Controlling access to data in a data processing system

  • US 7,802,310 B2
  • Filed: 10/31/2007
  • Issued: 09/21/2010
  • Est. Priority Date: 04/11/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method in a system which includes a network of computers, the method implemented at least in part by hardware comprising at least one processor, the method comprising the steps:

  • (a) at a first computer, obtaining a content-based name for a particular data item from a second computer distinct from the first computer, the content-based name being based at least in part on a function of at least some of the data which comprise the contents of the particular data item, wherein the function comprises a message digest function or a hash function, and wherein two identical data items will have the same content-based name; and

    (b) by hardware in combination with software, a processor at said first computer ascertaining whether or not the content-based name for the particular data item corresponds to an entry in a database comprising a plurality of identifiers; and

    (c) based at least in part on said ascertaining in (b), determining whether or not access to the particular data item is authorized.

View all claims
  • 3 Assignments
Timeline View
Assignment View