Synchronizing distributed work through document logs
First Claim
Patent Images
1. A method comprising:
- receiving a search request for content from a document log for a first document, in which a scope of the search request is defined by specifying a hash value computed from the requested content and a context for the search, wherein the context comprises a host identifier and a document log identifier, wherein the host identifier identifies a server where the document log is hosted and the document log identifier comprises a hash value computed from contents of the first document and identifies the document log from among a plurality of document logs hosted by the server, wherein the search request includes a signature of a requestor for use by the server to authenticate, before a search is performed, the requestor'"'"'s knowledge of the first document in the document log, and wherein the signature of the requestor is a second hash value computed from a first data string representing contents of the first document concatenated with a second data string representing the search request for the content from the document log;
authenticating the requestor'"'"'s knowledge of the first document by comparing the signature of the requestor with an authentication hash value, computed by the server, from contents of the first document concatenated with the received search request for the content;
in response to successful authentication of the requestor'"'"'s knowledge,limiting the search to the document log identified by the document log identifier in the search request, andperforming the limited search on the document log, by the server, based on the hash value.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus is disclosed herein for synchronizing distributed work. In one embodiment, the method comprises receiving first and second metadata entries, adding the first and second metadata entries to a set corresponding to a digital object, and providing access to first and second unique identifiers used for referencing the first and second metadata entries respectively, where the first and second unique identifiers are based on contents of the first and second metadata entries respectively.
170 Citations
8 Claims
-
1. A method comprising:
-
receiving a search request for content from a document log for a first document, in which a scope of the search request is defined by specifying a hash value computed from the requested content and a context for the search, wherein the context comprises a host identifier and a document log identifier, wherein the host identifier identifies a server where the document log is hosted and the document log identifier comprises a hash value computed from contents of the first document and identifies the document log from among a plurality of document logs hosted by the server, wherein the search request includes a signature of a requestor for use by the server to authenticate, before a search is performed, the requestor'"'"'s knowledge of the first document in the document log, and wherein the signature of the requestor is a second hash value computed from a first data string representing contents of the first document concatenated with a second data string representing the search request for the content from the document log; authenticating the requestor'"'"'s knowledge of the first document by comparing the signature of the requestor with an authentication hash value, computed by the server, from contents of the first document concatenated with the received search request for the content; in response to successful authentication of the requestor'"'"'s knowledge, limiting the search to the document log identified by the document log identifier in the search request, and performing the limited search on the document log, by the server, based on the hash value. - View Dependent Claims (2, 3, 7, 8)
-
-
4. A non-transitory computer-readable storage medium having instructions stored thereon which, when executed by a computer, cause the computer to:
-
receiving a search request for content from a document log for a first document, in which a scope of the search request is defined by specifying a hash value computed from the requested content and a context for the search, wherein the context comprises a host identifier and a document log identifier, wherein the host identifier identifies a server where the document log is hosted and the document log identifier comprises a hash value computed from contents of the first document and identifies the document log from among a plurality of document logs hosted by the server, wherein the search request includes a signature of a requestor for use by the server to authenticate, before a search is performed, the requestor'"'"'s knowledge of the first document in the document log, and wherein the signature of the requestor is a second hash value computed from a first data string representing contents of the first document concatenated with a second data string representing the search request for the content from the document log; authenticating the requestor'"'"'s knowledge of the first document by comparing the signature of the requestor with an authentication hash value, computed by the server, from contents of the first document concatenated with the received search request for the content; in response to successful authentication of the requestor'"'"'s knowledge, limiting the search to the document log identified by the document log identifier in the search request, and performing the limited search on the document log, by the server, based on the hash value.
-
-
5. An apparatus comprising:
-
a computer including; an input to receive a search request for content from a document log for a first document, in which a scope of the search request is defined by specifying a hash value computed from the requested content and a context for the search, wherein the context comprises a host identifier and a document log identifier, wherein the host identifier identifies a server where the document log is hosted and the document log identifier comprises a hash value computed from contents of the first document and identifies the document log from among a plurality of document logs hosted by the server, wherein the search request includes a signature of a requestor for use by the server to authenticate, before a search is performed, the requestor'"'"'s knowledge of the first document in the document log, and wherein the signature of the requestor is a second hash value computed from a first data string representing contents of the first document concatenated with a second data string representing the search request for the content from the document log; and a processing unit to authenticate the requestor'"'"'s knowledge of the first document by comparing the signature of the requestor with an authentication hash value, computed by the server, from contents of the first document concatenated with the received search request for the content, limit the search to the document log identified by the document log identifier in the search request, and perform the limited search on the document log based on the hash value.
-
-
6. An apparatus comprising:
-
means for receiving a search request for content from a document log for a first document, in which a scope of the search request is defined by specifying a hash value computed from the requested content and a context for the search, wherein the context comprises a host identifier and a document log identifier, wherein the host identifier identifies a server where the document log is hosted and the document log identifier comprises a hash value computed from contents of the first document that identifies the document log from among a plurality of document logs hosted by the server, wherein the search request includes a signature of a requestor for use by the server to authenticate, before a search is performed, the requestor'"'"'s knowledge of the first document in the document log, and wherein the signature of the requestor is a second hash value computed from a first data string representing contents of the first document concatenated with a second data string representing the search request for the content from the document log; means for authenticating the requestor'"'"'s knowledge of the first document by comparing the signature of the requestor with an authentication hash value, computed by the server, from contents of the first document concatenated with the received search request for the content; in response to successful authentication of the requestor'"'"'s knowledge, means for limiting the search to the document log identified by the document log identifier in the search request, and means for performing the limited search on the document log, by the server, based on the hash value.
-
Specification