throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re PATENT APPLICATION OF:
`
`Attorney Docket:
`
`2618-001 1
`
`David A. FARBER et al.
`
`Group Art Unit:
`
`2166
`
`Application Serial No.: 11/017,650
`
`Examiner: PHAM, Khanh P.
`
`Application Filing Date: 12/22/2004
`
`Confirmation No.:
`
`3082
`
`Title: Content Delivery Network and
`Date: April 20, 2010
`Associated Methods and Mechanisms
`
`
`
`SUPPLEMENTAL AMENDMENT
`
`via EFS- Web
`
`Hon. Commissioner of Patents
`
`PO. Box 1450
`
`Alexandria, VA 22313-1450
`
`Sir:
`
`Please amend this application as follows:
`
`Amendments to the Specification begin on page 2 hereof.
`
`Amendments to the Claims are reflected in the listing of claims which
`
`begins on page 10.
`
`Remarks begin on page 32.
`
`An Information Disclosure Statement (IDS) is being filed herewith.
`
`GOOG-‘IOZ’I-Page 1 of 34
`
`GOOG-1021-Page 1 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 2 of 34
`
`IN THE SPECIFICATION
`
`Please amend the specification as follows:
`
`Please replace paragraph 0056 with the following:
`
`[0056]
`
`Primitive mechanisms provide fundamental capabilities used
`
`to support other mechanisms. The following primitive mechanisms are described:
`
`1. Calculate True Name;
`
`2. Assimilate Data Item;
`
`3. M True File;
`
`4. Get True Name from Path;
`
`5. Link path to True Name;
`
`6. Realize True File from Location;
`
`7. Locate Remote File;
`
`8. Make True File Local;
`
`9. Create Scratch File;
`
`10. Freeze Directory;
`
`11. Expand Frozen Directory;
`
`12. Delete True File;
`
`13. Process Audit File Entry;
`
`14. Begin Grooming;
`
`15. Select For Removal; and
`
`16. End Grooming.
`
`GOOG-102’I-Page 2 of 34
`
`GOOG-1021-Page 2 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 3 of 34
`
`Please replace paragraph 0084 with the following:
`
`[0084] The following primitive mechanisms are described:
`
`1. Calculate True Name;
`
`2. Assimilate Data Item;
`
`3. M True File;
`
`4. Get True Name from Path;
`
`5. Link Path to True Name;
`
`6. Realize True File from Location;
`
`7. Locate Remote File;
`
`8. Make True File Local;
`
`9. Create Scratch File;
`
`10. Freeze Directory;
`
`11. Expand Frozen Directory;
`
`12. Delete True File;
`
`13. Process Audit File Entry;
`
`14. Begin Grooming;
`
`15. Select For Removal; and
`
`16. End Grooming.
`
`GOOG-102’I-Page 3 of 34
`
`GOOG-1021-Page 3 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 4 of 34
`
`Please replace the heading (on pg. 25) between
`
`paragraphs 00103-00104 with the following heading (the word
`
`“New” is inserted before the words “True File").
`
`3.
`
`New True File
`
`GOOG-1021-Page 4 of 34
`
`GOOG-1021-Page 4 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 5 of 34
`
`Please replace paragraph 00104 with the following:
`
`[00104]
`
`The Nfl True File process is invoked when processing the
`
`audit file 132, some time after a True File has been assimilated (using the
`
`Assimilate Data Item primitive mechanism). Given a local directory extensions
`
`table entry record 138 in the local directory extensions table 124, the 1m True
`
`File process can provide the following steps (with reference to FIG. 12),
`
`depending on how the local processor is configured:
`
`Please replace paragraph 00143 with the following:
`
`[00143]
`
`Determine the operation in the entry 142 currently being
`
`processed (Step S365). If the operation indicates that a file was created or written
`
`(Step S366), then assimilate the file using the Assimilate Data Item primitive
`
`mechanism (Step S368), use the 1m True File primitive mechanism to do
`
`additional desired processing (such as cache update, compression, and mirroring)
`
`(Step S369), and record the newly computed True Name for the file in the audit
`
`file record entry (Step S370).
`
`GOOG-1021-Page 5 of 34
`
`GOOG-1021-Page 5 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 6 of 34
`
`Please replace paragraph 00164 with the following:
`
`[00164]
`
`A.
`
`Identify the segmentg s) segmehtés) to be read by
`
`dividing the specified file offset and length each by the fixed size of a segment (a
`
`system dependent parameter), to determine the segment number and number of
`
`segments that must be read.
`
`Please replace paragraph 00276 with the following:
`
`[00276] The inventory can be used for archival of data (making it possible
`
`to avoid archiving data when [H] “Efren—that data is already on a separate volume),
`
`for grooming (making it possible to delete infrequently accessed files if they can
`
`be retrieved from removable volumes), for version control (making it possible to
`
`generate a new version of a CD-ROM Without having to copy the old version), and
`
`for other purposes.
`
`GOOG-1021-Page 6 of 34
`
`GOOG-1021-Page 6 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 7 of 34
`
`Please replace paragraph 00324 with the following:
`
`[00324]
`
`(A) Note every time a file is created or deleted, for
`
`instance by monitoring audit entries in the Process Audit File Entry primitive
`
`mechanism. When such an event is encountered, create an entry 148 in the
`
`accounting log 134 that shows Shows the responsible party and the identity of the
`
`file created or deleted.
`
`Please replace paragraph 00331 with the following:
`
`[00331] (B) Occasionally eeeasienal—l—y, compare the contents of each user
`
`processor against the license table 136. For each True Name in the license table do
`
`the following:
`
`GOOG-1021-Page 7 of 34
`
`GOOG-1021-Page 7 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 8 of 34
`
`Please replace paragraph 00336 with the following:
`
`[00336]
`
`Further, in operation of a DP system incorporating the present
`
`invention, multiple copies of data items are avoided (unless they are required for
`
`some reason such as backups or mirror copies in a fault-tolerant system). Multiple
`
`copies of data items are avoided even when multiple names refer to the same data
`
`item. The primitive mechanisms Assimilate Data Items and I‘M True File support
`
`this property. Using the Assimilate Data Item primitive mechanism, if a data item
`
`already exists in the system, as indicated by an entry in the True File registry 126,
`
`this existence will be discovered by this mechanism, and the duplicate data item
`
`(the new data item) will be eliminated (or not added). Thus, for example, if a data
`
`file is being copied onto a system from a floppy disk, if, based on the True Name
`
`of the data file, it is determined that the data file already exists in the system (by
`
`the same or some other name), then the duplicate copy will not be installed. If the
`
`data item was being installed on the system by some name other than its current
`
`name, then, using the Link Path to True Name primitive mechanism, the other (or
`
`new) name can be linked to the already existing data item.
`
`GOOG-1021-Page 8 of 34
`
`GOOG-1021-Page 8 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 9 of 34
`
`Please replace paragraph 00340 with the following:
`
`[00340]
`
`When a file is opened (using the open Qfl File operating
`
`system mechanism), it uses the Make True File Local primitive mechanism (either
`
`directly or indirectly through the Create Scratch File primitive mechanism) to
`
`create a local copy of the file. The Open File operating system mechanism uses the
`
`Make True File Local primitive mechanism, which uses the Realize True File
`
`from Location primitive mechanism, which, in turn uses the Request True File
`
`remote mechanism.
`
`Please replace paragraph 00365 with the following:
`
`[00365]
`
`In operation, the system automatically archives data items as
`
`they are created or modified. After a file is created or modified, the Close File
`
`operating system mechanism creates an audit file record, which is eventually
`
`processed by the Process Audit File Entry primitive mechanism. This mechanism
`
`uses the M True File primitive mechanism for any file which is newly created,
`
`which in turn uses the Mirror True File background mechanism if the True File is
`
`in a mirrored or archived region. This mechanism causes one or more copies of the
`
`new file to be made on remote processors.
`
`GOOG-1021-Page 9 of 34
`
`GOOG-1021-Page 9 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 10 of 34
`
`IN THE CLAIMS
`
`Please amend the claims as follows:
`
`1. (Currently amended) A computer-implemented content delivery method
`
`implemented at least in part by hardware in combination with software, the
`
`method comprising the steps of:
`
`(A)
`
`obtaining a list of identifiers, each of said identifiers on said list
`
`corresponding to at least one file of a plurality of data items, each of said
`
`identifiers on said list of identifiers being based, at least in part, on a given
`
`function of at least some of the data that comprise the contents of a corresponding
`
`one of the plurality of data items, wherein two identical data items of said plurality
`
`of data items have identical identifiers on the list“
`
`
`
`(E)
`
`responsive to a request fer a—fi-le, the request including at least a
`
`specific name for a particular [[the]] file, the specific name having been
`
`determined, at least in part, using th_e [[a]] given function of the data that
`
`comprises the contents of the particular file, by hardware in combination with
`
`software, ascertaining whether or not the specific name for the particular m
`
`corresponds to an identifier on said list of identifiers“, and,
`
`(Q)
`
`based at least in part on said ascertaining in (B ), selectively
`
`permitting eausing—a at least one copy of the particular file to be distributed across
`
`prefided—f—rem—a—gfien—ene ef the aplurality of computers in a network, wherein a
`
`copy of the particular file is not permitted to be distributed previded without
`
`authorization, as determined fenddwdeereiH the—request—fer—t—he—fi-le—is resolved
`
`_ 10 _
`
`GOOG-1021-Page 10 of 34
`
`GOOG-1021-Page 10 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 11 of 34
`
`based, at least in part, on whether or not the specific name for the particular file
`
`corresponds to an identifier on said list of identifiers a—measure—ef—avarlabr—l—Hyef—at
`
`least—eneef—t—heeempu-ters.
`
`2. (Currently amended) A computer-implemented method, in a system in
`
`which a plurality of files are distributed across a plurality of computers, wherein—at
`
`
`
`method implemented at least in part by hardware in combination with software,
`
`the method comprising the steps:
`
`(A)
`
`obtaining a specific name for a particular file, the specific name
`
`having been determined at least in part as a given function of at least some the data
`
`that comprises the contents of the particular file, wherein the contents of the
`
`particular file may represent a digital message, a portion of a digital message, a
`
`digital image,WM; a video signalw
`
`am [[0r]] an audio signalaflmrticmcfiww; and
`
`name, ascertaining, by hardware in combination with software, whether or not the
`
`specific name for the particular file corresponds to an identifier on a list of
`
`identifiers, said identifiers on said list of identifiers corresponding to a plurality of
`
`data items, each of said identifiers on said list of identifiers being based, at least in
`
`part, on the given function of the contents of a corresponding one of the plurality
`
`of data items wherein two identical data items have identical identifiers on the
`
`
`list“ and
`
`(Q)
`
`based at least in part on said ascertaining in 1B ), selectively allowing
`
`prefid-ing a copy of the particular file to be distributed to or provided from a—given
`
`ene at least one of the computers in said plurality of computers, wherein a copy of
`
`the requested file is not to be distributed or provided without authorization, and
`
`_ 11 _
`
`GOOG-1021-Page 11 of 34
`
`GOOG-1021-Page 11 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 12 of 34
`
`wherein the—request—fer—t—he—fi-le—is as determined resolved based, at least in part, on
`
`whether or not the specific name for the particular file corresponds to an identifier
`
`on said list of identifiers a—measureef—availabilH-yuef—at—least—eneeemputer—hawng
`
`a—eepyhef—t-he—requested—fi-le.
`
`3. (Currently amended) A computer-implemented method implemented at
`
`least in part by hardware in combination with software, the method comprising th_e
`
`steps:
`
`1A)
`
`obtaining a copy of at least one particular file;
`
`
`
`1B)
`
`for m at least one particular file in—t-he—set—ef—fi-les, by hardware in
`
`combination with software, determining a first content-dependent name for said at
`
`least one particular file, at least in part by applying a message digest function g
`
`hash function to at least some of the contents of the at least one particular file to
`
`determine obtain a said first content-dependent name T—FuaName for the at least
`
`one particular file;
`
`1C)
`
`
`ascertaining whether or not said first content-dependent name for the
`
`at least one particular file corresponds to an entry on a first list of identifiers, said
`
`identifiers on said list of identifiers corresponding to a plurality of data items, each
`
`identifier on said first list of identifiers being based, at least in part, on a first given
`
`function of the data that comprise the contents of a corresponding one of the
`
`plurality of data items ', and,
`
`1D)
`
`based at least in part on said ascertaining in 1C 2, in—respense—te—a
`
`reanestrthareaueanemdmg—afieastthgfimdakfile,
`
`selectively allowing eausing a copy of the particular file to be provided to or
`
`_ 12 _
`
`GOOG-1021-Page 12 of 34
`
`GOOG-1021-Page 12 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 13 of 34
`
`
`accessed from at least a—given one of the computers in a network of computers,
`
`wherein a copy of the file is not to be provided without authorization&
`
`determined, and—wherein—thereefuesefeefleeaeleaspmmkeed—basedTat
`
`
`least in part, based on a—measure—ef—avarlabilfifyhef—at—least—ene—ef—theeempefiers
`
`whether or not said first content-dependent name of the particular file corresponds
`
`to an entry on the first list of identifiers.
`
`4. (Currently amended) A computer-implemented content delivery method
`
`implemented at least in part by hardware in combination with software, the
`
`method comprising the steps of:
`
`1A)
`
`obtaining a copy of a particular file;
`
`
`
`1B)
`
`by hardware in combination with software, determining a first
`
`content-dependent digital identifier for th_e [[a]] particular file, determining—a T—Fue
`
`Name said determining using at least a m given function of the data, wherein the
`
`data used by the first given function to determine the first content-dependent
`
`digital identifier for the particular file name comprises at least some of the
`
`contents of the particular file;
`
`
`
`(Q)
`
`responsive—te—t-he—request; selectively allowing eeus—ing the particular
`
`file to be provided to or accessed from at least one computer ef—theseifléers of a
`
`[[the]] network of computers, wherein a copy of the file is not allowed to be
`
`provided without authorization, and—wherein—fliereefuest—fer—fleefileis g resolved,
`
`based, at least in part, on a—measu-reef—availabilH-yuef—at—least—eneef—theeemputers
`
`haJeLing—a—eepyhef—t-he—fi-le whether or not said first content-dependent digital
`
`_ 13 _
`
`GOOG-1021-Page 13 of 34
`
`GOOG-1021-Page 13 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 14 of 34
`
`identifier for the particular file corresponds to an entry in a database, said database
`
`comprising a first plurality of identifiers, each of said identifiers in said first
`
`plurality of identifiers being based, at least in part, on a function of the data that
`
`comprise the contents of a corresponding one of a plurality of data items, and
`
`wherein the first given function used to determine the content-dependent digital
`
`identifier of the specific file is the same as the function used to determine the first
`
`plurality of identifiers in the database.
`
`5. (Currently amended) A computer-implemented content delivery method
`
`implemented at least in part by hardware in combination with software, the
`
`method comprising the steps:
`
`(A)
`
`selectively permitting distribution of distni-bn-ting a set of files across
`
`a network of sewerwadieienianleasnseineef—the—seneis—eempnsen—peeHe—peei
`
`netweile; by, for at least one particular file in said set of files:
`
`(fl)
`
`obtaining the [[for a]] particular file, said particular file
`
`comprising data representing a digital message, or a portion of a digital
`
`message, or a digital image, or a portion of a digital image, or a video
`
`signal, or a portion of a video signal, or an audio signal, or a portion of an
`
`audio signal, or a software product, or a portion of a software product, the
`
`particular file having [[21]] at least one contextual name specifying at least
`
`one location in—t-hanetweik at which the file may be located, [[,]]
`
`ga2)
`
`by hardware in combination with software, determining
`
`another name for the particular file, the other name ineluding comprising a
`
`Tine—Name content-dependent digital identifier for the particular file which
`
`was determined using a message digest function or a hash function of some
`
`data, where the some data used by the given function to determine the
`
`_ 14 _
`
`GOOG-1021-Page 14 of 34
`
`GOOG-1021-Page 14 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 15 of 34
`
`
`content-dependent digital identifier for the particular file comprises at least
`
`some of the contents of the particular file;
`
`|..
`
`3|
`
`'I3i|,|
`
`'Il'
`
`least—theiPFue—N-ame—ef—the—paitieuiakfilefand
`
`@Liespensivate—t-hareefuest; ascertaining whether or not the
`
`content-dependent digital identifier for the particular file corresponds to one
`
`of a plurality of identifiers, said identifiers on said list of identifiers
`
`corresponding to a plurality of data items, each identifier of said plurality of
`
`identifiers being based, at least in part, on a given function of the data that
`
`comprise the contents of a corresponding one of the plurality of data items;
`
`and,
`
`1a4)
`
`based at least in part on said ascertaining in 1a3 2, selectively
`
`permitting providing o_f a copy of the particular file to be provided or
`
`accessed from at least one of the servers of the network of servers, said
`
`permitting providing being based at least in part on the content-dependent
`
`digital identifier True—Name of the particular file, and wherein a copy of the
`
`particular file is not allowed to be provided or accessed without
`
`having—a—eepyef—t—he—requested—fi-le whether or not the content-dependent
`
`digital identifier of the particular file corresponds to one of the plurality of
`
`identifiers.
`
`6. (Currently amended) A computer-implemented method implemented at
`
`least in part by hardware in combination with software, the method comprising th_e
`
`steps:
`
`_ 15 _
`
`GOOG-1021-Page 15 of 34
`
`GOOG-1021-Page 15 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 16 of 34
`
`(A)
`
`obtaining a content-based name for a file, said content-based name
`
`having been determined at least in part by applying a message digest function or
`
`hash function to at least a portion of the contents of th_e [[an]] file to determine
`
`
`said content-based name for said file said file containing data representing a
`
`digital image, or a portion of a digital image, or a video signal, or a portion of a
`
`video signal, or an audio signal, or a portion of an audio signal, or a software
`
`product, or a portion of a software product te—ebtain—a T—FuaN-amefer—thafile; Q
`
`B)
`
`selectively permitting distributing copies of the file from—first
`
`server—across a network of servers-distinet—frem—the—first—sewerfwdaerein—at—least
`
`(b_1)
`
`by hardware in combination with software, ascertaining
`
`whether or not the content-based name of the file corresponds to an entry
`
`on a list of identifiers said identifiers on said list of identifiers
`
`corresponding to a plurality of data items, each of said identifiers on said
`
`list of identifiers being based, at least in part, on a given function of the
`
`data that comprise the contents of a corresponding one of the plurality of
`
`data items ebWWweauesfinehmg—afieafi—the
`
`jErae—1>J-a~1=ne—of—t-lcie—fi-le; and responsive—te—t-he—request;
`
`1b2)
`
`based at least in part on said ascertaining in {bl ), selectively
`
`permitting distribution of copies of the file across the network of computers
`
`
`
`net-werleef—sewers, wherein a copy of the file is not to be provided without
`
`authorization, as determined anddwherein—the—request—fer—the—fi-le—is—resel-ved
`
`based, at least in part, on a—measu-raef—avaa—labfl-Hyef—at—least—eneef—the
`
`sewers—hawéng—a—eepyef—t—he—fi-le whether or not said content-based name of
`
`the file corresponds to an entry on said list of identifiers.
`
`_ 16 _
`
`GOOG-1021-Page 16 of 34
`
`GOOG-1021-Page 16 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 17 of 34
`
`7 — 8. (canceled)
`
`9.
`
`(Currently amended) A computer-implemented method implemented
`
`at least in part by hardware in combination with software, the method comprising
`
`the steps:
`
`(A)
`
`selectively distributing a set of files from a first computer across a
`
`network of computers, wherein—afleast—semeef—theeemputers—eemprisea—peekte—
`
`peer—netwerle; by, for each particular file in said set of files:
`
`(Q)
`
`by hardware in combination with software, determining in
`
`,,.|’|.|
`
`iliil'llat
`
`least—a one or more content-dependent digital identifiers for said particular
`
`file, each said content-dependent digital identifier being based on at least
`
`some of name determined—as—wfbmetim the contents of the particular file,
`
`[1,11%
`
`(a)
`
`
`selectively permitting eaus—ing the particular file to be made
`
`available for access and to be provided to or accessed from at least some a
`
`given—eneof the computers in the network of computers, wherein a—eepyfi
`
`
`
`the file1s not t—obe made available for access or provided without
`
`authorization, and—wherem—t—hereefuest—fer—t-hefi-leis_as resolved based, at
`
`least in part, on whether or not at least one of said one or more content-
`
`dependent digital identifiers for said particular file corresponds to an entry
`
`in one or more databases,
`
`
`
`GOOG-1021-Page 17 of 34
`
`GOOG-1021-Page 17 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 18 of 34
`
`each of said one or more databases comprising a plurality of
`
`identifiers, each of said identifiers in each said database corresponding to at
`
`least one data item of a plurality of data items, and each of said identifiers
`
`in each said database being based, at least in part, on at least some of the
`
`data in a corresponding data item.
`
`10 - 13. (Canceled)
`
`14.
`
`(Currently amended) A method as in claim 2, further comprising:
`
`maintaining accounting information relating to at least some files in the
`
`system; and
`
`using the accounting information as a basis for charges based on an identity
`
`of the at least some files.
`
`15.
`
`(Previously presented) A method as in claim 9, further comprising:
`
`maintaining accounting information relating to at least some of said files;
`
`and
`
`using the accounting information as a basis for a system in which charges
`
`are based on an identity of the files.
`
`16.
`
`(Original) A method as in claim 15 , wherein the maintaining of
`
`accounting information includes at least some of activities selected from:
`
`(a)
`
`(b)
`
`tracking which files have been stored on a computer; and
`
`tracking which files have been transmitted from a computer.
`
`_ 18 _
`
`GOOG-1021-Page 18 of 34
`
`GOOG-1021-Page 18 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 19 of 34
`
`17.
`
`(Currently amended) A computer-implemented method implemented
`
`at least in part by hardware in combination with software, the method comprising
`
`the steps:
`
`1A)
`
`obtaining a reguest to distribute a particular file eausing—a—set—ef—fi-les
`
`te—bed—istnibn-ted—frein—a—fi-rst—eenapn-ter across a network of computers distinet—frene
`
`
`
`(E)
`
`in response to th_e [[a]] request fer—a—f—i—le, by hardware in
`
`combination with software, obtaining a substantially unigue identifier thereefuest
`
`for the particular file, said substantially unigue identifier being ineludes—at—least—a
`
`name determined as based at least in part on a function of at least some of the
`
`contents of the particular file[[,]] ', and
`
`1C)
`
`ascertaining whether or not the substantially unigue identifier of the
`
`particular file corresponds to an entry on a list of identifiers, each of said
`
`identifiers on said list of identifiers being based, at least in part, on a given
`
`function of the data that comprise the contents of a corresponding one of a
`
`plurality of files, wherein the given function used to determine identifiers on the
`
`list is the same as the function that was used to determine the substantially unigue
`
`identifier of the particular file; and,
`
`1D)
`
`based at least in part on said ascertaining in 1C 2, selectively allowing
`
`eausing the particular file to be distributed across pfevided—frenq—a—given at least
`
`some one of the computers in the network of computers, wherein a copy of the file
`
`is not allowed to be distributed previded without authorization, and wherein the
`
`request to distribute fenthe particular file across the network of computers is
`
`_ 19 _
`
`GOOG-1021-Page 19 of 34
`
`GOOG-1021-Page 19 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 20 of 34
`
`resolved based, at least in part, on whether or not the substantially unique
`
`identifier of the file corresponds to an entry on the list of identifiers; and a
`
`
`
`1E)
`
`collecting information regarding the particular file.
`
`18.
`
`(Currently amended) A method as in claim 17, further comprising:
`
`using the aeeeunting information collected as a basis for a system in which
`
`charges are based on an identity of the data files.
`
`19.
`
`
`(Currently amended) A method as in claim 1_7 [[18]], further
`
`comprising the step of:
`
`maintaining accounting information relating to at least some files,
`
`wherein the maintaining of accounting information includes at least some
`
`of activities selected from:
`
`(a)
`
`(b)
`
`tracking which files have been stored on a computer; and
`
`tracking which files have been transmitted from a computer.
`
`20.
`
`(Currently amended) A computer-implemented method, operable in
`
`a data processing system and implemented at least in part by hardware in
`
`combination with software, the method comprising:
`
`(A)
`
`in response to a reguest to allow distribution of a particular file
`
`
`
`_ 20 _
`
`GOOG-1021-Page 20 of 34
`
`GOOG-1021-Page 20 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 21 of 34
`
`peer—te—peer—netwerk by hardware in combination with software, ascertaining
`
`whether or not a content-dependent particular name of the particular file
`
`corresponds to an entry in a database, said database comprising a plurality of
`
`identifiers, each of said identifiers having been determined based, at least in part,
`
`on the data that comprise the contents of a corresponding one of a plurality of
`
`files, and said content-dependent name for the particular file being based, at least
`
`in part, on the contents of the particular file; M
`
`B)
`
`based at least in part on said ascertaining in 1A), selectively
`
`permitting the particular file to be distributed to computers in the network of
`
`computers; and
`
`1C)
`
`collecting and maintaining aeeeun-t—i—ng information relating toE
`
`particular file—files—in—thasystemTwherein-theanaintaining—ef—aeeeu-nting
`
`information collected includes at least w some of information aeH-vi-t-ies selected
`
`
`
`1a) information about the content of the particular data item, 1b) information
`
`about an owner of the particular data item, 1c) information about a type of the
`
`particular data item, 1d) information about a contextual name of the particular data
`
`item, 1e) information about whether or not the particular data item was copied, 1f}
`
`the content-based name of the particular data item, 1g) information about an
`
`identity of a reguestor, 1h) a timestamp,‘, 1i) information about whether or not the
`
`particular data item was created, and gj) information about whether or not the
`
`particular data item was read
`
`
`
`GOOG-1021-Page 21 of 34
`
`GOOG-1021-Page 21 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 22 of 34
`
`
`
`21. (Original) A method as in claim 20, wherein some of the computers
`
`communicate with each other using a TCP/IP communication protocol.
`
`
`22. (Currently amended) A method as in claim 1 anyone-ef—elaims—l—é—er
`
`elaim—9—er—elaim—l—7—er—elaimé19, wherein a copy of the rectuested particular file is
`
`not permitted to be distributed on behalf of prefided—te unlicensed parties or [[to]]
`
`unauthorized parties.
`
`
`23. (Currently amended) A method as in claim 1 anyone-efielaims—l—te—é—er
`
`9, wherein distribution of an unauthorized copy of a file is not allowed te—be
`
`prefided—fiem—ene—ef—the—eemputers.
`
`
`24. (Currently amended) A method as in anyone-ef—elaims—l—and claim 2
`
`[[t06]],~-“- .=--‘-== ==‘.:- -.=..: =
`
`-
`
`-;
`
`.
`
`---
`
`-
`
`further comprising:
`
`main-ta-mi-Hg—aeeeu-n-t-i-ng collecting information relating to the particular file
`
`
`
`-22-
`
`GOOG-1021-Page 22 of 34
`
`GOOG-1021-Page 22 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 23 of 34
`
`25. (Currently amended) The method of claim 1 [[23]] wherein distribution
`
`o_f an unlicensed copy of a file is not allowed to—be—prefided—fiem—ene—ef—t—he
`
`computers.
`
`26. (Canceled)
`
`27. (New) The method as in any one of claims 1-6, 9, 17, and 20, wherein
`
`the hardware comprises a processor and memory.
`
`28. (New) The method as in any one of claims 1-6, 9, 17, and 20, wherein
`
`the hardware comprises a computer.
`
`29. (New) The method as in any one of claims 1, 2, 6, and 17 wherein the
`
`list of identifiers is in a table comprising said list.
`
`30. (New) The method as in any one of claims 1, 2, 6, and 17 wherein the
`
`list of identifiers is in a database comprising said list.
`
`31. (New) The method of claim 30 wherein said database maps each said
`
`identifier in said database to information relating to a corresponding data item.
`
`32. (New) The method of claim 1 wherein the specific name for the
`
`particular file corresponds to an identifier on the list of identifiers when the
`
`specific name for the particular file matches the identifier on the list of identifiers.
`
`_ 23 _
`
`GOOG-1021-Page 23 of 34
`
`GOOG-1021-Page 23 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 24 of 34
`
`33. (New) A method as recited in claim 1 wherein the specific name of the
`
`particular file is based, at least in part, on a function of all of the data which
`
`comprise the contents of the particular file.
`
`34. (New) A method as recited in claim 23 further comprising:
`
`permitting at least one copy of the particular file to be distributed across the
`
`plurality of computers in a network when it is not determined that the particular
`
`file is unauthorized.
`
`35. (New) The method of claim 1 further comprising:
`
`denying permission for the particular file to be distributed across the
`
`plurality of computers in a network when it is determined that access to the
`
`particular file is not authorized.
`
`36. (New) The method of claim 1 further comprising:
`
`maintaining the list of identifiers.
`
`37. (New) The method of claim 36 wherein said maintaining the list of
`
`identifiers comprises:
`
`adding new identifiers to said list of identifiers.
`
`38. (New) The method of claim 2 wherein the specific name for the
`
`particular file is based, at least in part, on a size or length of the particular file.
`
`39. (New) The method of claim 2 wherein the specific name for the
`
`particular file comprises a digital fingerprint of the particular file.
`
`_ 24 _
`
`GOOG-1021-Page 24 of 34
`
`GOOG-1021-Page 24 of 34
`
`

`

`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 25 of 34
`
`40. (New) The method of claim 2 wherein the specific name for the
`
`particular fil

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket