`
`In re PATENT APPLICATION OF:
`
`Attorney Docket:
`
`2618-001 1
`
`David A. FARBER et al.
`
`Group Art Unit:
`
`2166
`
`Application Serial No.: 11/017,650
`
`Examiner: PHAM, Khanh P.
`
`Application Filing Date: 12/22/2004
`
`Confirmation No.:
`
`3082
`
`Title: Content Delivery Network and
`Date: April 20, 2010
`Associated Methods and Mechanisms
`
`
`
`SUPPLEMENTAL AMENDMENT
`
`via EFS- Web
`
`Hon. Commissioner of Patents
`
`PO. Box 1450
`
`Alexandria, VA 22313-1450
`
`Sir:
`
`Please amend this application as follows:
`
`Amendments to the Specification begin on page 2 hereof.
`
`Amendments to the Claims are reflected in the listing of claims which
`
`begins on page 10.
`
`Remarks begin on page 32.
`
`An Information Disclosure Statement (IDS) is being filed herewith.
`
`GOOG-‘IOZ’I-Page 1 of 34
`
`GOOG-1021-Page 1 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 2 of 34
`
`IN THE SPECIFICATION
`
`Please amend the specification as follows:
`
`Please replace paragraph 0056 with the following:
`
`[0056]
`
`Primitive mechanisms provide fundamental capabilities used
`
`to support other mechanisms. The following primitive mechanisms are described:
`
`1. Calculate True Name;
`
`2. Assimilate Data Item;
`
`3. M True File;
`
`4. Get True Name from Path;
`
`5. Link path to True Name;
`
`6. Realize True File from Location;
`
`7. Locate Remote File;
`
`8. Make True File Local;
`
`9. Create Scratch File;
`
`10. Freeze Directory;
`
`11. Expand Frozen Directory;
`
`12. Delete True File;
`
`13. Process Audit File Entry;
`
`14. Begin Grooming;
`
`15. Select For Removal; and
`
`16. End Grooming.
`
`GOOG-102’I-Page 2 of 34
`
`GOOG-1021-Page 2 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 3 of 34
`
`Please replace paragraph 0084 with the following:
`
`[0084] The following primitive mechanisms are described:
`
`1. Calculate True Name;
`
`2. Assimilate Data Item;
`
`3. M True File;
`
`4. Get True Name from Path;
`
`5. Link Path to True Name;
`
`6. Realize True File from Location;
`
`7. Locate Remote File;
`
`8. Make True File Local;
`
`9. Create Scratch File;
`
`10. Freeze Directory;
`
`11. Expand Frozen Directory;
`
`12. Delete True File;
`
`13. Process Audit File Entry;
`
`14. Begin Grooming;
`
`15. Select For Removal; and
`
`16. End Grooming.
`
`GOOG-102’I-Page 3 of 34
`
`GOOG-1021-Page 3 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 4 of 34
`
`Please replace the heading (on pg. 25) between
`
`paragraphs 00103-00104 with the following heading (the word
`
`“New” is inserted before the words “True File").
`
`3.
`
`New True File
`
`GOOG-1021-Page 4 of 34
`
`GOOG-1021-Page 4 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 5 of 34
`
`Please replace paragraph 00104 with the following:
`
`[00104]
`
`The Nfl True File process is invoked when processing the
`
`audit file 132, some time after a True File has been assimilated (using the
`
`Assimilate Data Item primitive mechanism). Given a local directory extensions
`
`table entry record 138 in the local directory extensions table 124, the 1m True
`
`File process can provide the following steps (with reference to FIG. 12),
`
`depending on how the local processor is configured:
`
`Please replace paragraph 00143 with the following:
`
`[00143]
`
`Determine the operation in the entry 142 currently being
`
`processed (Step S365). If the operation indicates that a file was created or written
`
`(Step S366), then assimilate the file using the Assimilate Data Item primitive
`
`mechanism (Step S368), use the 1m True File primitive mechanism to do
`
`additional desired processing (such as cache update, compression, and mirroring)
`
`(Step S369), and record the newly computed True Name for the file in the audit
`
`file record entry (Step S370).
`
`GOOG-1021-Page 5 of 34
`
`GOOG-1021-Page 5 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 6 of 34
`
`Please replace paragraph 00164 with the following:
`
`[00164]
`
`A.
`
`Identify the segmentg s) segmehtés) to be read by
`
`dividing the specified file offset and length each by the fixed size of a segment (a
`
`system dependent parameter), to determine the segment number and number of
`
`segments that must be read.
`
`Please replace paragraph 00276 with the following:
`
`[00276] The inventory can be used for archival of data (making it possible
`
`to avoid archiving data when [H] “Efren—that data is already on a separate volume),
`
`for grooming (making it possible to delete infrequently accessed files if they can
`
`be retrieved from removable volumes), for version control (making it possible to
`
`generate a new version of a CD-ROM Without having to copy the old version), and
`
`for other purposes.
`
`GOOG-1021-Page 6 of 34
`
`GOOG-1021-Page 6 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 7 of 34
`
`Please replace paragraph 00324 with the following:
`
`[00324]
`
`(A) Note every time a file is created or deleted, for
`
`instance by monitoring audit entries in the Process Audit File Entry primitive
`
`mechanism. When such an event is encountered, create an entry 148 in the
`
`accounting log 134 that shows Shows the responsible party and the identity of the
`
`file created or deleted.
`
`Please replace paragraph 00331 with the following:
`
`[00331] (B) Occasionally eeeasienal—l—y, compare the contents of each user
`
`processor against the license table 136. For each True Name in the license table do
`
`the following:
`
`GOOG-1021-Page 7 of 34
`
`GOOG-1021-Page 7 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 8 of 34
`
`Please replace paragraph 00336 with the following:
`
`[00336]
`
`Further, in operation of a DP system incorporating the present
`
`invention, multiple copies of data items are avoided (unless they are required for
`
`some reason such as backups or mirror copies in a fault-tolerant system). Multiple
`
`copies of data items are avoided even when multiple names refer to the same data
`
`item. The primitive mechanisms Assimilate Data Items and I‘M True File support
`
`this property. Using the Assimilate Data Item primitive mechanism, if a data item
`
`already exists in the system, as indicated by an entry in the True File registry 126,
`
`this existence will be discovered by this mechanism, and the duplicate data item
`
`(the new data item) will be eliminated (or not added). Thus, for example, if a data
`
`file is being copied onto a system from a floppy disk, if, based on the True Name
`
`of the data file, it is determined that the data file already exists in the system (by
`
`the same or some other name), then the duplicate copy will not be installed. If the
`
`data item was being installed on the system by some name other than its current
`
`name, then, using the Link Path to True Name primitive mechanism, the other (or
`
`new) name can be linked to the already existing data item.
`
`GOOG-1021-Page 8 of 34
`
`GOOG-1021-Page 8 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 9 of 34
`
`Please replace paragraph 00340 with the following:
`
`[00340]
`
`When a file is opened (using the open Qfl File operating
`
`system mechanism), it uses the Make True File Local primitive mechanism (either
`
`directly or indirectly through the Create Scratch File primitive mechanism) to
`
`create a local copy of the file. The Open File operating system mechanism uses the
`
`Make True File Local primitive mechanism, which uses the Realize True File
`
`from Location primitive mechanism, which, in turn uses the Request True File
`
`remote mechanism.
`
`Please replace paragraph 00365 with the following:
`
`[00365]
`
`In operation, the system automatically archives data items as
`
`they are created or modified. After a file is created or modified, the Close File
`
`operating system mechanism creates an audit file record, which is eventually
`
`processed by the Process Audit File Entry primitive mechanism. This mechanism
`
`uses the M True File primitive mechanism for any file which is newly created,
`
`which in turn uses the Mirror True File background mechanism if the True File is
`
`in a mirrored or archived region. This mechanism causes one or more copies of the
`
`new file to be made on remote processors.
`
`GOOG-1021-Page 9 of 34
`
`GOOG-1021-Page 9 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 10 of 34
`
`IN THE CLAIMS
`
`Please amend the claims as follows:
`
`1. (Currently amended) A computer-implemented content delivery method
`
`implemented at least in part by hardware in combination with software, the
`
`method comprising the steps of:
`
`(A)
`
`obtaining a list of identifiers, each of said identifiers on said list
`
`corresponding to at least one file of a plurality of data items, each of said
`
`identifiers on said list of identifiers being based, at least in part, on a given
`
`function of at least some of the data that comprise the contents of a corresponding
`
`one of the plurality of data items, wherein two identical data items of said plurality
`
`of data items have identical identifiers on the list“
`
`
`
`(E)
`
`responsive to a request fer a—fi-le, the request including at least a
`
`specific name for a particular [[the]] file, the specific name having been
`
`determined, at least in part, using th_e [[a]] given function of the data that
`
`comprises the contents of the particular file, by hardware in combination with
`
`software, ascertaining whether or not the specific name for the particular m
`
`corresponds to an identifier on said list of identifiers“, and,
`
`(Q)
`
`based at least in part on said ascertaining in (B ), selectively
`
`permitting eausing—a at least one copy of the particular file to be distributed across
`
`prefided—f—rem—a—gfien—ene ef the aplurality of computers in a network, wherein a
`
`copy of the particular file is not permitted to be distributed previded without
`
`authorization, as determined fenddwdeereiH the—request—fer—t—he—fi-le—is resolved
`
`_ 10 _
`
`GOOG-1021-Page 10 of 34
`
`GOOG-1021-Page 10 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 11 of 34
`
`based, at least in part, on whether or not the specific name for the particular file
`
`corresponds to an identifier on said list of identifiers a—measure—ef—avarlabr—l—Hyef—at
`
`least—eneef—t—heeempu-ters.
`
`2. (Currently amended) A computer-implemented method, in a system in
`
`which a plurality of files are distributed across a plurality of computers, wherein—at
`
`
`
`method implemented at least in part by hardware in combination with software,
`
`the method comprising the steps:
`
`(A)
`
`obtaining a specific name for a particular file, the specific name
`
`having been determined at least in part as a given function of at least some the data
`
`that comprises the contents of the particular file, wherein the contents of the
`
`particular file may represent a digital message, a portion of a digital message, a
`
`digital image,WM; a video signalw
`
`am [[0r]] an audio signalaflmrticmcfiww; and
`
`name, ascertaining, by hardware in combination with software, whether or not the
`
`specific name for the particular file corresponds to an identifier on a list of
`
`identifiers, said identifiers on said list of identifiers corresponding to a plurality of
`
`data items, each of said identifiers on said list of identifiers being based, at least in
`
`part, on the given function of the contents of a corresponding one of the plurality
`
`of data items wherein two identical data items have identical identifiers on the
`
`
`list“ and
`
`(Q)
`
`based at least in part on said ascertaining in 1B ), selectively allowing
`
`prefid-ing a copy of the particular file to be distributed to or provided from a—given
`
`ene at least one of the computers in said plurality of computers, wherein a copy of
`
`the requested file is not to be distributed or provided without authorization, and
`
`_ 11 _
`
`GOOG-1021-Page 11 of 34
`
`GOOG-1021-Page 11 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 12 of 34
`
`wherein the—request—fer—t—he—fi-le—is as determined resolved based, at least in part, on
`
`whether or not the specific name for the particular file corresponds to an identifier
`
`on said list of identifiers a—measureef—availabilH-yuef—at—least—eneeemputer—hawng
`
`a—eepyhef—t-he—requested—fi-le.
`
`3. (Currently amended) A computer-implemented method implemented at
`
`least in part by hardware in combination with software, the method comprising th_e
`
`steps:
`
`1A)
`
`obtaining a copy of at least one particular file;
`
`
`
`1B)
`
`for m at least one particular file in—t-he—set—ef—fi-les, by hardware in
`
`combination with software, determining a first content-dependent name for said at
`
`least one particular file, at least in part by applying a message digest function g
`
`hash function to at least some of the contents of the at least one particular file to
`
`determine obtain a said first content-dependent name T—FuaName for the at least
`
`one particular file;
`
`1C)
`
`
`ascertaining whether or not said first content-dependent name for the
`
`at least one particular file corresponds to an entry on a first list of identifiers, said
`
`identifiers on said list of identifiers corresponding to a plurality of data items, each
`
`identifier on said first list of identifiers being based, at least in part, on a first given
`
`function of the data that comprise the contents of a corresponding one of the
`
`plurality of data items ', and,
`
`1D)
`
`based at least in part on said ascertaining in 1C 2, in—respense—te—a
`
`reanestrthareaueanemdmg—afieastthgfimdakfile,
`
`selectively allowing eausing a copy of the particular file to be provided to or
`
`_ 12 _
`
`GOOG-1021-Page 12 of 34
`
`GOOG-1021-Page 12 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 13 of 34
`
`
`accessed from at least a—given one of the computers in a network of computers,
`
`wherein a copy of the file is not to be provided without authorization&
`
`determined, and—wherein—thereefuesefeefleeaeleaspmmkeed—basedTat
`
`
`least in part, based on a—measure—ef—avarlabilfifyhef—at—least—ene—ef—theeempefiers
`
`whether or not said first content-dependent name of the particular file corresponds
`
`to an entry on the first list of identifiers.
`
`4. (Currently amended) A computer-implemented content delivery method
`
`implemented at least in part by hardware in combination with software, the
`
`method comprising the steps of:
`
`1A)
`
`obtaining a copy of a particular file;
`
`
`
`1B)
`
`by hardware in combination with software, determining a first
`
`content-dependent digital identifier for th_e [[a]] particular file, determining—a T—Fue
`
`Name said determining using at least a m given function of the data, wherein the
`
`data used by the first given function to determine the first content-dependent
`
`digital identifier for the particular file name comprises at least some of the
`
`contents of the particular file;
`
`
`
`(Q)
`
`responsive—te—t-he—request; selectively allowing eeus—ing the particular
`
`file to be provided to or accessed from at least one computer ef—theseifléers of a
`
`[[the]] network of computers, wherein a copy of the file is not allowed to be
`
`provided without authorization, and—wherein—fliereefuest—fer—fleefileis g resolved,
`
`based, at least in part, on a—measu-reef—availabilH-yuef—at—least—eneef—theeemputers
`
`haJeLing—a—eepyhef—t-he—fi-le whether or not said first content-dependent digital
`
`_ 13 _
`
`GOOG-1021-Page 13 of 34
`
`GOOG-1021-Page 13 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 14 of 34
`
`identifier for the particular file corresponds to an entry in a database, said database
`
`comprising a first plurality of identifiers, each of said identifiers in said first
`
`plurality of identifiers being based, at least in part, on a function of the data that
`
`comprise the contents of a corresponding one of a plurality of data items, and
`
`wherein the first given function used to determine the content-dependent digital
`
`identifier of the specific file is the same as the function used to determine the first
`
`plurality of identifiers in the database.
`
`5. (Currently amended) A computer-implemented content delivery method
`
`implemented at least in part by hardware in combination with software, the
`
`method comprising the steps:
`
`(A)
`
`selectively permitting distribution of distni-bn-ting a set of files across
`
`a network of sewerwadieienianleasnseineef—the—seneis—eempnsen—peeHe—peei
`
`netweile; by, for at least one particular file in said set of files:
`
`(fl)
`
`obtaining the [[for a]] particular file, said particular file
`
`comprising data representing a digital message, or a portion of a digital
`
`message, or a digital image, or a portion of a digital image, or a video
`
`signal, or a portion of a video signal, or an audio signal, or a portion of an
`
`audio signal, or a software product, or a portion of a software product, the
`
`particular file having [[21]] at least one contextual name specifying at least
`
`one location in—t-hanetweik at which the file may be located, [[,]]
`
`ga2)
`
`by hardware in combination with software, determining
`
`another name for the particular file, the other name ineluding comprising a
`
`Tine—Name content-dependent digital identifier for the particular file which
`
`was determined using a message digest function or a hash function of some
`
`data, where the some data used by the given function to determine the
`
`_ 14 _
`
`GOOG-1021-Page 14 of 34
`
`GOOG-1021-Page 14 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 15 of 34
`
`
`content-dependent digital identifier for the particular file comprises at least
`
`some of the contents of the particular file;
`
`|..
`
`3|
`
`'I3i|,|
`
`'Il'
`
`least—theiPFue—N-ame—ef—the—paitieuiakfilefand
`
`@Liespensivate—t-hareefuest; ascertaining whether or not the
`
`content-dependent digital identifier for the particular file corresponds to one
`
`of a plurality of identifiers, said identifiers on said list of identifiers
`
`corresponding to a plurality of data items, each identifier of said plurality of
`
`identifiers being based, at least in part, on a given function of the data that
`
`comprise the contents of a corresponding one of the plurality of data items;
`
`and,
`
`1a4)
`
`based at least in part on said ascertaining in 1a3 2, selectively
`
`permitting providing o_f a copy of the particular file to be provided or
`
`accessed from at least one of the servers of the network of servers, said
`
`permitting providing being based at least in part on the content-dependent
`
`digital identifier True—Name of the particular file, and wherein a copy of the
`
`particular file is not allowed to be provided or accessed without
`
`having—a—eepyef—t—he—requested—fi-le whether or not the content-dependent
`
`digital identifier of the particular file corresponds to one of the plurality of
`
`identifiers.
`
`6. (Currently amended) A computer-implemented method implemented at
`
`least in part by hardware in combination with software, the method comprising th_e
`
`steps:
`
`_ 15 _
`
`GOOG-1021-Page 15 of 34
`
`GOOG-1021-Page 15 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 16 of 34
`
`(A)
`
`obtaining a content-based name for a file, said content-based name
`
`having been determined at least in part by applying a message digest function or
`
`hash function to at least a portion of the contents of th_e [[an]] file to determine
`
`
`said content-based name for said file said file containing data representing a
`
`digital image, or a portion of a digital image, or a video signal, or a portion of a
`
`video signal, or an audio signal, or a portion of an audio signal, or a software
`
`product, or a portion of a software product te—ebtain—a T—FuaN-amefer—thafile; Q
`
`B)
`
`selectively permitting distributing copies of the file from—first
`
`server—across a network of servers-distinet—frem—the—first—sewerfwdaerein—at—least
`
`(b_1)
`
`by hardware in combination with software, ascertaining
`
`whether or not the content-based name of the file corresponds to an entry
`
`on a list of identifiers said identifiers on said list of identifiers
`
`corresponding to a plurality of data items, each of said identifiers on said
`
`list of identifiers being based, at least in part, on a given function of the
`
`data that comprise the contents of a corresponding one of the plurality of
`
`data items ebWWweauesfinehmg—afieafi—the
`
`jErae—1>J-a~1=ne—of—t-lcie—fi-le; and responsive—te—t-he—request;
`
`1b2)
`
`based at least in part on said ascertaining in {bl ), selectively
`
`permitting distribution of copies of the file across the network of computers
`
`
`
`net-werleef—sewers, wherein a copy of the file is not to be provided without
`
`authorization, as determined anddwherein—the—request—fer—the—fi-le—is—resel-ved
`
`based, at least in part, on a—measu-raef—avaa—labfl-Hyef—at—least—eneef—the
`
`sewers—hawéng—a—eepyef—t—he—fi-le whether or not said content-based name of
`
`the file corresponds to an entry on said list of identifiers.
`
`_ 16 _
`
`GOOG-1021-Page 16 of 34
`
`GOOG-1021-Page 16 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 17 of 34
`
`7 — 8. (canceled)
`
`9.
`
`(Currently amended) A computer-implemented method implemented
`
`at least in part by hardware in combination with software, the method comprising
`
`the steps:
`
`(A)
`
`selectively distributing a set of files from a first computer across a
`
`network of computers, wherein—afleast—semeef—theeemputers—eemprisea—peekte—
`
`peer—netwerle; by, for each particular file in said set of files:
`
`(Q)
`
`by hardware in combination with software, determining in
`
`,,.|’|.|
`
`iliil'llat
`
`least—a one or more content-dependent digital identifiers for said particular
`
`file, each said content-dependent digital identifier being based on at least
`
`some of name determined—as—wfbmetim the contents of the particular file,
`
`[1,11%
`
`(a)
`
`
`selectively permitting eaus—ing the particular file to be made
`
`available for access and to be provided to or accessed from at least some a
`
`given—eneof the computers in the network of computers, wherein a—eepyfi
`
`
`
`the file1s not t—obe made available for access or provided without
`
`authorization, and—wherem—t—hereefuest—fer—t-hefi-leis_as resolved based, at
`
`least in part, on whether or not at least one of said one or more content-
`
`dependent digital identifiers for said particular file corresponds to an entry
`
`in one or more databases,
`
`
`
`GOOG-1021-Page 17 of 34
`
`GOOG-1021-Page 17 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 18 of 34
`
`each of said one or more databases comprising a plurality of
`
`identifiers, each of said identifiers in each said database corresponding to at
`
`least one data item of a plurality of data items, and each of said identifiers
`
`in each said database being based, at least in part, on at least some of the
`
`data in a corresponding data item.
`
`10 - 13. (Canceled)
`
`14.
`
`(Currently amended) A method as in claim 2, further comprising:
`
`maintaining accounting information relating to at least some files in the
`
`system; and
`
`using the accounting information as a basis for charges based on an identity
`
`of the at least some files.
`
`15.
`
`(Previously presented) A method as in claim 9, further comprising:
`
`maintaining accounting information relating to at least some of said files;
`
`and
`
`using the accounting information as a basis for a system in which charges
`
`are based on an identity of the files.
`
`16.
`
`(Original) A method as in claim 15 , wherein the maintaining of
`
`accounting information includes at least some of activities selected from:
`
`(a)
`
`(b)
`
`tracking which files have been stored on a computer; and
`
`tracking which files have been transmitted from a computer.
`
`_ 18 _
`
`GOOG-1021-Page 18 of 34
`
`GOOG-1021-Page 18 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 19 of 34
`
`17.
`
`(Currently amended) A computer-implemented method implemented
`
`at least in part by hardware in combination with software, the method comprising
`
`the steps:
`
`1A)
`
`obtaining a reguest to distribute a particular file eausing—a—set—ef—fi-les
`
`te—bed—istnibn-ted—frein—a—fi-rst—eenapn-ter across a network of computers distinet—frene
`
`
`
`(E)
`
`in response to th_e [[a]] request fer—a—f—i—le, by hardware in
`
`combination with software, obtaining a substantially unigue identifier thereefuest
`
`for the particular file, said substantially unigue identifier being ineludes—at—least—a
`
`name determined as based at least in part on a function of at least some of the
`
`contents of the particular file[[,]] ', and
`
`1C)
`
`ascertaining whether or not the substantially unigue identifier of the
`
`particular file corresponds to an entry on a list of identifiers, each of said
`
`identifiers on said list of identifiers being based, at least in part, on a given
`
`function of the data that comprise the contents of a corresponding one of a
`
`plurality of files, wherein the given function used to determine identifiers on the
`
`list is the same as the function that was used to determine the substantially unigue
`
`identifier of the particular file; and,
`
`1D)
`
`based at least in part on said ascertaining in 1C 2, selectively allowing
`
`eausing the particular file to be distributed across pfevided—frenq—a—given at least
`
`some one of the computers in the network of computers, wherein a copy of the file
`
`is not allowed to be distributed previded without authorization, and wherein the
`
`request to distribute fenthe particular file across the network of computers is
`
`_ 19 _
`
`GOOG-1021-Page 19 of 34
`
`GOOG-1021-Page 19 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 20 of 34
`
`resolved based, at least in part, on whether or not the substantially unique
`
`identifier of the file corresponds to an entry on the list of identifiers; and a
`
`
`
`1E)
`
`collecting information regarding the particular file.
`
`18.
`
`(Currently amended) A method as in claim 17, further comprising:
`
`using the aeeeunting information collected as a basis for a system in which
`
`charges are based on an identity of the data files.
`
`19.
`
`
`(Currently amended) A method as in claim 1_7 [[18]], further
`
`comprising the step of:
`
`maintaining accounting information relating to at least some files,
`
`wherein the maintaining of accounting information includes at least some
`
`of activities selected from:
`
`(a)
`
`(b)
`
`tracking which files have been stored on a computer; and
`
`tracking which files have been transmitted from a computer.
`
`20.
`
`(Currently amended) A computer-implemented method, operable in
`
`a data processing system and implemented at least in part by hardware in
`
`combination with software, the method comprising:
`
`(A)
`
`in response to a reguest to allow distribution of a particular file
`
`
`
`_ 20 _
`
`GOOG-1021-Page 20 of 34
`
`GOOG-1021-Page 20 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 21 of 34
`
`peer—te—peer—netwerk by hardware in combination with software, ascertaining
`
`whether or not a content-dependent particular name of the particular file
`
`corresponds to an entry in a database, said database comprising a plurality of
`
`identifiers, each of said identifiers having been determined based, at least in part,
`
`on the data that comprise the contents of a corresponding one of a plurality of
`
`files, and said content-dependent name for the particular file being based, at least
`
`in part, on the contents of the particular file; M
`
`B)
`
`based at least in part on said ascertaining in 1A), selectively
`
`permitting the particular file to be distributed to computers in the network of
`
`computers; and
`
`1C)
`
`collecting and maintaining aeeeun-t—i—ng information relating toE
`
`particular file—files—in—thasystemTwherein-theanaintaining—ef—aeeeu-nting
`
`information collected includes at least w some of information aeH-vi-t-ies selected
`
`
`
`1a) information about the content of the particular data item, 1b) information
`
`about an owner of the particular data item, 1c) information about a type of the
`
`particular data item, 1d) information about a contextual name of the particular data
`
`item, 1e) information about whether or not the particular data item was copied, 1f}
`
`the content-based name of the particular data item, 1g) information about an
`
`identity of a reguestor, 1h) a timestamp,‘, 1i) information about whether or not the
`
`particular data item was created, and gj) information about whether or not the
`
`particular data item was read
`
`
`
`GOOG-1021-Page 21 of 34
`
`GOOG-1021-Page 21 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 22 of 34
`
`
`
`21. (Original) A method as in claim 20, wherein some of the computers
`
`communicate with each other using a TCP/IP communication protocol.
`
`
`22. (Currently amended) A method as in claim 1 anyone-ef—elaims—l—é—er
`
`elaim—9—er—elaim—l—7—er—elaimé19, wherein a copy of the rectuested particular file is
`
`not permitted to be distributed on behalf of prefided—te unlicensed parties or [[to]]
`
`unauthorized parties.
`
`
`23. (Currently amended) A method as in claim 1 anyone-efielaims—l—te—é—er
`
`9, wherein distribution of an unauthorized copy of a file is not allowed te—be
`
`prefided—fiem—ene—ef—the—eemputers.
`
`
`24. (Currently amended) A method as in anyone-ef—elaims—l—and claim 2
`
`[[t06]],~-“- .=--‘-== ==‘.:- -.=..: =
`
`-
`
`-;
`
`.
`
`---
`
`-
`
`further comprising:
`
`main-ta-mi-Hg—aeeeu-n-t-i-ng collecting information relating to the particular file
`
`
`
`-22-
`
`GOOG-1021-Page 22 of 34
`
`GOOG-1021-Page 22 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 23 of 34
`
`25. (Currently amended) The method of claim 1 [[23]] wherein distribution
`
`o_f an unlicensed copy of a file is not allowed to—be—prefided—fiem—ene—ef—t—he
`
`computers.
`
`26. (Canceled)
`
`27. (New) The method as in any one of claims 1-6, 9, 17, and 20, wherein
`
`the hardware comprises a processor and memory.
`
`28. (New) The method as in any one of claims 1-6, 9, 17, and 20, wherein
`
`the hardware comprises a computer.
`
`29. (New) The method as in any one of claims 1, 2, 6, and 17 wherein the
`
`list of identifiers is in a table comprising said list.
`
`30. (New) The method as in any one of claims 1, 2, 6, and 17 wherein the
`
`list of identifiers is in a database comprising said list.
`
`31. (New) The method of claim 30 wherein said database maps each said
`
`identifier in said database to information relating to a corresponding data item.
`
`32. (New) The method of claim 1 wherein the specific name for the
`
`particular file corresponds to an identifier on the list of identifiers when the
`
`specific name for the particular file matches the identifier on the list of identifiers.
`
`_ 23 _
`
`GOOG-1021-Page 23 of 34
`
`GOOG-1021-Page 23 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 24 of 34
`
`33. (New) A method as recited in claim 1 wherein the specific name of the
`
`particular file is based, at least in part, on a function of all of the data which
`
`comprise the contents of the particular file.
`
`34. (New) A method as recited in claim 23 further comprising:
`
`permitting at least one copy of the particular file to be distributed across the
`
`plurality of computers in a network when it is not determined that the particular
`
`file is unauthorized.
`
`35. (New) The method of claim 1 further comprising:
`
`denying permission for the particular file to be distributed across the
`
`plurality of computers in a network when it is determined that access to the
`
`particular file is not authorized.
`
`36. (New) The method of claim 1 further comprising:
`
`maintaining the list of identifiers.
`
`37. (New) The method of claim 36 wherein said maintaining the list of
`
`identifiers comprises:
`
`adding new identifiers to said list of identifiers.
`
`38. (New) The method of claim 2 wherein the specific name for the
`
`particular file is based, at least in part, on a size or length of the particular file.
`
`39. (New) The method of claim 2 wherein the specific name for the
`
`particular file comprises a digital fingerprint of the particular file.
`
`_ 24 _
`
`GOOG-1021-Page 24 of 34
`
`GOOG-1021-Page 24 of 34
`
`
`
`In re Application of: FARBER, David
`Application S.N.:
`11/017,650
`Supplemental Amendment after RCE
`Page 25 of 34
`
`40. (New) The method of claim 2 wherein the specific name for the
`
`particular fil