Hash-based access to resources in a data processing network
First Claim
1. A method for accessing resources within a data processing network, comprising:
- computing a hash value representing a resource stored at a server data processing system;
embedding the hash value within an address portion of a hyperlink, thereby providing a hash-based resource reference, wherein the hyperlink points to the resource at least partly via the hash value, so that in providing the hyperlink responsive to a request for access to the resource, the resource is locatable via the hash-based resource reference in the hyperlink;
scanning the resource to identify hash-based resource references within hyperlinks of the resource; and
extracting the hash-based resource references from the hyperlinks to generate a modified resource which does not contain the extracted hashes, wherein the computing of a hash value representing a resource stored at a server data processing system includes;
applying a secure hash function to the modified resource to compute the hash value representing the resource, so that the computed hash value representing the resource is independent of the hash value itself, even if the resource reference is cyclic.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are methods, apparatus and computer programs for enhanced access to resources within a network, including for controlling use of bandwidth-sensitive connections within a network and/or for automated recovery. Hash values are used as ‘unique’ identifiers for resources distributed across a network, and each one of a set of pool servers store the hash values for a set of computers within a LAN. When a resource is required, a hash value representing the resource can be retrieved and compared with hash values stored at a pool server to determine whether the pool server holds a matching hash value. Any such matching hash value found on the pool server represents an identification of a local copy of the required resource, because of the uniqueness property of secure ash values. The information within the pool server can be used to access the required resource. If a large resource such as a BLOB or new version of a computer program can be obtained from another computer within a LAN, a reduction in reliance on bandwidth-sensitive Internet connections and reduced load on remote servers becomes possible.
122 Citations
8 Claims
-
1. A method for accessing resources within a data processing network, comprising:
-
computing a hash value representing a resource stored at a server data processing system; embedding the hash value within an address portion of a hyperlink, thereby providing a hash-based resource reference, wherein the hyperlink points to the resource at least partly via the hash value, so that in providing the hyperlink responsive to a request for access to the resource, the resource is locatable via the hash-based resource reference in the hyperlink; scanning the resource to identify hash-based resource references within hyperlinks of the resource; and extracting the hash-based resource references from the hyperlinks to generate a modified resource which does not contain the extracted hashes, wherein the computing of a hash value representing a resource stored at a server data processing system includes; applying a secure hash function to the modified resource to compute the hash value representing the resource, so that the computed hash value representing the resource is independent of the hash value itself, even if the resource reference is cyclic. - View Dependent Claims (2, 3)
-
-
4. A computer program product, stored on a computer readable medium comprising a storage device, for accessing resources within a data processing network, said computer program product having instructions for execution by a computer, which, when executed by the computer, cause the computer to implement a method comprising:
-
computing a hash value representing a resource stored at a server data processing system; embedding the hash value within an address portion of a hyperlink, thereby providing a hash-based resource reference, wherein the hyperlink points to the resource at least partly via the hash value, so that in providing the hyperlink responsive to a request for access to the resource, the resource is locatable via the hash-based resource reference in the hyperlink; scanning the resource to identify hash-based resource references within hyperlinks of the resource; and extracting the hash-based resource references from the hyperlinks to generate a modified resource which does not contain the extracted hashes, wherein the computing of a hash value representing a resource stored at a server data processing system includes; applying a secure hash function to the modified resource to compute the hash value representing the resource, so that the computed hash value representing the resource is independent of the hash value itself, even if the resource reference is cyclic embedding at least one additional resource reference within the address portion of the hyperlink, to generate a hyperlink that comprises a plurality of resource references; and
embedding within the hyperlink relative priorities associated with the respective resource references. - View Dependent Claims (5, 6)
-
-
7. A data processing system comprising:
- a computer readable medium, wherein the computer readable medium comprises a storage device, said storage device storing and executing instructions for;
computing a hash value representing a resource stored at a server data processing system;
embedding the hash value within an address portion of a hyperlink, thereby providing a hash-based resource reference, wherein the hyperlink points to the reference at least partly via the hash value, so that in providing the hyperlink responsive to a request for access to the resource, the resource is locatable via the hash-based resource reference in the hyperlink;
scanning the resource to identify hash-based resource references within hyperlinks of the resource; and
extracting the hash-based resource references from the hyperlinks to generate a modified resource which does not contain the extracted hashes, wherein the computing of a hash value representing a resource stored at a server data processing system includes;
applying a secure hash function to the modified resource to compute the hash value representing the resource, so that the computed hash value representing the resource is independent of the hash value itself, even if the resource reference is cyclic;
embedding at least one additional resource reference within the address portion of the hyperlink, to generate a hyperlink that comprises a plurality of resource references; and
embedding within the hyperlink relative priorities associated with the respective resource references. - View Dependent Claims (8)
- a computer readable medium, wherein the computer readable medium comprises a storage device, said storage device storing and executing instructions for;
Specification