Access to content addressable data over a network
First Claim
1. A method of deleting a digital asset in a data repository that includes an asset list that identifies the digital asset as being stored in the data repository, the method comprising:
- with at least one processor;
receiving from a broadcast network transmission, at the data repository, a broadcast cryptographic hash asset identifier;
adding the broadcast cryptographic hash asset identifier to a list of files to be deleted;
comparing the broadcast cryptographic hash asset identifier to a generated cryptographic hash asset identifier for the digital asset; and
deleting the digital asset from the asset list that identifies the digital asset as being stored in the data repository when the broadcast cryptographic hash asset identifier matches the generated cryptographic hash asset identifier.
9 Assignments
0 Petitions
Accused Products
Abstract
Access to content addressable data on a network is facilitated using digital information storing devices or data repositories (“silos”) that monitor broadcast data requests over the network. A number of silos automatically monitor both data requests and data itself that are broadcast over a network. The silos selectively store data. Each silo responds to data requests broadcast over the network with data the silo has previously intercepted. A content addressable file scheme is used to enable the data repositories to reliably identify data being requested. When a data request is received, each silo evaluates whether it has all or a portion of the data being requested and responds to requests when it has the data. Requests for data are implemented by broadcasting a cryptographic hash data identifier of the data file needed. The data identifier is used by a silo to determine which data to receive and store. A silo includes a network interface, a digital asset collector, an asset request list, asset storage, an asset identifier processor and an asset supplier. The asset identifier processor computes a cryptographic hash asset identifier for a received asset and compares it to an asset identifier on its asset request list to verify it has the correct asset. A hash of a list of assets is also computed and broadcast over the network. When the hash of the list of assets is received by a silo, it places all the assets in its asset request list.
185 Citations
20 Claims
-
1. A method of deleting a digital asset in a data repository that includes an asset list that identifies the digital asset as being stored in the data repository, the method comprising:
with at least one processor; receiving from a broadcast network transmission, at the data repository, a broadcast cryptographic hash asset identifier; adding the broadcast cryptographic hash asset identifier to a list of files to be deleted; comparing the broadcast cryptographic hash asset identifier to a generated cryptographic hash asset identifier for the digital asset; and deleting the digital asset from the asset list that identifies the digital asset as being stored in the data repository when the broadcast cryptographic hash asset identifier matches the generated cryptographic hash asset identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. At least one computer readable storage device encoded with instructions that, when executed, perform a method of deleting a digital asset in a data repository that includes an asset list that identifies the digital asset as being stored in the data repository, the method comprising:
-
receiving from a broadcast network transmission, at the data repository, a broadcast cryptographic hash asset identifier; adding the broadcast cryptographic hash asset identifier to a list of files to be deleted; comparing the broadcast cryptographic hash asset identifier to a generated cryptographic hash asset identifier for the digital asset; and deleting the digital asset from the asset list that identifies the digital asset as being stored in the data repository when the broadcast cryptographic hash asset identifier matches the generated cryptographic hash asset identifier. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A data repository that includes an asset list that identifies a digital asset as being stored in the data repository, the data repository comprising:
-
at least one physical storage device that stores the asset list and the digital asset; and at least one controller, coupled to the at least one physical storage device, that; receives, from a broadcast network transmission, a broadcast cryptographic hash asset identifier; adds the broadcast cryptographic hash asset identifier to a list of files to be deleted; compares the broadcast cryptographic hash asset identifier to a generated cryptographic hash asset identifier for the digital asset; and deletes the digital asset from the asset list that identifies the digital asset as being stored in the data repository when the broadcast cryptographic hash asset identifier matches the generated cryptographic hash asset identifier. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification