VERIFICATION OF FRAGMENTED INFORMATION CENTRIC NETWORK CHUNKS
First Claim
Patent Images
1. A method of verifying data from a producer, the method comprising:
- segmenting a data file into multiple chunks of data using a processor of the producer;
dividing, using the processor, each of the multiple chunks into virtual fragments based on a maximum transmission unit size;
calculating, using the processor, hash values using the virtual fragments;
creating, using the processor, a manifest using the hash values; and
providing, using the processor, the manifest to a consumer based on a received interest for comparison and integrity verification of virtual fragments.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus, and systems are provided for lightweight integrity verification of fragmented chunks in an information centric network. One aspect provides a method of securely providing data. A data file is segmented into multiple chunks of data, and each of the multiple chunks is divided into virtual fragments based on a maximum transmission unit size. Hash values are calculated using the virtual fragments, and a manifest is created using the hash values. In various embodiments, the manifest is provided to a consumer based on a received interest for comparison and integrity verification of virtual fragments.
-
Citations
20 Claims
-
1. A method of verifying data from a producer, the method comprising:
-
segmenting a data file into multiple chunks of data using a processor of the producer; dividing, using the processor, each of the multiple chunks into virtual fragments based on a maximum transmission unit size; calculating, using the processor, hash values using the virtual fragments; creating, using the processor, a manifest using the hash values; and providing, using the processor, the manifest to a consumer based on a received interest for comparison and integrity verification of virtual fragments. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method implemented by an information centric network router, the method comprising:
-
receiving an interest for a data file segment from a consumer using a processor of the information centric network router; sending, using the processor, the interest to a content producer; receiving, using the processor, a fragment of the data file segment from the producer in response to the interest, along with a fragment header; dividing, using the processor, the fragment into a virtual fragment based on a maximum transmission unit size; comparing, using the processor, a hash value of the virtual fragment to the fragment header to verify the integrity of the virtual fragment; and storing, using a storage device coupled to the processor, the virtual fragment if the integrity was verified. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A network enabled computer system, comprising:
-
a processor; and a storage device coupled to the processor, the storage device including instructions to cause the processor to execute operations comprising; segmenting a data file into multiple chunks of data; dividing each of the multiple chunks into virtual fragments based on a maximum transmission unit size; calculating hash values using the virtual fragments; creating a manifest using the hash values; and providing the manifest to a consumer based on a received interest for comparison and integrity verification of virtual fragments. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification