Secure collection synchronization using matched network names
First Claim
Patent Images
1. A computer-executable method, comprising:
- generating, by a computing device, an advertisement of a collection of content objects stored at the computing device, wherein a name included in the advertisement is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level,wherein a last component of the name for the advertisement is a first hash that is based on a key of the computing device,wherein the first hash is a hash of one or more segments of a manifest representing the collection of content objects,wherein a segment of a manifest is distinct from a content object associated with the collection; and
receiving a request for a content object associated with the collection based on a name of a received interest of data from a remote node, wherein the last component of the name of the received interest is the first hash.
3 Assignments
0 Petitions
Accused Products
Abstract
One embodiment provides a system that facilitates facilitate secure synchronization of manifests using exact network names. During operation, the system generates an interest of advertisement comprising a name of a content object of the system. This name represents a collection of objects of the system and includes a first hash that is based on a key of the system. The first hash corresponds to a respective content object hash of one or more segments of a manifest representing the collection of objects. The system also determines a request for the content object based on the name in an interest of data from a remote node.
382 Citations
20 Claims
-
1. A computer-executable method, comprising:
-
generating, by a computing device, an advertisement of a collection of content objects stored at the computing device, wherein a name included in the advertisement is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level, wherein a last component of the name for the advertisement is a first hash that is based on a key of the computing device, wherein the first hash is a hash of one or more segments of a manifest representing the collection of content objects, wherein a segment of a manifest is distinct from a content object associated with the collection; and receiving a request for a content object associated with the collection based on a name of a received interest of data from a remote node, wherein the last component of the name of the received interest is the first hash. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-executable method, comprising:
-
obtaining, by a computing device, a name included in an advertisement from a remote node, wherein the name represents a collection of objects at the remote node and is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level, wherein a last name component of the name for the advertisement is a first hash that is based on a key of the remote node, wherein the first hash is a hash of one or more segments of a manifest representing the collection of content objects, wherein a segment of a manifest is distinct from a content object associated with the collection; and generating for the remote node an interest of data comprising a request for the collection of content objects based on the name.
-
-
11. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method, the method comprising:
-
generating an advertisement of a collection of content objects stored at a local node, wherein a name included in the advertisement is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level, wherein a last component of the name for the advertisement is a first hash that is based on a key of the local node, wherein the first hash is a hash of one or more segments of a manifest representing the collection of content objects, wherein a segment of a manifest is distinct from a content object associated with the collection; and receiving a request for a first content object associated with the collection based on a name of a received interest of data from a remote node, wherein the last component of the name of the received interest is the first hash. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method, the method comprising:
-
obtaining a name included in an advertisement from a remote node, wherein the name represents a collection of objects at the remote node and is a hierarchically structured variable length identifier which comprises contiguous name components ordered from a most general level to a most specific level, wherein a last name component of the name for the advertisement is a first hash that is based on a key of the remote node, wherein the first hash is a hash of one or more segments of a manifest representing the collection of content objects, wherein a segment of a manifest is distinct from a content object associated with the collection; and generating for the remote node an interest of data comprising a request for the collection of content objects based on the name.
-
Specification