Content addressable information encapsulation, representation, and transfer
First Claim
1. A method for use in a computer system comprising at least a first computer and a second computer, the method comprising an act of:
- (A) verifying the integrity of at least one digital asset that comprises content and is identified in the computer system by an original unique identifier that was generated by applying a function to the content of the at least one digital asset, wherein an identifier generated by applying a function to the content of the at least one digital asset is the only type of identifier that can be used in communications between the first and second computers to identify the at least one digital asset, the act of verifying comprising;
re-applying the function to the digital asset to generate a new identifier; and
comparing the new identifier to the original unique identifier.
9 Assignments
0 Petitions
Accused Products
Abstract
Representing a number of assets on an originating computer begins with selecting the assets to be represented. Cryptographic hash asset identifiers are generated; each of the asset identifiers is computed using the contents of a particular asset. The asset identifier is a content-based or content-addressable asset name for the asset and is location independent. An asset list is generated that includes the asset identifiers computed from the assets. A cryptographic hash asset list identifier is generated that is computed from the asset list. The asset list identifier is stored for later retrieval. The assets selected are also stored for safekeeping either locally or on a computer network. In the event of loss of the files from the originating computer, the asset list identifier is retrieved. Using the asset list identifier, the original asset list is found and retrieved from its safe location. The asset identifiers from the retrieved asset list are used to find and retrieve the individual assets from their backup locations. The assets are verified by recomputing the cryptographic hash asset identifier for each asset retrieved and comparing it to the asset identifier from the asset list. The MD5 algorithm is used for the cryptographic hash function. Assets are retrieved using a multicast protocol. A series of importer programs searches for assets to retrieve in progressively more remote locations. Assets are retrieved whole or in segments.
28 Citations
69 Claims
-
1. A method for use in a computer system comprising at least a first computer and a second computer, the method comprising an act of:
(A) verifying the integrity of at least one digital asset that comprises content and is identified in the computer system by an original unique identifier that was generated by applying a function to the content of the at least one digital asset, wherein an identifier generated by applying a function to the content of the at least one digital asset is the only type of identifier that can be used in communications between the first and second computers to identify the at least one digital asset, the act of verifying comprising; re-applying the function to the digital asset to generate a new identifier; and comparing the new identifier to the original unique identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
25. At least one computer for use in a computer system, the at least one computer comprising:
at least one processor programmed to verify the integrity of at least one digital asset that comprises content and is identified in the computer system by an original unique identifier that was generated by applying a function to the content of the at least one digital asset, wherein an identifier generated by applying a function to the content of the at least one digital asset is the only type of identifier that can be used in communications between the first and second computers to identify the at least one digital asset, the at least one processor being programmed to verify the integrity of the at least one digital asset by; re-applying the function to the digital asset to generate a new identifier; and comparing the new identifier to the original unique identifier. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
48. A method for use in a computer system comprising at least a first computer and a second computer, the method comprising an act of:
(A) verifying the integrity of at least one digital asset that comprises content and is identified in the computer system by an original unique first identifier that was generated by applying a function to the content of the at least one digital asset, the computer system further storing a unit of data that comprises the first identifier and metadata relating to the at least one digital asset, the unit of data being identified via a second identifier generated based, at least in part, on the content of the unit of data, the act of verifying comprising; re-applying the function to the at least one digital asset to generate a new first identifier; and comparing the new first identifier to the original unique first identifier. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
Specification