[tahoe-dev] Surely M$ can patent this process?

mheyman at gmail.com mheyman at gmail.com
Wed Jan 30 10:06:36 EST 2008


On Jan 27, 2008 11:18 AM, zooko <zooko at zooko.com> wrote:
> [adding Cc: p2p-hackers and cryptography mailing lists as explained
> below; Please trim your follow-ups as appropriate.]
>
> On Jan 26, 2008, at 9:44 PM, Gary Sumner wrote:
>
> > Surely there must be prior art on this technique to refute this
> > patent?
> >
>
> That's an interesting question, and I'm carbon-copying the p2p-
> hackers and cryptography mailing lists to ask if anyone knows.
>
FYI: <http://www.opencm.org/papers/cpcms2001.pdf>
  "CPCMS: A Configuration Management System Based
  on Cryptographic Names". Jonathan S. Shapiro,  John
  Vanderburgh, Systems Research Laboratory, Johns
  Hopkins University. Appeared in the 2002 USENIX
  Annual Technical Conference

-Michael Heyman

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list