Data repository and method for promoting network storage of data
First Claim
1. A method by which multiple clients browse content on a network such as the Internet, the method comprising:
- each of the multiple clients accessing content data items stored at network storage locations on the network via one or more proxy servers;
determining the digital fingerprint of a content data item passing through the proxy server as the content data item passes from the network storage location to one of the multiple clients;
providing a proxy repository different from the network storage locations and connected to the proxy server for storing the content data item at a location associated with the digital fingerprint;
testing for whether a content data item is already stored in the proxy repository by comparing the digital fingerprint of the content data item to the digital fingerprints of content data items already in storage in the proxy repository;
storing the content data item in the proxy repository if comparing establishes that a data item identical to the content data item is not already stored in the proxy repository, and not storing the content data item in the proxy repository if comparing establishes that a data item identical to the content data item is already stored in the proxy repository;
associating a content data item already stored in the proxy repository with an access authorization credential uniquely associated with an access owner,wherein the proxy repository saves at least some content browsed by the clients after that content has been altered or removed from the network storage locations in order to preserve that content.
4 Assignments
0 Petitions
Accused Products
Abstract
In general, the invention features methods by which more than one client program connected to a network stores the same data item on a storage device of a data repository connected to the network. In one aspect, the method comprises encrypting the data item using a key derived from the content of the data item, determining a digital fingerprint of the data item, and storing the data item on the storage device at a location or locations associated with the digital fingerprint. In a second aspect, the method comprises determining a digital fingerprint of the data item, testing for whether the data item is already stored in the repository by comparing the digital fingerprint of the data item to the digital fingerprints of data items already in storage in the repository, and challenging a client that is attempting to deposit a data item already stored in the repository, to ascertain that the client has the full data item.
-
Citations
3 Claims
-
1. A method by which multiple clients browse content on a network such as the Internet, the method comprising:
-
each of the multiple clients accessing content data items stored at network storage locations on the network via one or more proxy servers; determining the digital fingerprint of a content data item passing through the proxy server as the content data item passes from the network storage location to one of the multiple clients; providing a proxy repository different from the network storage locations and connected to the proxy server for storing the content data item at a location associated with the digital fingerprint; testing for whether a content data item is already stored in the proxy repository by comparing the digital fingerprint of the content data item to the digital fingerprints of content data items already in storage in the proxy repository; storing the content data item in the proxy repository if comparing establishes that a data item identical to the content data item is not already stored in the proxy repository, and not storing the content data item in the proxy repository if comparing establishes that a data item identical to the content data item is already stored in the proxy repository; associating a content data item already stored in the proxy repository with an access authorization credential uniquely associated with an access owner, wherein the proxy repository saves at least some content browsed by the clients after that content has been altered or removed from the network storage locations in order to preserve that content. - View Dependent Claims (2, 3)
-
Specification