ACCESSING DATA IN A CONTENT-ADDRESSABLE DATA PROCESSING SYSTEM
First Claim
1. A computer-implemented method operable in a computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method comprising:
- (A) obtaining a first identifier from the first computer at the at least two second computers, said first identifier having been determined, at least in part, by applying a first function to the content of the data item, wherein the first function comprises a hash function; and
(B) at least one of the at least two second computers using the first identifier to ascertain a storage location for the data item on the computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method operable in a computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method includes: obtaining a first identifier from the first computer at the at least two second computers, said first identifier having been determined, at least in part, by applying a first function to the content of the data item, wherein the first function comprises a hash function; and at least one of the at least two second computers using the first identifier to ascertain a storage location for the data item on the computer system. At least one of the at least two second computers may use the first identifier to access the data item on the computer system. The method may include verifying that the content of the data item has not changed since creation of the first identifier.
-
Citations
37 Claims
-
1. A computer-implemented method operable in a computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method comprising:
-
(A) obtaining a first identifier from the first computer at the at least two second computers, said first identifier having been determined, at least in part, by applying a first function to the content of the data item, wherein the first function comprises a hash function; and (B) at least one of the at least two second computers using the first identifier to ascertain a storage location for the data item on the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer-implemented method operable in a computer system comprising a plurality of computers including at least a first computer and at least two second computers, the method comprising:
-
(A) obtaining a first identifier from the first computer at the at least two second computers, said first identifier having been determined, at least in part, by applying a first function to the entire content of the data item, said first function comprising a cryptographic hash function, said first identifier being part of a request from the first computer, wherein the first identifier is the only identifier the first computer uses to identify the data item in the request; (B) at least one of the at least two second computers using the first identifier to try locate a storage location for the data item on the computer system; (C) at least one of the at least two second computers using the first identifier to access the data item on the computer system; and (D) verifying that the content of the data item has not changed since creation of the first identifier.
-
-
37. A computer-implemented method operable in a computer system comprising a plurality of computers including at least a first computer and at least two second computers, wherein the at least one of the at least two second computers comprises a file system to manage data items stored by the at least one of the at least two second computers, wherein the first identifier is used as a name of a file in which the data item is stored by the at least one of the at least two second computers, the method comprising:
-
(A) obtaining a first identifier from the first computer at the at least two second computers, said first identifier having been determined, at least in part, by applying a first function to the entire content of the data item, said first function comprising a cryptographic hash function, said first identifier being part of a request from the first computer, wherein the first identifier is the only identifier the first computer uses to identify the data item in the request; (B) at least one of the at least two second computers using the first identifier to try locate a storage location for the data item on the computer system using the first identifier to index into the file system to locate the data item; and (C) at least one of the at least two second computers using the first identifier to access the data item on the computer system.
-
Specification