Efficient retrieval of cryptographic evidence
First Claim
Patent Images
1. A method for efficiently prefetching cryptographic evidence, the method comprising:
- identifying by at least one computer processor a next update time at which a first cryptographic evidence publication ceases to be valid;
identifying a next publish time at which a second cryptographic evidence publication becomes valid; and
selecting by the at least one computer processor a prefetch time that is a time between the next publish time and the next update time, wherein the prefetch time is selected as a function of a random number, wherein selecting the prefetch time comprises;
calculating a first time by adding a delta time period to the next publish time;
calculating a second time by subtracting the delta time period from the next update time;
selecting a third time within an adjusted time period between the first time and the second time by;
calculating a proxy identifier based on caching information;
selecting the random number;
calculating a first part that is a modulus of half of the adjusted time period and the proxy identifier;
calculating a second part that is a modulus of half of the adjusted time period and the random number; and
setting the third time to be the sum of the next publish time, the delta time, the first part, and the second part; and
setting the prefetch time to be the third time; and
prefetching the cryptographic evidence at the prefetch time.
2 Assignments
0 Petitions
Accused Products
Abstract
An efficient protocol for retrieving cryptographic evidence may be selected by evaluating a local policy and a number of relevant factors. Furthermore, updated cryptographic evidence may be prefetched during a time period in which there is a low volume of requests for cryptographic evidence. This low volume time period may be defined, approximately, as an overlapping window in which both a first cryptographic evidence publication and a second cryptographic evidence publication are valid.
11 Citations
3 Claims
-
1. A method for efficiently prefetching cryptographic evidence, the method comprising:
-
identifying by at least one computer processor a next update time at which a first cryptographic evidence publication ceases to be valid; identifying a next publish time at which a second cryptographic evidence publication becomes valid; and selecting by the at least one computer processor a prefetch time that is a time between the next publish time and the next update time, wherein the prefetch time is selected as a function of a random number, wherein selecting the prefetch time comprises; calculating a first time by adding a delta time period to the next publish time; calculating a second time by subtracting the delta time period from the next update time; selecting a third time within an adjusted time period between the first time and the second time by; calculating a proxy identifier based on caching information; selecting the random number; calculating a first part that is a modulus of half of the adjusted time period and the proxy identifier; calculating a second part that is a modulus of half of the adjusted time period and the random number; and setting the third time to be the sum of the next publish time, the delta time, the first part, and the second part; and setting the prefetch time to be the third time; and prefetching the cryptographic evidence at the prefetch time. - View Dependent Claims (2)
-
-
3. A computer storage medium, excluding carrier waves, having computer executable instructions that, when executed by a computer, cause the computer to perform acts comprising:
-
identifying by at least one computer processor a next update time at which a first cryptographic evidence publication ceases to be valid; identifying a next publish time at which a second cryptographic evidence publication becomes valid; and selecting by the at least one computer processor a prefetch time that is a time between the next publish time and the next update time, wherein the prefetch time is selected as a function of a random number, wherein selecting the prefetch time comprises; calculating a first time by adding a delta time period to the next publish time; calculating a second time by subtracting the delta time period from the next update time; selecting a third time within an adjusted time period between the first time and the second time by; calculating a proxy identifier based on caching information; selecting the random number; calculating a first part that is a modulus of half of the adjusted time period and the proxy identifier; calculating a second part that is a modulus of half of the adjusted time period and the random number; and setting the third time to be the sum of the next publish time, the delta time, the first part, and the second part; and setting the prefetch time to be the third time; and prefetching the cryptographic evidence at the prefetch time.
-
Specification