Content addressable information encapsulation, representation, and transfer
First Claim
1. A method for use in a computer system comprising at least first and second computers, wherein the first computer provides content addressable storage, the method comprising acts of:
- (A) receiving, at the first computer, a request from the second computer to access a first portion of a unit of data, the request identifying the unit of data via an identifier that is based, at least in part, on the content of the unit of data, wherein the identifier is the only identifier the second computer can use to identify the unit of data in the request to the first computer; and
(B) using the identifier to locate at least a second portion of the unit of data stored by the first computer.
9 Assignments
0 Petitions
Accused Products
Abstract
Representing a number of assets on an originating computer begins with selecting the assets to be represented. Cryptographic hash asset identifiers are generated; each of the asset identifiers is computed using the contents of a particular asset. The asset identifier is a content-based or content-addressable asset name for the asset and is location independent. An asset list is generated that includes the asset identifiers computed from the assets. A cryptographic hash asset list identifier is generated that is computed from the asset list. The asset list identifier is stored for later retrieval. The amen selected are also stored for safekeeping either locally or on a computer network. In the event of loss of the files from the originating computer, the asset list identifier is retrieved. Using the asset list identifier, the original asset list is found and retrieved from its safe location.
-
Citations
35 Claims
-
1. A method for use in a computer system comprising at least first and second computers, wherein the first computer provides content addressable storage, the method comprising acts of:
-
(A) receiving, at the first computer, a request from the second computer to access a first portion of a unit of data, the request identifying the unit of data via an identifier that is based, at least in part, on the content of the unit of data, wherein the identifier is the only identifier the second computer can use to identify the unit of data in the request to the first computer; and (B) using the identifier to locate at least a second portion of the unit of data stored by the first computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. At least one non-transitory computer readable medium encoded with instructions that, when executed on a computer system, perform a method, the computer system comprising at least first and second computers, wherein the first computer provides content addressable storage, the method comprising acts of:
-
(A) receiving, at the first computer, a request from the second computer to access a first portion of a unit of data, the request identifying the unit of data via an identifier that is based, at least in part, on the content of the unit of data, wherein the identifier is the only identifier the second computer can use to identify the unit of data in the request to the first computer; and (B) using the identifier to locate at least a second portion of the unit of data stored by the first computer. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A first computer for use in a computer system comprising at least the first computer and a second computer, wherein the first computer provides content addressable storage, the first computer comprising:
-
an input for receiving access requests; and at least one controller, coupled to the input, that; receives, via the input, a request from the second computer to access a first portion of a unit of data, the request identifying the unit of data via an identifier that is based, at least in part, on the content of the unit of data, wherein the identifier is the only identifier the second computer can use to identify the unit of data in the request to the first computer; and uses the identifier to locate at least a second portion of the unit of data stored by the first computer. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
Specification