Additional hash functions in content-based addressing
First Claim
1. A method of retrieving a desired computer file from a database, said method comprising:
- obtaining a unique identifier for said desired computer file, said unique identifier used to identify a unique location in said database;
retrieving a stored file from said database using said unique identifier as a reference;
retrieving a unique identifier-verification hash value pair from a data structure associated with said database by using said unique identifier, wherein said retrieved verification hash value has been previously derived from said stored file using a verification hash function, said retrieved verification hash value being different from said unique identifier;
computing a verification hash value for said stored file using said verification hash function;
comparing said computed verification hash value to said retrieved verification hash value; and
determining that said stored file is said desired file when said computed verification hash value matches said retrieved verification hash value, said computed verification hash value being used to verify the contents of said stored file, whereby said desired file is retrieved from said database.
5 Assignments
0 Petitions
Accused Products
Abstract
A hash function used for content addressing is different from the hash function used for content verification. Adding a file to a database involves storing both hash function values in a table as pair. Verifying the integrity of a file believed to be a duplicate in a database, or when retrieving a file, makes use of the verification hash function. Files can be continuously checked. A multi-level database can be used. A second hash function can be added to an existing system. A verification hash function can be upgraded and more than one content verification hash function can be used. In a variation, a random number generator is used instead of a hash function for content addressing; the verification hash function is also used. Files addressed using a random number are added or retrieved from a database and their verification hash values are checked. Time stamps and digital signatures are used for security.
-
Citations
7 Claims
-
1. A method of retrieving a desired computer file from a database, said method comprising:
-
obtaining a unique identifier for said desired computer file, said unique identifier used to identify a unique location in said database; retrieving a stored file from said database using said unique identifier as a reference; retrieving a unique identifier-verification hash value pair from a data structure associated with said database by using said unique identifier, wherein said retrieved verification hash value has been previously derived from said stored file using a verification hash function, said retrieved verification hash value being different from said unique identifier; computing a verification hash value for said stored file using said verification hash function; comparing said computed verification hash value to said retrieved verification hash value; and determining that said stored file is said desired file when said computed verification hash value matches said retrieved verification hash value, said computed verification hash value being used to verify the contents of said stored file, whereby said desired file is retrieved from said database. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification