There is disclosed a filter for a distributed network. A method may include receiving index requests from indexing nodes over a network and providing over the network index responses to the indexing nodes in response to the index requests. The index responses may instruct a receiving indexing node t
There is disclosed a filter for a distributed network. A method may include receiving index requests from indexing nodes over a network and providing over the network index responses to the indexing nodes in response to the index requests. The index responses may instruct a receiving indexing node to index a specified file. The method may be implemented in software and on a computer.
대표청구항▼
1. A server coupled to a network comprising a plurality of ordinary nodes and a plurality of indexing nodes, the server comprising: at least one processor operable to: (A) receive an index request from an indexing node in the plurality of indexing nodes, said index request being a request for permis
1. A server coupled to a network comprising a plurality of ordinary nodes and a plurality of indexing nodes, the server comprising: at least one processor operable to: (A) receive an index request from an indexing node in the plurality of indexing nodes, said index request being a request for permission for said indexing node to index a file;(B) determine whether or not an identifier for the file corresponds to an entry in a database, said database comprising a plurality of file identifiers and one or more action codes corresponding to each of said plurality of file identifiers; and(C) provide an index response to the indexing node in response to the index request, said index response being based, at least in part, on (i) whether or not the identifier for the file corresponds to an entry in the database, and, when the identifier for the file corresponds to an entry in the database, said index response being based, at least in part, on (ii) one or more action codes in said database corresponding to said identifier for said file, wherein said index response comprises one of: (i) a first indication that the indexing node has permission to index the file; and(ii) a second indication that the indexing node does not have permission to index the file; and(iii) a third indication that the indexing node should index a substitute file instead of the file,wherein the server is distinct from the plurality of indexing nodes and wherein the network comprises a peer-to-peer network. 2. The server of claim 1, wherein the index response comprises alternative data. 3. The server of claim 2 wherein the alternative data includes an identification of the substitute file to be indexed instead of the file. 4. The server of claim 1, wherein the index request comprises a file identifier. 5. The server of claim 4 wherein the file identifier comprises a hash of the file. 6. The server of claim 1, wherein the server is configured to receive the index request over the Internet and to provide the index response over the Internet. 7. The server of claim 1 wherein the identification of the substitute file comprises a uniform resource locator (URL) or a uniform resource identifier (URI) of the substitute file. 8. A computer-implemented method operable in network comprising a a plurality of indexing nodes and a server, the method comprising the steps of: (A) receiving at the server an index request from an indexing node over the network, said index request asking whether said indexing node is permitted to index a file; and(B) responsive to the index request, the server: (b1) determining whether an identifier for the file corresponds to an entry in a database, said database comprising a plurality of file identifiers and one or more action codes corresponding to each of said plurality of file identifiers; and(b2) providing over the network an index response to the indexing node, the index response being based, at least in part, on (i) whether or not the identifier for the file corresponds to an entry in the database, and wherein, when the identifier for the file corresponds to an entry in the database the index response is based, at least in part, on (ii) one or more action codes corresponding to the file identifier in the database, wherein the index response comprises one of: (i) a first indication that the indexing node has permission to index the file,(ii) a second indication that the indexing node does not have permission to index the file, and(iii) a third indication that the indexing node should index a substitute file instead of the file identified by the file identifier, wherein the server is distinct from the plurality of indexing nodes, and wherein the network comprises a peer-to-peer network. 9. The method of claim 8, wherein the index request comprises a file identifier identifying the file. 10. The method of claim 9 wherein the file identifier comprises a hash of the file. 11. The method of claim 8, wherein the index response comprises alternative data. 12. The method of claim 11, wherein the alternative data comprises an identifier of a different version of the file identified by the file identifier. 13. The method of claim 12 wherein the identifier of the different version of the file is a uniform resource locator (URL) or a uniform resource identifier (URI) of the different version of the file. 14. The method of claim 11, wherein the alternative data comprises the identifier of a copy protected version of the file identified by the file identifier. 15. The method of claim 8, wherein the index response includes an identification of the substitute file. 16. The method of claim 15 wherein the identification of the substitute file comprises a uniform resource locator (URL) or a uniform resource identifier (URI) of the substitute file. 17. The method of claim 8, wherein the network is the Internet. 18. A server coupled to a network comprising a plurality of nodes, the server comprising: at least one processor operable to: receive an index request from one of the nodes over the network, the index request including a file identifier for a file, said index request being a request for permission for said one of the nodes to index said file;determine whether the file identifier for the file corresponds to an entry in a database, said database comprising a plurality of file identifiers and one or more action codes corresponding to each of said plurality of file identifiers; andprovide an index response over the network to the one of the nodes in response to the index request, said index response being based, at least in part, on (i) whether or not the file identifier for the file corresponds to an entry in the database, and, when the file identifier for the file corresponds to an entry in the database, said index response being based, at least in part, on (ii) one or more action codes in said database corresponding to said file identifier for said file, said index response including one of: (i) a first indication that the indexing node has permission to index the file,(ii) a second indication that the indexing node does not have permission to index the file, and(iii) a third indication that the indexing node should index a substitute file instead of the file,wherein the server is distinct from said plurality of nodes, and wherein the network comprises a peer-to-peer network. 19. The server of claim 18, wherein the index response further comprises alternative data. 20. The server of claim 19, wherein the alternative data comprises an identification of the substitute file to be indexed instead of the file. 21. The server of claim 18, wherein the substitute file is a different version of the file identified by the file identifier. 22. The server of claim 18, wherein the substitute file is a copy protected version of the file the file identified by the file identifier. 23. The server of claim 18, wherein the index response includes an identification of the substitute file. 24. The server of claim 18, wherein the server is configured to receive the index request over the Internet and to provide the index response over the Internet. 25. An indexing node coupled to a network comprising a plurality of ordinary nodes and at least one server, the indexing node comprising: at least one processor operable to: receive file advertisements from ordinary nodes over the network, each file advertisement specifying at least one advertised file;send over the network index requests to the server seeking permission for said indexing node to index the advertised file; andreceive over the network index responses from the server in response to the index requests, said index responses indicating whether or not said indexing node has permission to index the at least one advertised file, wherein the index response comprises one of: (i) a first indication that the indexing node has permission to index the advertised file, (ii) a second indication that the indexing node does not have permission to index the advertised file, and (iii) a third indication that the indexing node should index a substitute file instead of the advertised file, said index response being based, at least in part, on whether or not an identifier for said file corresponds to an entry in a database, as determined by said server; andbased at least in part on said index responses, index the at least one advertised file when at least one index response from said server indicates that the indexing node has permission to index the at least one advertised file, and not index the at least one advertised file when the index response from the server indicates that the indexing node does not have permission to index the at least one advertised file; and toindex the substitute file when the index response includes the third indication that the indexing node should index the substitute file instead of the advertised file,wherein said at least one server is distinct from the indexing node, and wherein the network comprises a peer-to-peer network. 26. The indexing node of claim 25, wherein the index response comprises an action code. 27. The indexing node of claim 25, wherein the index response comprises alternative data. 28. The indexing node of claim 25, wherein the index response includes an identification of the substitute file. 29. The indexing node of claim 28 wherein the identification of the substitute file comprises a uniform resource locator (URL) or a uniform resource identifier (URI) of the substitute file. 30. The indexing node of claim 25, wherein the index request comprises a file identifier for the advertised file. 31. The node of claim 30 wherein the file identifier comprises a hash of the advertised file. 32. The indexing node of claim 25, wherein the network is the Internet. 33. The indexing node of claim 25 further configured to: resend the index request when the index response includes a retry action code. 34. The indexing node of claim 25, wherein the substitute file is a different version of the advertised file. 35. The indexing node of claim 25, wherein the substitute file is a copy protected version of the advertised file. 36. A node coupled to a network comprising a plurality of nodes and at least one server, the node comprising: at least one processor operable to: (A) receive a file advertisement from another node in the network, the file advertisement specifying an advertised file;(B) send an index request to the server seeking permission to index the advertised file, the index request including at least one file identifier corresponding to the advertised file;(C) receive an index response from the server in response to the index request, the index response including an indication of whether or not the node has permission to index the advertized file, wherein the index response comprises one of: (i) a first indication that the indexing node has permission to index the advertised file, and (ii) a second indication that the indexing node does not have permission to index the advertised file;(D) index the advertised file when the index response includes an indication that the indexing node has permission to index the advertised file, and not index the advertised file when the index response includes indication that the indexing node does not have permission to index the advertised file; and(E) index a substitute file when the index response includes an indication that the indexing node should index the substitute file instead of the advertised file,wherein said at least one server is distinct from the plurality of nodes, and wherein the network comprises a peer-to-peer network. 37. The node of claim 36, wherein the index response further comprises alternative data. 38. The node of claim 36 further configured to: resend the index request when the index response includes a retry action code. 39. The node of claim 36, wherein the substitute file is a different version of the advertised file. 40. The node of claim 36, wherein the substitute file is a copy protected version of the advertised file.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (142)
Gardner Alan S. (Potomac MD) McElrath Rodney D. (Fairfax VA) Harvey Stephen L. (Port Haywood VA), Apparatus and method for data storage and retrieval using bandwidth allocation.
Cuenod Jean-Christophe E. (Mountain View CA) Sichel Peter A. (Westford MA), Computer peripheral device network with peripheral address resetting capabilities.
Burnett Colin J. (Sydney AUX) Haas Garry L. (San Jose CA), Computer program product for object specification, generation, and management in a distributed database.
Rivest Ronald L. (Belmont MA), Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encry.
Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
Blickenstaff Ronald L. (Boulder CO) Brant Catherine I. (Boulder CO) Dodd Paul D. (Niwot CO) Kirchner Anton H. (Boulder CO) Montez Jennifer K. (Thornton CO) Trede Brian E. (Boulder CO) Winter Richard , Data storage management for network interconnected processors.
Gruner Ronald H. (Cary NC) Clancy Gerald F. (Saratoga CA) Mundie Craig J. (Cary NC) Schleimer Stephen I. (Chapel Hill NC) Wallach Steven J. (Saratoga CA) Bratt Richard G. (Wayland MA) Gavrin Edward S, Digital data processing system having a uniquely organized memory system using object-based addressing and in which oper.
Fitzgerald Albion J. (Ridgewood NJ) Fitzgerald Joseph J. (New Paltz NY), Distributed computer network including hierarchical resource information structure and related method of distributing re.
Belsan Jay S. (Nederland CO) Laughlin Jeffrey S. (Nederland CO) Pedersen Mogens H. (Longmont CO) Raicer Robert J. (Niwot CO) Rudeseal George A. (Boulder CO) Schafer Charles P. (Louisville CO) Steele , File server having snapshot application data groups.
Gudmundson Norman K. ; MacInnis Bo Yu, Hierarchical encapsulation of instantiated objects in a multimedia authoring system including internet accessible objec.
Dixon Jerry D. (Boca Raton FL) Marazas Gerald A. (Boca Raton FL) Merckel Gerald U. (Delray Beach FL), I/O Storage controller cache system with prefetch determined by requested record\s position within data block.
Colwell Robert P. (Guilford CT) O\Donnell John (Guilford CT) Papworth David B. (Guilford CT) Rodman Paul K. (Madison CT), Instruction storage and cache miss recovery in a high speed multiprocessing parallel processing apparatus.
Colwell Robert P. (Guilford CT) O\Donnell John (Guilford CT) Papworth David B. (Guilford CT) Rodman Paul K. (Madison CT), Instruction storage method with a compressed format using a mask word.
Gopal Gita (Wayne NJ) Wuu Sze-Ying (Branchburg NJ), Linking system and method for accessing directory information about an object in one context when information in another.
Talbott Marvin T. (Plano TX) Burks Henry L. (Dallas TX) Shaw Richard W. (Plano TX) Amundsen Michael (Dallas TX) Hutchison Katherine K. (Dallas TX) Strasburg Donald D. (Plano TX), Method and apparatus for aiding system design.
Benhase Michael T. (Tucson AZ) Duke Alan H. (Tucson AZ), Method and apparatus for converting addresses of a backing store having addressable data storage devices for accessing a.
Churm Brian R. (Wheaton IL) Diesel Michael E. (Newark IL), Method and apparatus for data hashing using selection from a table of random numbers in combination with folding and bit.
Cahill Thomas (Newton NJ) Levine Glenn (Ossining NY) Goldfisher Saul (Brooklyn NY) Wilson Philip (Brooklyn NY), Method and apparatus for distributing files on a file storage device.
Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
Hamilton Graham (Palo Alto CA) Kessler Peter B. (Palo Alto CA), Method and apparatus for generating and using short operation identifiers in object oriented systems.
Tirfing Soren J. (Palo Alto CA) Gramlich Wayne C. (Sunnyvale CA), Method and apparatus for searching database component files to retrieve information from modified files.
Cichelli Richard J. (Allentown PA) Thompson Michael Q. (Bethlehem PA) Cheswick William R. (New Hope PA), Method and apparatus for testing membership in a set through hash coding with allowable errors.
Gramlich Wayne C. (Sunnyvale CA) Tirfing Soren J. (Palo Alto CA), Method and apparatus for the naming of database component files to avoid duplication of files.
Garay Juan Alberto ; Gennaro Rosario ; Jutla Charanjit Singh ; Rabin Tal D., Method and apparatus for the secure distributed storage and retrieval of information.
Velissaropoulos T. Dora (Toronto CAX) Shum Peter K. (Richmond Hill CAX), Method and means for encoding storing and retrieving hierarchical data processing information for a computer system.
Cohn Oded (Haifa AZ ILX) Micka William F. (Tucson AZ) Nagin Kenneth M. (Tucson AZ) Novick Yoram (Haifa ILX) Winokur Alexander (Haifa ILX), Method and system for time zero backup session security.
Leighton Frank T. (15 Charlesden Pk. Newtonville MA 02160) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for authenticating objects identified by images or other identifying information.
Alferness Merwin H. (New Brighton MN) Criswell Peter Bradley (Bethel MN) Johnson David Randal (Oakdale MN) McBreen James R. (Shoreview MN), Method for generating an internet protocol suite checksum in a single macro instruction.
Nuttall David J. H. (20634 NE. 181 Pl. Woodinville WA 98072) Brehm Bertram G. (25119 NE. 18 St. Redmond WA 98053), Method for modeling a physical system of elements using a relational database.
Brown Paul J. (Poughkeepsie NY) Fredericks ; Sr. Kenneth J. (Poughkeepsie NY) Hefferon Eugene P. (Poughkeepsie NY) Moffitt Gerald T. (San Jose CA) Meritt Allan S. (Poughkeepsie NY), Method for requesting identification of a neighbor node in a data processing I/O system.
Perelson Alan S. (820 Los Arboles La. Santa Fe NM 87501) Forrest Stephanie (440 Amherst NE Albuquerque NM 87106) Allen Lawrence C. (56 Tecolote Rd. Tijeras NM 87059), Method of detecting changes to a collection of digital signals.
Hale, John C.; Manes, Gavin W., Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network.
Nemes Richard M. (Brooklyn NY), Methods and apparatus for information storage and retrieval utilizing a method of hashing and different collision avoida.
Hunter John C. (Phoenix AZ) Wertz John A. (Phoenix AZ), Multi-node cluster computer system incorporating an external coherency unit at each node to insure integrity of informat.
Summer ; Jr. Charles F. (Orlando FL) Pettus Robert O. (Lexington SC) Bonnell Ronald D. (Lexington SC) Huhns Michael N. (Irmo SC) Stephens Larry M. (Columbia SC), Multiple-microcomputer processing.
Neches Philip M. (Pasadena CA) Hartke David H. (Los Angeles CA) Stockton Richard C. (Northridge CA) Watson Martin C. (Northridge CA) Cronshaw David (Torrance CA) Shemer Jack E. (Los Angeles CA), Multiprocessor intercommunication system and method.
Emry ; Jr. Carl A. (Round Rock TX) Neuman Grover H. (Austin TX) Mersiovsky Lynda K. (Austin TX) Pfeuffer Margaret S. (Raleigh NC), Page indexing system for accessing sequentially stored data representing a multi-page document.
Eisenberg Neal R. (San Jose CA) Huddleston Robert L. (Sunnyvale CA) Karasiuk Gary R. (Keswick CA CAX) Lehner Mary C. (San Jose CA) Tribolet Charles S. (Morgan Hill CA), Resolution of relationship source and target in a versioned database management system.
Tamura Toshiyuki (Itami JPX) Fujita Masaki (Itami JPX) Komori Shinji (Itami JPX) Sato Hisakazu (Itami JPX) Takata Hidehiro (Itami JPX), Retrieving data using hash memory address generated by reversing /xor bits of selected bit strings of an input packet id.
Barnes Cherie C. (Barton NY) Bennett Robert B. (Endwell NY) Szczygielski Thomas J. (Endicott NY), Space management system for data files having shared access.
Clark Carl E. (Poughkeepsie NY) Frey Jeffrey A. (Fishkill NY) Plambeck Kenneth E. (Poughkeepsie NY) Scalzi Casper A. (Poughkeepsie NY) Sinha Bhaskar (Wappingers Falls NY), Storage isolation with subspace-group facility.
Dockter Michael J. (Hollister CA) Farber Joel F. (San Jose CA) Seppi Kevin D. (Austin TX), Storing and retrieving heterogeneous classification systems utilizing globally unique identifiers.
Holloway John T. (Belmont MA) Moon David A. (Cambridge MA) Cannon Howard I. (Lexington MA) Knight Thomas F. (Belmont MA) Edwards Bruce E. (Belmont MA) Weinreb Daniel L. (Somerville MA), Symbolic language data processing system.
Holloway John T. (Belmont MA) Moon David A. (Cambridge MA) Cannon Howard I. (Sudbury MA) Knight Thomas F. (Belmont MA) Edwards Bruce E. (Belmont MA) Weinreb Daniel L. (Arlington MA), Symbolic language data processing system.
Bannon Thomas J. (Dallas TX) Ford Stephen J. (Plano TX) Joseph Vappala J. (Plano TX) Perez Edward R. (Dallas TX) Peterson Robert W. (Plano TX) Sparacin Diana M. (Plano TX) Thatte Satish M. (Richardso, System and method for database management supporting object-oriented programming.
Woodhill James R. (Houston TX) Woodhill Louis R. (Richmond TX) More ; Jr. William Russell (Houston TX) Berlin Jay Harris (Houston TX), System and method for distributed storage management on networked computer systems using binary object identifiers.
Cheng Edward C. (South San Francisco CA) Gawlick Dieter (Palo Alto CA) O\Neil Patrick E. (Lexington MA), System and method for efficiently indexing and storing a large database with high data insertion frequency.
Faybishenko, Yaroslav; Kan, Gene H.; Camarda, Thomas J.; Botros, Sherif; Beatty, John; Cutting, Douglass R., System and method for resolving distributed network search queries to information providers.
Balick Maurice ; van Hoff Arthur A. ; McChesney Roderick J., System and method to control and administer distributed object servers using first class distributed objects.
Wittenberg David K. (Hudson MA) Leichter Jerrold S. (Stamford CT), System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and gr.
Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Hamilton Graham (Palo Alto CA) Powell Michael L. (Palo Alto CA) Chapin John (East Palo Alto CA), System for determination of the equivalence of two objects without compromising then done by a third object nominated by.
Burke Thomas J. (Chagrin Falls OH), System for generating unsolicited messages on high-tier communication link in response to changed states at station-leve.
Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
Mansfield Bruce M. (Kent WA) Kolnick Frank C. (Willowdale CAX) Kun Andrew I. (Willowdale CAX), System for locating a file in a logical ring by sequentially forwarding access request with file system name and file na.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Flynn Rex A. (Belmont MA) Anick Peter G. (Marlboro MA), System for reconstructing prior versions of indexes using records indicating changes between successive versions of the.
Forrest Bradley A. (Rochester MN) Hager Dean J. (Rochester MN) Rose Curtis G. (Rochester MN), System for selecting document recipients as determined by technical content of document and for electronically corrobora.
Kindell Craig N. (Delray Beach FL) Milsted Kenneth L. (Boca Raton FL) Vogt Michael P. (Boca Raton FL) Waefler Susan E. (Delray Beach FL) Yoder Brian E. (Boca Raton FL), System for the management of multiple time-critical data streams.
Clancy Gerald F. (Saratoga CA) Mundie Craig J. (Cary NC) Schleimer Stephen I. (Chapel Hill NC) Wallach Steven J. (Saratoga CA) Bratt Richard G. (Wayland MA), Universal addressing system for a digital data processing system.
Granström, Johan Georg; Postelnicu, Gheorghe; Heckmann, Oliver Markus, Ex post facto review of claims made against proprietary content in a live data stream.
Johansson, Bengt; Andersson, Per; Chatila, Abdallah; Franzen, Anders; Hammam, Tarik; Maloy, Jon; Nilsson, Tord; Pettersson, Sten Rune; Tremblay, Richard, Systems, methods, and computer program products for a software build and load process using a compilation and deployment service.
Johansson, Bengt; Andersson, Per; Chatila, Abdallah; Franzen, Anders; Hammam, Tarik; Maloy, Jon; Nilsson, Tord; Pettersson, Sten Rune; Tremblay, Richard, Systems, methods, and computer program products for a software build and load process using a compilation and deployment service.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.