of the at least two second-computers uses the first identifier to access the data item; and verifies that the content of the data item has not changed since the creation of the first identifier. - View Dependent Claims (77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111)
-
Specification