Access to content addressable data over a network
First Claim
1. A method of storing a digital asset in a data repository coupled to a network, said method comprising:
- receiving, at the data repository, a broadcast cryptographic hash descriptor file identifier that identifies the digital asset;
determining whether the broadcast cryptographic hash descriptor file identifier is a cryptographic hash descriptor file identifier known to the data repository;
when the broadcast cryptographic hash descriptor file is not known to the data repository, adding the broadcast cryptographic hash descriptor file identifier to a list of desired broadcast cryptographic hash descriptor file identifiers;
receiving, at the data repository, the digital asset identified by the broadcast cryptographic hash descriptor file identifier;
generating a second cryptographic hash descriptor file identifier from the received digital asset; and
verifying that the second cryptographic hash descriptor file identifier for the received digital asset matches the broadcast cryptographic hash descriptor file identifier, wherein adding the broadcast cryptographic hash descriptor file identifier to the list includes;
determining the number of times the broadcast cryptographic hash descriptor file identifier has been received at the data repository; and
determining whether to add the cryptographic hash descriptor file identifier to said list based upon said number of times.
9 Assignments
0 Petitions
Accused Products
Abstract
Access to content addressable data on a network is facilitated using digital information storing devices or data repositories (“silos”) that monitor broadcast data requests over the network. A number of silos automatically monitor both data requests and data itself that are broadcast over a network. The silos selectively store data. Each silo responds to data requests broadcast over the network with data the silo has previously intercepted. A content addressable file scheme is used to enable the data repositories to reliably identify data being requested. When a data request is received, each silo evaluates whether it has all or a portion of the data being requested and responds to requests when it has the data. Requests for data are implemented by broadcasting a cryptographic has data identifier of the data file needed. The data identifier is used by a silo to determine which data to receive and store.
-
Citations
6 Claims
-
1. A method of storing a digital asset in a data repository coupled to a network, said method comprising:
-
receiving, at the data repository, a broadcast cryptographic hash descriptor file identifier that identifies the digital asset; determining whether the broadcast cryptographic hash descriptor file identifier is a cryptographic hash descriptor file identifier known to the data repository; when the broadcast cryptographic hash descriptor file is not known to the data repository, adding the broadcast cryptographic hash descriptor file identifier to a list of desired broadcast cryptographic hash descriptor file identifiers; receiving, at the data repository, the digital asset identified by the broadcast cryptographic hash descriptor file identifier; generating a second cryptographic hash descriptor file identifier from the received digital asset; and verifying that the second cryptographic hash descriptor file identifier for the received digital asset matches the broadcast cryptographic hash descriptor file identifier, wherein adding the broadcast cryptographic hash descriptor file identifier to the list includes; determining the number of times the broadcast cryptographic hash descriptor file identifier has been received at the data repository; and determining whether to add the cryptographic hash descriptor file identifier to said list based upon said number of times.
-
-
2. A method of storing a digital asset in a data repository coupled to a network, said method comprising:
-
receiving, at the data repository, a broadcast cryptographic hash descriptor file identifier that identifies the digital asset; determining whether the broadcast cryptographic hash descriptor file identifier is a cryptographic hash descriptor file identifier known to the data repository; when the broadcast cryptographic hash descriptor file is not known to the data repository, adding the broadcast cryptographic hash descriptor file identifier to a list of desired broadcast cryptographic hash descriptor file identifiers; receiving, at the data repository, the digital asset identified by the broadcast cryptographic hash descriptor file identifier; generating a second cryptographic hash descriptor file identifier from the received digital asset; and verifying that the second cryptographic hash descriptor file identifier for the received digital asset matches the broadcast cryptographic hash descriptor file identifier, wherein receiving the digital asset identified by the transmitted cryptographic hash descriptor file identifier includes; receiving portions of said asset identified by the transmitted cryptographic hash descriptor file identifier at different times; and assembling the portions of the asset into the complete asset. - View Dependent Claims (3, 4)
-
-
5. A method of storing a digital asset in a data repository coupled to a network, said method comprising:
-
receiving, at the data repository, a broadcast cryptographic hash descriptor file identifier that identifies the digital asset; determining whether the broadcast cryptographic hash descriptor file identifier is a cryptographic hash descriptor file identifier known to the data repository; when the broadcast cryptographic hash descriptor file is not known to the data repository, adding the broadcast cryptographic hash descriptor file identifier to a list of desired broadcast cryptographic hash descriptor file identifiers; receiving, at the data repository, the digital asset identified by the broadcast cryptographic hash descriptor file identifier; generating a second cryptographic hash descriptor file identifier from the received digital asset; verifying that the second cryptographic hash descriptor file identifier for the received digital asset matches the broadcast cryptographic hash descriptor file identifier; and quarantining the asset while verifying that the generated cryptographic hash descriptor file identifier matches the broadcast cryptographic hash descriptor file identifier.
-
-
6. A method of storing a digital asset in a data repository coupled to a network, said method comprising:
-
receiving, at the data repository, a broadcast cryptographic hash descriptor file identifier that identifies the digital asset; determining whether the broadcast cryptographic hash descriptor file identifier is a cryptographic hash descriptor file identifier known to the data repository; when the broadcast cryptographic hash descriptor file is not known to the data repository, adding the broadcast cryptographic hash descriptor file identifier to a list of desired broadcast cryptographic hash descriptor file identifiers; receiving, at the data repository, the digital asset identified by the broadcast cryptographic hash descriptor file identifier; generating a second cryptographic hash descriptor file identifier from the received digital asset; verifying that the second cryptographic hash descriptor file identifier for the received digital asset matches the broadcast cryptographic hash descriptor file identifier; and responding to a request, received over the network from another device, for a digital asset stored in the data repository by broadcasting portions of the stored asset; and broadcasting the portions of the stored asset before the entire asset is received at the data repository.
-
Specification